Dr. Travis Atkison - Publications
Associate Professor
Computer Science
Cyber Security Program Director
This material is presented to ensure timely dissemination of scholarly and technical
work. Copyright and all rights therein are retained by authors or by other copyright holders.
All persons copying this information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may not be reposted or
distributed without the explicit permission of the copyright holder.
Note that the definitive versions of all published papers appearing here are those
that actually appeared in print. In some cases, the versions presented here may differ
in minor ways. When citing any published papers provided here, please reference the
published versions.
Journal Proceedings (reverse chronological order) (*denotes student co-author)
- S. Talukder*, E. Tedla, A. Hainen, and T. Atkison, "Analytical and Empirical
Evaluation of Freight Priority System in Connected Vehicle Environment," Journal
of Transportation Engineering, Part A: Systems, 2021. (Accepted)
- Z. Dong*, T. Atkison, and B. Chen, "Wineinformatics: Using the Full Power
of the Computational Wine Wheel to Understand 21st Century Bordeaux Wines From
the Reviews," Beverages, 2020, vol. 7, no. 1, 2021, article 3.
- S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Trajectory-Based
Signal Control in Mixed Connected Vehicle Environments," Journal of Transportation
Engineering, Part A: Systems, vol. 147, no. 5, 2021, pp. 1-13.
- M. Lee* and T. Atkison, "VANET Applications: Past, Present, and Future,"
Vehicular Communications, vol. 28, no. 1, 2021, pp. 1-14.
- N. Islam*, S. Talukder*, A. Hainen, and T. Atkison, "Characterizing Co-modality
in Urban Transit Systems from a Passengers' Perspective," Public Transport,
vol. 12, no. 2, 2020, pp. 405-430.
- J. Palmer*, V. Sheng*, T. Atkison, and B. Chen, "Classification on Grade,
Price, and Region with Multi-Label and Multi-Target Methods in Wineinformatics,"
Big Data Mining and Analytics, vol. 4, no. 1, 2020, pp. 1-12.
- B. Chen, V. Velchev*, J. Palmer*, and T. Atkison, "Wineinformatics: A
Quantitative Analysis of Wine Reviewers," Fermentation, vol. 4, no. 4, 2018, pp. 82-98.
- S. Haque* and T. Atkison, "A Forensic Enabled
Data Provenance Model for Public Cloud," Journal of Digital Forensics, Security and
Law, vol. 13, no. 3, 2018, article 7.
- T. Atkison, S. Ponomarev*, R. Smith, and B. Chen, "
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks,"
International Journal of Network Security (IJNS), vol. 20, no. 5, 2018, pp. 853-861.
- S. Haque* and T. Atkison, "An Evolutionary Approach of Attack Graph to Attack Tree
Conversion," International Journal of Computer Network and Information Security
(IJCNIS), vol. 9, no. 11, 2017, pp. 1-16.
- B. Chen, H. Le, T. Atkison, and D. Che, "A Wineinformatics Study for White-box
Classification Algorithms to Understand and Evaluate Wine Judges," Transactions on
Machine Learning and Data Mining, vol. 10, no. 1, 2017, pp. 3-24.
- N. Wallace* and T. Atkison, "A Power Grid Incident Identification Based on Physically
Derived Cyber-Event Detection," Journal of Digital Forensics, Security and Law, vol. 12,
no. 2, 2017, pp. 5-18.
- N. Wallace*, and T. Atkison, "On the Detection of Cyber-Events in the Grid Using PCA,"
International Journal of Critical Infrastructures, vol. 13, no. 2/3, 2017, pp. 96-112.
- S. Ponomarev*, and T. Atkison, "Industrial Control System Network Intrusion Detection
by Telemetry Analysis," IEEE Transaction on Dependable and Secure Computing, vol. 13,
no. 2, 2016, pp. 252-260.
- P. Shao*, T. Atkison, N. Kraft, and R. Smith, "Combining Lexical and Structural Information
for Static Bug Localization," International Journal of Advancements in Computing
Technology, vol. 44, no. 1, 2012, pp. 61-71.
- J. Durand*, J. Flores*, N. Kraft, R. Smith, and T. Atkison, "Using
Executable Slicing to Improve Rogue Software Detection Algorithms," International Journal
of Secure Software Engineering, vol. 2. no. 2, 2011, pp. 53-64.
- R. J. Vickery, A. Cedilnik, J. P. Martin, Y. Dandass, T. Atkison, R. J. Moorhead,
J. Clarke, and P. Adams, "Web-based Secure High
Performance Remote Visualization," Journal of Physics: Computer Series 46, SciDAC
2006, pp. 545-549.
