Housed in the B. Thomas Golisano College of Computing and Information Sciences, the Department of Computing Security offers bachelor's and master's degrees in computing security.

History

In 2007 RIT became the first university in the US to offer a BS degree in computing security through its Department of Networking, Security and Systems Administration department. The department changed its name to Department of Computing Security in 2012.

Dates of Existence

2007-present

Previous Names

Department of Networking, Security and Systems Administration (2006-2012)

Follow

Documents from 2016

PDF

Android Malware Detection Using Category-Based Machine Learning Classifiers, Huda Ali Alatwi

Documents from 2015

PDF

A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, Bryan Harmat, Jared Stroud, and Daryl Johnson

PDF

Gamified Digital Forensics Course Modules for Undergraduates, Yin Pan, David Schwartz, and Sumita Mishra

PDF

Authorized Access and the Challenges of Health Information Systems, Ryan Shelc

PDF

Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky

Documents from 2014

PDF

Dictionary Attacks and Password Selection, Tarun Madiraju

PDF

Web Browser Private Mode Forensics Analysis, Emad Sayed Noorulla

PDF

Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks, Kuhu Sharma, Bill Stackpole, Daryl Johnson, Nirmala Shenoy, and Bruce Hartpence

Documents from 2013

PDF

HTTP man-in-the-middle code execution, Brian Adeloye

PDF

Usefulness of teaching security awareness for middle school students, Hani Alhejaili

PDF

A Dynamic, Broad Spectrum Approach to Covert Channels, Christopher Hoffman

PDF

Rule-based conditional trust with OpenPGP., Andrew Jackson

PDF

A Forensic Comparison: Windows 7 and Windows 8, Peter J. Wilson

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Practical study of the problems of current internet routing tables, Arnav Ghosh

PDF

Providing public key certificate authorization and policy with DNS, Matthew Lidestri

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra

Documents from 2011

PDF

Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson

PDF

The Assembly and provisioning of a red team, Daryl Johnson

PDF

Third party application forensics on apple mobile devices, Daryl Johnson, Bill Stackpole, and Alex Levinson

PDF

A HTTP cookie covert channel, Daryl Johnson, Bo Yuan, Peter Lutz, and William Huba

PDF

Network Based Malware Defense, Thomas Tufts

Documents from 2010

PDF

A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence

PDF

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown

PDF

A Covert channel in RTP protocol, Daryl Johnson, Bo Yuan, Peter Lutz, and Christopher Forbes

PDF

Computer forensics technologies for personally identifiable information detection and audits, Yin Pan, Bill Stackpole, and Luther Troell

Documents from 2009

PDF

Understanding malware autostart techniques with web data extraction, Matthew Gottlieb

PDF

Behavior-Based covert channel in cyberspace, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

ICMP covert channel resiliency, Daryl Johnson, Peter Lutz, Bo Yuan, and Kristian Stokes

PDF

Behavior-based covert channel in cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Towards virtual machine integrity using introspection, Sammy Lin

PDF

Data center design & enterprise networking, Christian Mahood

PDF

Computing laboratory sustainability & utilization: initiatives for a greener education, Kristian Stokes

PDF

A Framework for data decay in client-server model, Matthew Taber

PDF

ICMP convert channel resiliency, Bo Yuan, Daryl Johnson, and Kristian Stokes

Documents from 2008

PDF

Evaluation of virtual routing appliances as routers virtual environment, Ahmed Al-Amoudi

PDF

Role-based file archiving, Jean Paul Bourget

PDF

Studying a Virtual Testbed for Unverified Data, William Carl Bridges

PDF

NSSA faculty involvement in IT security auditing at RIT, Daryl Johnson and Yin Pan

PDF

Differential virtualization for large-scale system modeling, Jason Koppe

PDF

The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration, Marsha Mitchell

PDF

Deep freeze and the NSSA Labs, Jay Snell

PDF

The Evolution of a virtualized laboratory environment, Bill Stackpole

PDF

Decentralized virtualization in systems administration education, Bill Stackpole, Jason Koppe, Tom Haskell, and Laura Guay

Documents from 2007

PDF

The Development and deployment of a multi-user, remote access virtualiztion system for networking, security, and system administration classes, Charles Border

Documents from 2006

PDF

Does a virtual networking laboratory result in similar student achievement and satisfaction?, Edith Lawson and Bill Stackpole

PDF

An Asymptotic secrecy model and intelligent systems, Bo Yuan

Documents from 2005

PDF

A Covert channel in packet switching data networks, Bo Yuan and Peter Lutz

Documents from 2004

PDF

Forensic course development - One year later, Luther Troell, Yin Pan, and Bill Stackpole

PDF

Conversational diagnostic agent, Michael Yacci and Peter Lutz

Documents from 2003

PDF

Forensic course development, Luther Troell, Yin Pan, and Bill Stackpole

Documents from 1997

PDF

An intelligent fuzzy control system, Bo Yuan and Djuro Zrilic

PDF

Simplified realisation of delta-sigma decoder, D. Zrilic, G. Petrovic, and Bo Yuan

Documents from 1996

PDF

Reasoning with propositional knowledge based on fuzzy neural logic, Wangming Wu, Hoon-Heng Teh, and Bo Yuan

PDF

Constructing fuzzy measures: A New method and its application to cluster analysis, Bo Yuan and George Klir

Documents from 1995

PDF

On Nonspecificity of fuzzy sets with continuous membership functions, George Klir and Bo Yuan

PDF

Bayesian inference based upon fuzzy events, Bo Yuan and George Klir

Documents from 1994

PDF

Approximate solutions of systems of fuzzy relation equations, George Klir and Bo Yuan

PDF

A Generalization of Sugeno integrals, Bo Yuan and George Klir

Documents from 1978

PDF

Relaxation methods for image reconstruction, Gabor Herman, Arnold Lent, and Peter Lutz

Documents from 1975

PDF

SIGNUM a spectrum of mathematical software considerations, David Cochran, M. Gordan, and Michael Minkoff

PDF

Iterative relaxation methods for image reconstruction, Herman Gabor, Arnold Lent, and Peter Lutz