Conference Papers

Prior to 2004, most of my publications were in journals. Please check that section for references.

  1. George Markowsky, University of Maine; Dan Bogaard, Rochester Institute of Technology; Sanjay Goel, SUNY Albany; Shreshth Kandari, Rochester Institute of Technology; Daryl Johnson, Rochester Institute of Technology; William Stackpole, Rochester Institute, Producing and Evaluating Crowdsourced Computer Security Attack Trees,2016 IEEE International Symposium on Technologies for Homeland Security, Waltham, MA, May 10-12, 2016.
  2. George Markowsky, The Problem of Interceptor Top Level Domains, IEEE IDAACS’15 (Intelligent Data Acquisition and Advanced Computer Systems), Warsaw, Poland, September 24-26, 2015.
  3. Linda Markowsky and George Markowsky, Scanning for Vulnerable Devices in the Internet of Things, IEEE IDAACS’15 (Intelligent Data Acquisition and Advanced Computer Systems), Warsaw, Poland, September 24-26, 2015.
  4. G. Markowsky, P. Lutz, D. Johnson, W. Stackpole, R. Soucy, and B. Attaie, The Benefits of Hosting the NECCDC at Your Institution, Proc. 2015 International Conference on Security and Management (SAM’15), Las Vegas, NV, July 27-30, 2015.
  5. R. T. Albert, C. Bennett, D. Briggs, M. Ebben, H. Felch, D. Kokoska, L. Lovewell, C. MacDonald,
    G. Markowsky, L. Markowsky, J. Murphy, E. Sihler, and G. Wilson, Experiences with Establishment of a Multi-University Center of Academic Excellence in Information Assurance/Cyber Defense, Proc. 2015 International Conference on Security and Management (SAM’15), Las Vegas, NV, July 27-30, 2015.
  6. George Markowsky and Linda Markowsky, Promela: Introducing Proof into Cybersecurity Education, Proc. 2015 International Conference on Security and Management (SAM’15), Las Vegas, NV, July 27-30, 2015.
  7. Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Dan Bogard, Bill Stackpole, Georg
    Markowsky, Crowdsourcing Computer Security Attack Trees, 10-th Annual Symposium on Information Assurance (ASIA’15), Albany, NY, June 2-3, 2015, pp. 19-23.
  8. Carl Giannatto and George Markowsky, Potential Vulnerabilities of the NextGen Air Traffic Control System, Proc. 2014 International Conference on Security and Management (SAM’14), Las Vegas, NV, July 21-24, 2014, pp. 220-226.
  9. George Markowsky and Linda Markowsky, From Air Conditioner to Data Breach, Proc. 2014 International Conference on Security and Management (SAM’14), Las Vegas, NV, July 21-24, 2014, pp. 434-439.
  10. George Markowsky In Praise of Small Data, Proceedings of the 2014 ASE BigData, SocialCOM, Cybersecurity Conference, Stanford University, May 27-31, 2014.
  11. George Markowsky, Crowdsourcing, Big Data and Homeland Security, Proc. 2013 IEEE International Conference on Technologies for Homeland Security (HST2013), Waltham, Massachusetts, USA November 12-14, 2013, pp. 772-778.
  12. George Markowsky, Was the 2006 Debian SSL Debacle a System Accident?, Proc. 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin,Germany, September 12-14, 2013, Vol. 2, pp. 624-629.
  13. Yiqi Lin, Linda Markowsky, Shuanxi Liu and George Markowsky Adapting American ERP Systems for China: Cross-Cultural Issues and a Case Study, Proc. 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin,Germany, September 12-14, 2013, Vol. 2, pp. 572-577.
  14. George Markowsky and Linda Markowsky, Visualizing Cybersecurity Events, Proc. 2013 International Conference on Security and Management (SAM’13), Las Vegas, NV, July 22-25, 2013, pp. 445-451.
  15. George Markowsky, Daryl Johnson, Andrew Moody, Ray Soucy and William Stackpole, The 2013 NECCDC – Lessons LearnedProc. 2013 International Conference on Security and Management (SAM’13), Las Vegas, NV, July 22-25, 2013, pp. 433-439.
  16. George Markowsky and Linda Markowsky, Who’s Knocking at Your Cybercastle’s Gate?,
    Proc. 2012 International Conference on Security and Management (SAM’12), Las Vegas, NV, July 16-19, 2012, pp. 206-212.