Conference Proceedings (reverse chronological order) (*denotes student co-author)
- S. Dasgupta*, M. Rahman, T. Atkison, C. Hollis, and S. Jones, "An
Innovative Attack Modelling and Attack Detection Approach for a Waiting
Time-based Adaptive Traffic Signal Controller," ASCE International Conference
on Transportation and Development (ICTD 2022), Seattle WA, June 2022.
- S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Development
and Evaluation of a Weighted Delay-Based Signal Control Algorithm for Connected
and Non-Connected Vehicles," Transportation Research Board 2021 Annual Meeting,
Washington DC, Jan 2021.
- N. Frissell, D. Joshi, V. Romanek, K. Collins, A. Montare, D. Kazdan, J. Gibbons,
W. Engelke, T. Atkison, H. Kim, S. Cowling, T. McDermott, J. Ackermann, D. Witten,
J. Madey, W. Silver, W. Liles, S. Cerwin, P. Erickson, E. Miller, J, Vierinen, “HamSCI
Personal Space Weather Station (PSWS): Architecture and Current Status,” NSF CEDAR
(Coupling, Energetics, and Dynamics of Atmospheric Regions), Virtual, June 2021.
- M. Lee*, B. Yang*, and T. Atkison, "802.11ac and p in a Simulated VANET
Environment," The 2019 IEEE International Conference on Big Data, Los Angeles,
CA, Dec 2019.
- M. McLeroy*, B. Hallihan*, B. Wright*, and T. Atkison, "Sustainable Mobility:
Developing a Web-based Software Suite for Transportation and Traffic Analysis using
Google Maps," The 17th International Conference on Software Engineering Research and
Practice (SERP’19), Las Vegas, NV, July 2019, pages 29-35.
- L. Malis*, A. Payne*, M. McLeroy*, and T. Atkison, "Vehicle Crashes: Early Detection
Through Image Recognition," The 23rd International Conference on Image Processing, Computer
Vision, and Pattern Recognition (IPCV’19), Las Vegas, NV, July 2019, pages 23-28.
- B. Hallihan*, M. McLeroy*, B. Wright*, and T. Atkison, "Using Isochrones to Examine
NICU Availability in Rural Alabama," The 5th International Conference on Health Informatics
and Medical Systems (HIMS’19), Las Vegas, NV, July 2019, pages 45-50.
- P. Sheinidashtegol*, A. Musaev, and T. Atkison, "Investigating Personally Identifiable
Information Posted on Twitter Before and After Disasters," SERVICES 2019 of SCF 2019,
San Diego, CA, June 2019, pages 31-45.
- C. Wang*, A. Musaev, P. Sheinidashtegol*, and T. Atkison, "Towards Detection of
Abnormal Vehicle Behavior Using Traffic Cameras," 2019 International Congress on
Big Data, San Diego, CA, June 2019, pages 125-136. Best Paper Award
- T. Elliott*, A. Payne*, T. Atkison, and R. Smith, "Algorithms in Law
Enforcement: Toward Optimal Patrol and Deployment Algorithms," The 17th
International Conference on Information & Knowledge Engineering (IKE’18),
Las Vegas, NV, July 2018.
- X. Zhao*, A. Payne*, and T. Atkison, "TTExtS: A Dynamic Framework to Reverse
UML Sequence Diagrams from Execution Traces," The 16th International Conference
on Software Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
- A. Lee*, A. Payne*, and T. Atkison, "A Review of Popular Reverse Engineering
Tools from a Novice Perspective," The 16th International Conference on Software
Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
- E. Caballero-Espinosa*, A. Payne*, and T. Atkison, "An Approach to Analyze
Power Consumption on Apps for Android OS Based on Software Reverse Engineering,"
The 16th International Conference on Software Engineering Research & Practice (SERP’18),
Las Vegas, NV, July 2018.
- N. Eisty*, A. Payne*, and T. Atkison, "Improving the Permission Model to Protect
the Smartphone Users’ Privacy and Applying it on Android," The 2018 International
Conference on Security and Management (SAM’18), Las Vegas, NV, July 2018.
- S. Jones, P. Jutte*, T. Atkison, and O. Musoni, "Understanding Healthcare
Access in a Developing Country through Mapping - Two Case Studies in Rwanda," The
10th International Conference on African Development 2018, Kalamazoo, MI, August 2018.
- S. Haque*, J. Carver, and T. Atkison, "Causes, Impacts, and Detection Approaches
of Code Smell: A Survey," The 2018 ACM Southeast Conference, Richmond, KY, March 2018.
