A collection of published articles from members of the Department of Computer Science at Kennesaw State University.

Visit the full list of Faculty Publications to view the work from other departments on campus.

KSU Faculty can send a current list of their publications to the administrator for inclusion in this series.

Follow


Submissions from 2015

PDF

A Comparative Study of Email Forensic Tools, Vamshee Krishna Devendran, Hossain Shahriar, and Victor Clincy

PDF

Advanced Techniques for Computational and Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, and Bor-Chen Kuo

Link

Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks Via Multi-Objective Genetic Algorithm, Jing (Selena) He, Shouling Ji, Raheem Beyah, and Ying Xie

Link

Myocardial Motion Estimation of Tagged Cardiac Magnetic Resonance Images Using Tag Motion Constraints and Multi-level B-splines Interpolation, Hong Liu, Meng Yan, Enmin Song, Jie Wang, Qian Wang, and Chih-Cheng Hung

Link

Automating Trade-Off Analysis of Security Requirements, Liliana Pasquale, Paola Spoletini, Mazeiar Salehie, and Luca Cavallaro

PDF

Mobile Phishing Attacks and Mitigation Techniques, Hossain Shahriar, Tulin Klintic, and Victor Clincy

Submissions from 2014

Link

Greedy Construction of Load-Balanced Virtual Backbones in Wireless Sensor Networks, Jing (Selena) He, Shouling Ji, and Yingshu Li

Link

A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks, Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai

PDF

Hardware Components in Cybersecurity Education, Dan Chia-Tien Lo, Max North, and Sarah North

PDF

DRIP - Data Rich, Information Poor: A Concise Synopsis of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, and Sarah North

Link

Classification of Clickjacking Attacks and Detection Techniques, Hossain Shahriar and Vamshee Krishna Devendran

Link

Information Theoretic XSS Attack Detection in Web Applications, Hossain Shahriar, Sarah North, Wei-Chuen Chen, and Edward Mawangi

Link

Server-Side Code Injection Attack Detection Based on Kullback-Leibler Distance, Hossain Shahriar, Sarah M. North, Yoonji Lee, and Roger Hu

PDF

Effective Detection of Vulnerable and Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, and Thibaud Lutellier

Link

Multi-Regional Query Scheduling in Wireless Sensor Networks with Minimum Latency, Minggyuan Yan, Jing (Selena) He, Shouling Ji, and Yingshu Li

Link

OpenFlow Security Threat Detection and Defense Services, Wanqing You, Kai Qian, Xi He, and Ying Qian

Link

Hierarchical Queue-Based Task Scheduling, Wanqing You, Kai Qian, and Ying Qian

PDF

Developing Health Information Technology (HIT) Programs and HIT Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, and Andy Ju An Wang

Link

Assessment Metrics, Challenges, and Strategies for Mobile Health Apps, Chi Zhang, Xihui Zhang, and Richard Halstead-Nussloch

Submissions from 2013

Link

Qualitative Evaluation of Latency and Packet Loss in a Cloud-based Games, Victor Clincy and Brandon Wilgor

Link

Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, Jing He, Shouling Ji, Yi Pan, and Yingshu Li

Link

Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Jing Selena He, Shouling Ji, Yi Pan, and Zhipeng Cai

Link

Constructing Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li

Link

Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Networks, Shouling Ji, Jing Selena He, Yi Pan, and Yingshu Li

Link

Cell-Based Snapshot and Continuous Data Collection in Wireless Sensor Networks, Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, and Raheem Beyah

Link

Scalable Matrix Decompositions with Multiple Cores on FPGAs, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris

Link

Energy-Efficient Task Scheduling Algorithms on Heterogenous Computers with Continuous and Discrete Speeds, Luna Mingyi Zhang, Keqin Li, Dan Chia-Tien Lo, and Yanqing Zhang

Submissions from 2012

Link

Area Query Processing Based on Gray Code in Wireless Sensor Networks, Chunyu Ai, Yueming Duan, Mingyuan Yan, and Jing He

Link

Load-Balanced CDS Construction in Wireless Sensor Networks Via Genetic Algorithm, Jing (Selena) He, Shouling Ji, Mingyuan Yan, and Yi Pan

PDF

Hypotheses Generation as Supervised Link Discovery with Automated Class Labeling on Large-scale Biomedical Concept Networks, Jayasimha R. Katukuri, Ying Xie, Vijay Raghavan, and Ashish Gupta

Link

Android-Based Hands-on Labware for Computing Education, Kai Qian, Dan Lo, Yi Pan, and Yanqing Zhang

Link

Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction, Yi-Gang Tai, Dan Chia-Tien Lo, and Kleanthis Psarris

Submissions from 2007

Link

Wiener Indices of Balanced Binary Trees, Sergey Bereg and Hao Wang

Principles of Modern Operating Systems, José M. Garrido and Richard Schlessinger

Pedagogy and Project Management: Should You Practice What You Preach?, Debra B. Geist and Martha E. Myers

Concepts in Computing, Kenneth E. Hoganson

A Comparative Study of Personal Code Management Tools, Huey Mai and Hisham M. Haddad

PDF

Learner-Centered Assignments in Computer Literacy, Martha E. Myers, Meg C. Murray, Mario Guimaraes, and Debra B. Geist

Link

Language-Modeling Kernel Based Approach for Information Retrieval, Ying Xie and Vijay V. Raghavan

Link

A Generalized Approach to Possibilistic Clustering Algorithms, Jian Zhou and Chih-Cheng Hung