In keeping with the mission of Kennesaw State University, the College of Computing and Software Engineering serves the community by equipping its students and graduates with the skills and knowledge to apply computing, software engineering techniques and information technologies to solve today's real-world problems and face tomorrow's challenges. To this end, we offer a range of first-rate undergraduate and graduate degrees and professional programs and engage in high-quality scholarship, research and development in all aspects of computing and its applications.

Our vision is to be recognized as one of the best academic units in the world dedicated to all aspects of computing and its applications, including science, engineering and technology. Through our educational programs, our research and scholarship, and our service to the community, we seek to empower individuals and organizations to improve the quality of life for people around the globe through the application of computing and information technologies.

Share Your Published Research

Don't Know How?





Follow

Submissions from 2023

Link

The impact of meditation aided by VR technology as an emerging therapeutic to ease cancer related anxiety, stress, and fatigue, D. Michael Franklin, Charles Silvestro, Robert A. Carrillo, Yewon Yang, Dharani Annadurai, Sangavai Ganesan, Divya Sai Jyothi Vasantham, Soujanya Mettu, Mehal Patel, Manasi S. Patil, and Nandini Devi Akurathi

Link

An Examination of the Hidden Judging Criteria in the Generative Design in Minecraft Competition, Jean Baptiste Herve, Christoph Salge, and Henrik Warpefelt

Link

Security and Privacy in Metaverse: A Comprehensive Survey, Yan Huang, Yi Joy Li, and Zhipeng Cai

Link

Exploring personalization via federated representation Learning on non-IID data, Changxing Jing, Yan Huang, Yihong Zhuang, Liyan Sun, Zhenlong Xiao, Yue Huang, and Xinghao Ding

Link

3-Multi ranked encryption with enhanced security in cloud computing, Ye Eun Kim, Junggab Son, Reza M. Parizi, Gautam Srivastava, and Heekuck Oh

Link

The development of an immersive mixed-reality application to improve the ecological validity of eating and sensory behavior research, John W. Long, Bart Masters, Pejman Sajjadi, Christopher Simons, and Travis D. Masterson

Link

An Emoticon-Based Novel Sarcasm Pattern Detection Strategy to Identify Sarcasm in Microblogging Social Networks, M. Nirmala, Amir H. Gandomi, Madda Rajasekhara Babu, L. D.D. Babu, and Rizwan Patan

Link

Enhancing attention in autism spectrum disorder: comparative analysis of virtual reality-based training programs using physiological data, Bhavya Sri Sanku, Yi Li, Sungchul Jung, Chao Mei, and Jing He

Link

An optimized fuzzy deep learning model for data classification based on NSGA-II, Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, and Gregory Epiphaniou

Link

Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks, Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, and Hadis Karimipour

Link

An ensemble deep learning model for cyber threat hunting in industrial internet of things, Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, and Hadis Karimipour

Submissions from 2022

Link

Lung cancer disease detection using service-oriented architectures and multivariate boosting classifier, Thaventhiran Chandrasekar, Sekar Kidambi Raju, Manikandan Ramachandran, and Rizwan Patan

Link

Federated-Learning-Based Anomaly Detection for IoT Security Attacks, Viraaji Mothukuri, Prachi Khare, Reza M. Parizi, and Seyedamin Pouriyeh

Link

Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities, Rizwan Patan, Ramachandran Manikandan, Ramalingam Parameshwaran, and Sivanesan Perumal

Link

An efficient packet parser architecture for software-defined 5G networks, Abbas Yazdinejad, Ali Dehghantanha, Hadis Karimipour, and Reza M. Parizi

Link

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks, Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, and Mohammad Hammoudeh

Link

Software defect prediction harnessing on multi 1-dimensional convolutional neural network structure, Zuhaira Muhammad Zain, Sapiah Sakri, Nurul Halimatul Asmak Ismail, and Reza M. Parizi

Link

Computational Approaches to Detect Illicit Drug Ads and Find Vendor Communities Within Social Media Platforms, Fengpan Zhao, Pavel Skums, Alex Zelikovsky, and Yan Huang