  17. George Markowsky, Toward a More Perfect Scoring System for the NECCDC,
    Proc. 2012 International Conference on Security and Management (SAM’12),
    Las Vegas, NV, July 16-19, 2012, pp. 230-235.
  18. Evolutionary Dynamics of Revolution: Opinion Modeling in Society Based on Graphs and Rules, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS 2011), Prague, Czech Republid, September 15-17, 2011 (IDAACS 2011), pp, 780-784.
  19. Universal Asset Assessment System Based on Excel™, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS 2011), Prague, Czech Republic, September 15-17, 2011, pp, 747-752.
  20. Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity Education, The 2011 International Conference on Security and Management, Las Vegas, NV, July 18-21, 2011 (SAM’11), pp. 507-511 (with L. Markowsky).
  21. A Plan for Training Global Leaders in Cybersecurity, The 2011 International Conference on Security and Management, Las Vegas, NV, July 18-21, 2011 (SAM’11), pp. 494-495, (with A. Bobkowska, L. Kuzniarz, A. Rucinski and B. Wiszniewski).
  22. High School Cyber Defense Competitions: Lessons from the Trenches, Conference on Security and Management, The 2010 International Conference on Security and Management, Las Vegas, NV, July 12-15, 2010 (SAM’10), pp. 280-285 (with R. Albert and J. Wallingford).
  23. Consumer Guide to Online Cybersecurity Resources: UMCEG, International Conference on Security and Management, The 2010 International Conference on Security and Management, Las Vegas, NV, July 12-15, 2010 (SAM’10), pp. 243-247 (with L. Markowsky).
  24. Defining Outcomes for the Team Experience, ABET Symposium, April 15-17, 2010, Las Vegas, Nevada (Electronic Proceedings).
  25. Data Communication Crypto Protocol for Security System Sensor Networks. Proceedings of the 5th IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS 2009),, Rende, Italy, September 21-23, 2009, pp. 375-379 (with Bykovyy, Kochan, Kmakh, Sachenko, Roshchupkin, Aksoy).
  26. Comparing Apples and Oranges: How to Select the Most Probable Targets. 2009 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 11-12, 2009.
  27. Genetic Algorithm Implementation for Distributed Security Systems Optimization, IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2008), Istanbul, Turkey, 14-16 July, 2008 (with Bykovyy, Pigovsky, Kochan, Sachenko, Aksoy).
  28. The Intelligent Island™: Using COTS Equipment to Monitor and Island, 2008 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 12-13, 2008.
  29. Genetic Algorithm Implementation for Perimeter Security Systems CAD. Proceddings of the 4th IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2007), Dortmund, Germany, September 6-8, 2007 (with Bykovyy, Kochan, Sachenko).
  30. Survey of Supercomputer Cluster Security Issues. Special Session on Supercomputer Cluster Security, The 2007 International Conference on Security and Management (SAM’07), Las Vegas, NV, June 25-28, 2007 (with L. Markowsky).
  31. RF Eavesdropping Beowulf Clusters. Special Session on Supercomputer Cluster Security, The 2007 International Conference on Security and Management (SAM’07), Las Vegas, NV, June 25-28, 2007.
  32. (Invited Keynote Speaker) Chernobyl – The World’s Largest Dirty Bomb, 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability, May 16-17, 2007, Woburn, MA.
  33. A CAD System That Optimizes Distributed Sensor Networks for Perimeter Security, Proceedings of the Second IEEE International Conference on Technologies for Homeland Security and Safety, Istanbul, Turkey, October 9-13, 2006, pp. 271-276 (with Bykovyy, Kochan, Sachenko).
  34. Multispectral Estimation of Soil and Vegetation Conditions, poster presentation at the 2006 IEEE Homeland Security Conference, Cambridge, MA, June 7-9, 2006 (with Kussul, Sachenko, Korbakov, Kravchenko).
  35. Applying the Lessons Learned from Chernobyl to Homeland Security, presented at the 2006 IEEE Homeland Security Conference, Cambridge, MA, June 7-9, 2006 (with Zotov, Zotov).
  36. ZD-Net: Zoonotic Diseases Network, poster presentation at the 2006 IEEE Homeland Security Conference, Cambridge, MA, June 7-9, 2006 (with Reid, Davis).
  37. The Beowulf Advanced Security Studies (BASS) Center and PirateNet, presented at the 2006 IEEE Homeland Security Conference, Cambridge, MA, June 7-9, 2006 (with Markowsky, Whitsel).
