CS Student and Faculty Accomplishments

Academic Year 2014

     
  A. Agrawal (Grad. student) and M. Stamp have an article accepted for publication in International Journal of Security and Networks: Masquerade detection for GUI-based Windows systems.  
  C. Annachhatre (Grad. Student), T. H. Austin, M. Stamp, have an article accepted for publication in Journal of Computer Virology and Hacking Techniques: Hidden Markov models for malware classification.  
  N. B. Brandt (Grad. student) and M. Stamp have just published an article in the Journal of Computer Virology and Hacking Techniques: Automating NFC message sending for good and evil.  
  Matthew Chi (student) won the first prize in the Silicon Valley Innovation Jam held by Cisco System in October 2014.
 
  R. K. Jidigam (Grad. student), T. H. Austin, and M. Stamp have an article accepted for publication: Singular value decomposition and metamorphic detection, to appear in Journal of Computer Virology and Hacking Techniques.  
  A. Kalbhor (Grad. student), T. H. Austin, E. Filiol, S. Josse, M. Stamp have just had paper accepted for publication in the Journal in Computer Virology and Hacking Techniques:  Dueling hidden Markov models for virus analysis.
 
  M. Musale (Grad. student), T. H. Austin, and M. Stamp have published Hunting for metamorphic JavaScript malware in the Journal of Computer Virology and Hacking Techniques.  

 
S. Nerli (Grad. student) and S. Khuri will present their research: Genome-wide Prediction of Splice Sites using Maximal Dependence Decomposition in a poster sesion at the 2014 BaMBA and 2015 AAAS conferences. The research is supported by the SJSU Research, Scholarship and Creative Activity (RSCA) award.  
  H. Rana (Grad. student) and M. Stamp, have an article accepted for publication in the Information Security Journal: A Global Perspective: Hunting for pirated software using metamorphic analysis.  
  A. Oza (Grad. student), K. Ross (Grad. student), R. M. Low, M. Stamp collaborated on research: HTTP attack detection using n-gram analysis.  The article appeared in September 2014 issue of Computers & Security.  
  T. Tamboli (Grad. student), T. H. Austin, and M. Stamp published Metamorphic code from LLVM bytecode in the Journal of Computer Virology and Hacking Techniques, 10(3):177–187, August 2014.  
  Fengjiao Jennifer Wu (Grad. student) and S. Khuri will present their research: Using Probabilistic Graphic Models to Solve NP-Complete Puzzle Problems in a poster session at the 2015 AAAS conference. The research is supported by the SJSU Research, Scholarship and Creative Activity (RSCA) award.