- T. Willingham*, C. Henderson*, B. Kiel*, S. Haque*, and T. Atkison, "Testing
Vulnerabilities in Bluetooth Low Energy," The 2018 ACM Southeast Conference,
Richmond, KY, March 2018.
- V. Nakade*, A. Musaev, and T. Atkison, "Preliminary Research on Thesaurus-Based
Query Expansion for Twitter Data Extraction," The 2018 ACM Southeast Conference,
Richmond, KY, March 2018.
- S. Kim*, M. Keffeler*, T. Atkison, and A. Hainen, "Using Time Series Forecasting
for Adaptive Traffic Signal Control," The 13th International Conference on Data
Mining (DMIM'17), Las Vegas, NV, July 2017.
- M. Leeds*, M. Keffeler*, and T. Atkison, "Examining Features for Android Malware
Detection," The 2017 International Conference on Security and Management (SAM'17),
Las Vegas, NV, July 2017.
- S. Haque*, M. Keffeler*, and T. Atkison, "An Evolutionary Approach of Attack Graphs
and Attack Trees: A Survey of Attack Modeling," The 2017 International Conference
on Security and Management (SAM'17), Las Vegas, NV, July 2017.
- B. Chen, K. Buck, C. Moore, C. Lawrence, J. Yeatts, and T. Atkison, "Granular
Computing in Wineinformatics," The 2017 13th International Conference on Natural
Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2017), Guilin, China,
July 2017.
- A. Sainju* and T. Atkison, "An Experimental Analysis of Windows Log Events Triggered
by Malware," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- M. Leeds*, M. Keffeler* and T. Atkison, "A Comparison of Features for Android Malware
Detection," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- A. Mahaju* and T. Atkison, "Evaluation of Firefox Browser Forensics Tools," The 2017
ACM Southeast Conference, Kennesaw, GA, April 2017.
- A. Lee* and T. Atkison, "A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and
Future Suggestions," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- B. Chen, C. Rhodes, D. Fink, and T. Atkison, "Wineinformatics: Wine Regions Determined
by K-Nearest Neighbor," SWDSI 2017 Annual Conference, Little Rock, AR, March 2017.
- M. Al-Zyoud*, T. Atkison, and J. Carver, "An Overview of Emerging Privacy Issues in the
Internet of Things," The 2016 International Symposium on Internet of Things and Internet
of Everything (CSCI-ISOT), Las Vegas, NV, December 2016.
- M. Leeds* and T. Atkison, "Preliminary Results of Applying Machine Learning Algorithms
to Android Malware Detection," The 2016 International Symposium on Mobile Computing,
Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
- S. Ponomarev* and T. Atkison, "Session Duration Based Feature Extraction for Network
Intrusion Detection in Control System Networks," The 2016 International Symposium on
Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV,
December 2016.
- N. Wallace*, S. Semple*, and T. Atkison, "Identification of
State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA," IEEE
Power and Engineering Society General Meeting, National Harbor, MD, July 2014.
- N. Wallace*, S. Ponomarev*, and T. Atkison, "
Identification of Compromised Power System State Variables," The 2014 International
Conference on Information and Knowledge Engineering (IKE'14), Las Vegas, NV, July 2014.
(26% acceptance)
- S. Ponomarev*, N. Wallace*, and T. Atkison, "Fourier
Transform as Feature Extraction for Malware Classification," The 2014 International
Conference on Security and Management (SAM'14), Las Vegas, NV, July 2014.
- S. Ponomarev*, N. Wallace*, and T. Atkison, "Detection
of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis," The 9th
Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014.
- N. Wallace*, S. Ponomarev*, and T. Atkison, "A Dimensional
Transformation Scheme for Power Grid Cyber Event Detection," The 9th Cyber and
Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014. Best
Paper Award
- N. Wallace* and T. Atkison, "Detecting Cyber-Incidents in the Power Grid Using Principal
Component Analysis," The 3rd Annual Graduate Research Conference College of Engineering
and Science, Louisiana Tech University, October, 2013.
- S. Ponomarev*, J. Durand*, N. Wallace*, and T Atkison, "
Evaluation of Random Projection for Malware Classification," The 7th International
Conference on Software Security and Reliability, Washington, DC, June 2013.
- N. Wallace* and T. Atkison, "Observing Industrial
Control System Attacks Launched Via Metaspliot Framework," The 51st ACM Southeast
Conference, Savannah, GA, April 2013.
- J. Poore*, J. Flores*, and T. Atkison, "Evolution of Digital Forensics in Virtualization by
Using Virtual Machine Introspection," The 51st ACM Southeast Conference, Savannah, GA,
April 2013.