  38. The PLUTO Project: The Concept of a Virtual Tunnel Laboratory in the Experimental Mine ‘Barbara’, presented at the 2nd International Symposium on Tunnel Safety & Security held in Madrid Spain, March 15-17, 2006 (with Kochanski, Firut, Kochanski, Lebecki, Long, Rucinska, Rucinski, Stepnowski, Zychon).
  39. (Invited Paper) Lessons Learned from Chernobyl at the University of Massachusetts Soils Conference, Amherst, MA, October 19, 2005.
  40. A Low-Cost Network Controller for Security Systems, presented at the Third IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems, Sofia, Bulgaria, September 5-7, 2005, pp. 388-391 (with Bykovyy, Maykiv, Turchenko, Kochan, Yatskiv).
  41. Detection Of Unauthorized Intrusion Into Cargo Containers That Are Under Custom Seals, presented at the Third IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS 2005),, Sofia, Bulgaria, September 5-7, 2005, pp. 366-368 (with Firsov, Kutovoy, Pozdnyakov, Litvinova, and Lyzikova).
  42. Network Capable Application Processor Based On A FPGA, IMTC 2005 – Instrumentation and Measurement Technology Conference, Ottawa, Canada, May 17-19 2005 (with Kochan, Kochan, Sachenko, Maykiv and Turchenko).
  43. Optimization Of Distributed Security Sensor Systems, First Department of Homeland Security Conference, Boston, April 26-27, 2005 (with Turchenko, Kochan, Bykovyy, Sachenko, and Koval).
  44. Space-Based Technologies For Tank Leakage Detection, First Department of Homeland Security Conference, Boston, April 26-27, 2005 (with Firsov and Pozdnyakov).
  45. The Vibrodiagnostic Monitoring Of Structures, First Department of Homeland Security Conference, Boston, April 26-27, 2005 (with Firsov and Pozdnyakov).
  46. Database Design For CAD System Optimizing Distributed Sensor Networks For Perimeter Security , The Eighth IASTED International Conference on Software Engineering and Applications (SEA 2004), Cambridge, MA, USA November 9 – 11, 2004 (with Turchenko, Turchenko, Kochan, Bykovyy, and Sachenko).
  47. Approach to Recognition of License Plate Numbers using Neural Networks, Proceedings of the International Joint Conference on Neural Networks, July 25-29, 2004, Budapest (Hungary), pp. 2965-2970 (with Paliy, Turchenko, Koval and Sachenko).
  48. Protecting the New Amber and Silk Roads, 17th Bled eCommerce Conference – eGlobal, Bled, Slovenia, June 21 – 23, 2004.
  49. A Modular Neural Network Approach to Chemical Content Analysis of Vegetation, 2004 IEEE Conference on Homeland Security, April 21-22, 2004, Cambridge, MA (with Kussul, Yatsenko, Sachenko, Sydorenko, Skakun, and Ganzha).
  50. Detecting a Cyber-attack Source in Real Time, 2004 IEEE Conference on Homeland Security, April 21-22, 2004, Cambridge, MA (with Romanyak, Sachenko, Voznyak, and Connolly).
  51. A Comprehensive Approach to Cargo Container Security, 2004 IEEE Conference on Homeland Security, April 21-22, 2004, Cambridge, MA (with Egan).
  52. Remote Sensing of Vegetation Using Modular Neural Networks, International Conference on Neural Networks and Artificial Intelligence, Minsk, Belarus, November 12-14, 2003, (with Kussul, Kussul, Sachenko, Ganzha).
  53. A Distributed Traceroute Approach to Locating IP Devices, IEEE Second International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Lviv, Ukraine, September 8 – 10, 2003, (with Connolly, Sachenko)
  54. Smart Vehicle Screening System Using Artificial Intelligence Methods, 2003 Spring IEEE Conference on Technologies for Homeland Security, May 7-8, 2003, Cambridge, MA (with Turchenko, Kochan, Koval, Sachenko).
  55. Web Neighborhood Watch, 2003 Spring IEEE Conference on Technologies for Homeland Security, May 7-8, 2003, Cambridge, MA (with Connolly, Sachenko).
  56. Beowulfs Go To Sea, Thirteenth Ship Control Systems Symposium (SCSS 2003), Orlando, FL, April 7-9, 2003 (with McCue).
  57. The Poset of Irreducibles: a Basis for Lattice Theory, invited paper at ORDAL 99, Montpelier, France.