Submissions from 2021

Link

Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment, Shafiq Ahmed, Salman Shamshad, Zahid Ghaffar, Khalid Mahmood, Neeraj Kumar, Reza M. Parizi, and Kim Kwang Raymond Choo

Link

An Ensemble Multi-View Federated Learning Intrusion Detection for IoT, Dinesh Chowdary Attota, Viraaji Mothukuri, Reza M. Parizi, and Seyedamin Pouriyeh

Link

Evaluating and Improving Unified Debugging, Samuel Benton, Xia Li, Yiling Lou, and Lingming Zhang

Link

Teaching Software Engineering using Abstraction through Modeling, Mohsen Dorodchi, Nasrin Dehbozorgi, Mohammadali Fallahian, and Seyedamin Pouriyeh

Link

A survey on internet of things security: Requirements, challenges, and solutions, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Mohammed Aledhari, and Hadis Karimipour

Link

Privacy protection among three antithetic-parties for context-aware services, Yan Huang, Wei Li, Jinbao Wang, Zhipeng Cai, and Anu G. Bourgeois

Link

A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification, Noushin Jafarpisheh, Effat J. Zaferani, Mohammad Teshnehlab, Hadis Karimipour, Reza M. Parizi, and Gautam Srivastava

Link

Automated cognitive health assessment in smart homes using machine learning, Abdul Rehman Javed, Labiba Gillani Fahad, Asma Ahmad Farhan, Sidra Abbas, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan

Link

Affective Virtual Reality Gaming for Autism, Yi (Joy) Li, Estate M. Sokhadze, Hao (Irene) Luo, Ayman S. El-Baz, and Adel S. Elmaghraby

Link

Multi-source fusion for weak target images in the Industrial Internet of Things, Keming Mao, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan

Link

Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center, Avinab Marahatta, Sandeep Pirbhulal, Fa Zhang, Reza M. Parizi, Kim Kwang Raymond Choo, and Zhiyong Liu

Link

TOrPEDO: witnessing model correctness with topological proofs, Claudio Menghi, Alessandro Maria Rizzi, Anna Bernasconi, and Paola Spoletini

FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems, Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Kim Kwang Raymond Choo

Link

FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems, Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, and Kim Kwang Raymond Choo

Link

A survey on security and privacy of federated learning, Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, and Gautam Srivastava

A survey on security and privacy of federated learning, Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, and Gautam Srivastava

Link

A survey of machine learning techniques in adversarial image forensics, Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, and Kim Kwang Raymond Choo

A survey of machine learning techniques in adversarial image forensics, Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, and Kim Kwang Raymond Choo

Link

Realizing the Heterogeneity: A Self-Organized Federated Learning Framework for IoT, Junjie Pang, Yan Huang, Zhenzhen Xie, Qilong Han, and Zhipeng Cai

Link

Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach, Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, and Reza M. Parizi

Link

Security aspects of Internet of Things aided smart grids: A bibliometric survey, Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, and Gautam Srivastava

Mining of High-Utility Patterns in Big IoT-based Databases, Jimmy Ming Tai Wu, Gautam Srivastava, Jerry Chun Wei Lin, Youcef Djenouri, Min Wei, Reza M. Parizi, and Mohammad S. Khan

Link

Mining of High-Utility Patterns in Big IoT-based Databases, Jimmy Ming Tai Wu, Gautam Srivastava, Jerry Chun Wei Lin, Youcef Djenouri, Min Wei, Reza M. Parizi, and Mohammad S. Khan

Link

A Semiopportunistic Task Allocation Framework for Mobile Crowdsensing with Deep Learning, Zhenzhen Xie, Liang Hu, Yan Huang, and Junjie Pang

A Semiopportunistic Task Allocation Framework for Mobile Crowdsensing with Deep Learning, Zhenzhen Xie, Liang Hu, Yan Huang, and Junjie Pang

Link

Blockchain-Enabled Authentication Handover with Efficient Privacy Protection in SDN-Based 5G Networks, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Kim Kwang Raymond Choo

Link

Federated learning for drone authentication, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Hadis Karimipour