- S. Semple*, S. Ponomarev*, J. Durand*, and T. Atkison, "
Applying Static Analysis to High-Dimensional Malicious Application Detection," The 51st
ACM Southeast Conference, Savannah, GA, April 2013.
- J. Durand* and T. Atkison, "Applying Random Projection
to the Classification of Malicious Applications using Data Mining Algorithms," The
50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
- J. Flores* and T. Atkison, "Evolution of Traditional Digital Forensics in Virtualization,"
The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
- J. Durand* and T. Atkison, "Using Randomized Projection
Techniques to Aid in Detecting High-Dimensional Malicious Applications," The 49th
ACM Southeast Conference, Kennesaw, GA, March 2011.
- J. Flores* and T. Atkison, "Digital Forensics on a
Virtual Machine," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
- M. Gates*, U. Dhital*, T. Lindsay*, and T. Atkison, "A Different Approach to Network Security:
The Best Defense is a Good Offense," The 3rd Cyberspace Research Workshop, Shreveport,
LA, November 2010.
- S. Kasimalla*, S. Bala*, T. Ahmen*, and T. Atkison, "GSM Security Threats and Countermeasures,"
The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- H. Nuhait*, C. Sakpal*, and T. Atkison, "Securing a Wireless Network - WPA Attacked and
Defended," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- H. May*, A. Dhungana*, J. Chen*, and T. Atkison, "Defending Against Cross Site Scripting,"
The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- T. Atkison, "Aiding Prediction Algorithms in Detecting High-
Dimensional Malicious Applications Using a Randomized Prediction Technique," The 48th ACM
Southeast Conference, Oxford, MS, April 2010, ACM.
- B. Malone, T. Atkison, M. Kosa, and F. Hadlock, "Pedagogically
Effective Effortless Algorithm Visualization with a PCIL," Frontiers in Education
39th Annual Conference, San Antonio, Texas, October 2009, IEEE.
- T. Atkison, "Applying Randomized Projection to aid
Prediction Algorithms in Detecting High-Dimensional Rogue Applications," The 47th ACM
Southeast Conference, Clemson, SC, March 2009, ACM.
- T. Atkison, "Using an Information Retrieval
Technique to Discover Malicious Software," In the Proceedings of the 12th World
Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, June 2008,
IIIS, pages 284-289.
- R. Vickery, A. Cedilnik, J. Martin, J. Fowler, R. Morehead, Y. Dandass, T. Atkison,
P. Adams, and J. Clarke, "Web-based High Performance
Remote Visualization," In the Proceedings of the 17th Annual Department
of Defense High Performance Computing Modernization Program's (HPCMP) Users Group
Conference, Pittsburgh, PA, June 2007, IEEE Computer Society.
- T. Atkison, K. Pensy, C. Nicholas, D. Ebert, R. Atkison, and C. Morris, "Case Study: Visualization and Information Retrieval Techniques
for Network Intrusion Detection," In Proceedings of the Third IEEE Eurographics
Visualization Symposium, Ascona, Switzerland, May 2001, Springer, pages 283-290.
- L. Butler, T. Atkison, and E. Miller, "Comparing CPU
Performance Between and Within Processor Families," In the Proceedings of the 25th
Annual International Conference on Computer Measurement and Performance (CMG 2000),
Orlando, FL, December 2000, pages 421-430.
Technical Reports and
Other Publications (reverse chronological order)
- M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time
Analysis of Hospital Access in Alabama," Poster, 19th Annual Rural Health
Conference, Tuscaloosa, AL, 25-26 April 2018. 3rd Place Poster.
- M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time
Analysis of Hospital Access in Alabama," Poster, SDITE Annual Meeting,
Mobile, AL, 10 April 2018.
- R. Vickery, A. Cedilnik, J. Martin, Y. Dandass, T. Atkison, R. Moorhead, J. Clarke,
and P. Adams, "Remote Visualization of Large
Datasets," Invited Poster, SciDAC 2006 Conference, 25-29 June, Denver, CO.
- R. Vickery, A. Cedilnik, R. Moorhead, Y. Dandass, T. Atkison, and J. Martin, "WebVis
Secure Communications Model and Preliminary Performance Study," RMV-KY5-001 Technical
Report, 1 December 2005.
- T. Atkison, H. Kargupta, and C. Nicholas, "Dimensionality
Reduction Using a Randomized Projection Algorithm: Preliminary Results," University of
Maryland Baltimore County Technical Report TR-CS-01-11, September 2001.