CS Student and Faculty Accomplishments

Academic Year 2014

  M. Moh and four SJSU faculty members played a key role in the establishment of the National Center of Academic Excellence in Information Assurance/Cybersecurity Education for the academic years 2014 to 2019.  
  Kisha Rikhi and Arpi Shah (students) tied the first place in the Fall CS internship poster expo.  
  A. Agrawal (Grad. student) and M. Stamp have an article accepted for publication in International Journal of Security and Networks: Masquerade detection for GUI-based Windows systems.  
  C. Annachhatre (Grad. Student), T. H. Austin, M. Stamp, have an article accepted for publication in Journal of Computer Virology and Hacking Techniques: Hidden Markov models for malware classification.  
  N. B. Brandt (Grad. student) and M. Stamp have just published an article in the Journal of Computer Virology and Hacking Techniques: Automating NFC message sending for good and evil.  
  M. Chi (student) won the first prize in the Silicon Valley Innovation Jam held by Cisco System in October 2014.
 
  R. K. Jidigam (Grad. student), T. H. Austin, and M. Stamp have an article accepted for publication: Singular value decomposition and metamorphic detection, to appear in Journal of Computer Virology and Hacking Techniques.  
  A. Kalbhor (Grad. student), T. H. Austin, E. Filiol, S. Josse, M. Stamp have just had paper accepted for publication in the Journal in Computer Virology and Hacking Techniques:  Dueling hidden Markov models for virus analysis.
 
  M. Musale (Grad. student), T. H. Austin, and M. Stamp have published Hunting for metamorphic JavaScript malware in the Journal of Computer Virology and Hacking Techniques.  

 
S. Nerli (Grad. student) and S. Khuri will present their research: Genome-wide Prediction of Splice Sites using Maximal Dependence Decomposition in a poster sesion at the 2014 BaMBA and 2015 AAAS conferences. The research is supported by the SJSU Research, Scholarship and Creative Activity (RSCA) award.  
  H. Rana (Grad. student) and M. Stamp, have an article accepted for publication in the Information Security Journal: A Global Perspective: Hunting for pirated software using metamorphic analysis.  
  A. Oza (Grad. student), K. Ross (Grad. student), R. M. Low, M. Stamp collaborated on research: HTTP attack detection using n-gram analysis.  The article appeared in September 2014 issue of Computers & Security.  
  T. Tamboli (Grad. student), T. H. Austin, and M. Stamp published Metamorphic code from LLVM bytecode in the Journal of Computer Virology and Hacking Techniques, 10(3):177–187, August 2014.  
  F. Wu (Grad. student) and S. Khuri will present their research: Using Probabilistic Graphic Models to Solve NP-Complete Puzzle Problems in a poster session at the 2015 AAAS conference. The research is supported by the SJSU Research, Scholarship and Creative Activity (RSCA) award.