Link

Enabling Drones in the Internet of Things with Decentralized Blockchain-Based Security, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, and Mohammed Aledhari

Link

A kangaroo-based intrusion detection system on software-defined networks, Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, and Mohammad S. Khan

A kangaroo-based intrusion detection system on software-defined networks, Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, and Mohammad S. Khan

Link

Root causing, detecting, and fixing flaky tests: State of the art and future roadmap, Behrouz Zolfaghari, Reza M. Parizi, Gautam Srivastava, and Yoseph Hailemariam

Submissions from 2020

Link

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices, Muhammad Faizan Ayub, Salman Shamshad, Khalid Mahmood, S. K.Hafizul Islam, Reza M. Parizi, and Kim Kwang Raymond Choo

Link

An incentive-aware blockchain-based solution for internet of fake media things, Qian Chen, Gautam Srivastava, Reza M. Parizi, Moayad Aloqaily, and Ismaeel Al Ridhawi

Link

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges, Kim Kwang Raymond Choo, Sercan Ozcan, Ali Dehghantanha, and Reza M. Parizi

Link

Multi-camera multiple vehicle tracking in urban intersections based on multilayer graphs, Mohadeseh Delavarian, Omid Reza Marouzi, Hamid Hassanpour, Reza M. Parizi, and Mohammad S. Khan

Link

SaPeer and ReverseSaPeer: teaching requirements elicitation interviews with role-playing and role reversal, Alessio Ferrari, Paola Spoletini, Muneera Bano, and Didar Zowghi

Link

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things, Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim Kwang Raymond Choo, and Reza M. Parizi

Link

An Enhanced Stacked LSTM Method with No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems, Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Reza M. Parizi, and Kim Kwang Raymond Choo

Link

Machine learning-based coding decision making in H.265/HEVC CTU division and intra prediction, Wenchan Jiang, Ming Yang, Ying Xie, and Zhigang Li

Link

Mapping digital forensic application requirement specification to an international standard, Victor R. Kebande, Stacey O. Baror, Reza M. Parizi, Kim Kwang Raymond Choo, and H. S. Venter

Link

Internet of Things for Current COVID-19 and Future Pandemics: an Exploratory Study, Mohammad Nasajpour, Seyedamin Pouriyeh, Reza M. Parizi, Mohsen Dorodchi, Maria Valero, and Hamid R. Arabnia

Link

VANETomo: A congestion identification and control scheme in connected vehicles using network tomography, Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, and Mohammed Atiquzzaman

Link

A systematic literature review of blockchain cyber security, Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, and Kim Kwang Raymond Choo

Link

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach, Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, and Mu Yen Chen

Submissions from 2019

Link

Teaching requirements elicitation interviews: an empirical study of learning from mistakes, Muneera Bano, Didar Zowghi, Alessio Ferrari, and Paola Spoletini

Link

Fuzzy Pattern Tree for Edge Malware Detection and Categorization in IoT, Enisieh Modiri Dovom, Amin Azmoodeh, Ali Dehghantanha, David Ellis Newton, Reza M. Parizi, and Hadis Karimipour

Link

Fog data analytics: A taxonomy and process model, Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, and Reza M. Parizi

Link

Automatic Labeling of MR Brain Images Through the Hashing Retrieval Based Atlas Forest, Hong Liu, Lijun Xu, Enmin Song, and Chih-Cheng Hung

Link

Requirements Engineering (RE) for Social Good: RE Cares [Requirements], Paola Spoletini and Et al.

Link

Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study, DC Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, and Reza Parizi

Submissions from 2018

Link

Development of a Human Error Taxonomy for Software Requirements: A Systematic Literature Review, Vaibhav Anu, Wenhua Hu, Jeffrey C. Carver, and Gursimran S. Walia

Using human error information for error prevention, Wenhua Hu, Jeffery C. Carver, Vaibhav Anu, and Gursimran S. Walia

Submissions from 2017

File

From Model Checking to a Temporal Proof for Partial models: Preliminary Example, Anna Bernasconi, Claudio Menghi, Paola Spoletini, Lenore D. Zuck, and Carlo Ghezzi