Dr. Travis Atkison - Publications

Associate Professor

Computer Science

Cyber Security Program Director


Journal Proceedings | Conference Proceedings | Technical Reports and Other Publications


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or distributed without the explicit permission of the copyright holder.

Note that the definitive versions of all published papers appearing here are those that actually appeared in print. In some cases, the versions presented here may differ in minor ways. When citing any published papers provided here, please reference the published versions.



Journal Proceedings (reverse chronological order) (*denotes student co-author)

  1. S. Talukder*, E. Tedla, A. Hainen, and T. Atkison, "Analytical and Empirical Evaluation of Freight Priority System in Connected Vehicle Environment," Journal of Transportation Engineering, Part A: Systems, 2021. (Accepted)
  2. Z. Dong*, T. Atkison, and B. Chen, "Wineinformatics: Using the Full Power of the Computational Wine Wheel to Understand 21st Century Bordeaux Wines From the Reviews," Beverages, 2020, vol. 7, no. 1, 2021, article 3.
  3. S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Trajectory-Based Signal Control in Mixed Connected Vehicle Environments," Journal of Transportation Engineering, Part A: Systems, vol. 147, no. 5, 2021, pp. 1-13.
  4. M. Lee* and T. Atkison, "VANET Applications: Past, Present, and Future," Vehicular Communications, vol. 28, no. 1, 2021, pp. 1-14.
  5. N. Islam*, S. Talukder*, A. Hainen, and T. Atkison, "Characterizing Co-modality in Urban Transit Systems from a Passengers' Perspective," Public Transport, vol. 12, no. 2, 2020, pp. 405-430.
  6. J. Palmer*, V. Sheng*, T. Atkison, and B. Chen, "Classification on Grade, Price, and Region with Multi-Label and Multi-Target Methods in Wineinformatics," Big Data Mining and Analytics, vol. 4, no. 1, 2020, pp. 1-12.
  7. B. Chen, V. Velchev*, J. Palmer*, and T. Atkison, "Wineinformatics: A Quantitative Analysis of Wine Reviewers," Fermentation, vol. 4, no. 4, 2018, pp. 82-98.
  8. S. Haque* and T. Atkison, "A Forensic Enabled Data Provenance Model for Public Cloud," Journal of Digital Forensics, Security and Law, vol. 13, no. 3, 2018, article 7.
  9. T. Atkison, S. Ponomarev*, R. Smith, and B. Chen, " Feature Extraction Optimization for Network Intrusion Detection in Control System Networks," International Journal of Network Security (IJNS), vol. 20, no. 5, 2018, pp. 853-861.
  10. S. Haque* and T. Atkison, "An Evolutionary Approach of Attack Graph to Attack Tree Conversion," International Journal of Computer Network and Information Security (IJCNIS), vol. 9, no. 11, 2017, pp. 1-16.
  11. B. Chen, H. Le, T. Atkison, and D. Che, "A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges," Transactions on Machine Learning and Data Mining, vol. 10, no. 1, 2017, pp. 3-24.
  12. N. Wallace* and T. Atkison, "A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection," Journal of Digital Forensics, Security and Law, vol. 12, no. 2, 2017, pp. 5-18.
  13. N. Wallace*, and T. Atkison, "On the Detection of Cyber-Events in the Grid Using PCA," International Journal of Critical Infrastructures, vol. 13, no. 2/3, 2017, pp. 96-112.
  14. S. Ponomarev*, and T. Atkison, "Industrial Control System Network Intrusion Detection by Telemetry Analysis," IEEE Transaction on Dependable and Secure Computing, vol. 13, no. 2, 2016, pp. 252-260.
  15. P. Shao*, T. Atkison, N. Kraft, and R. Smith, "Combining Lexical and Structural Information for Static Bug Localization," International Journal of Advancements in Computing Technology, vol. 44, no. 1, 2012, pp. 61-71.
  16. J. Durand*, J. Flores*, N. Kraft, R. Smith, and T. Atkison, "Using Executable Slicing to Improve Rogue Software Detection Algorithms," International Journal of Secure Software Engineering, vol. 2. no. 2, 2011, pp. 53-64.
  17. R. J. Vickery, A. Cedilnik, J. P. Martin, Y. Dandass, T. Atkison, R. J. Moorhead, J. Clarke, and P. Adams, "Web-based Secure High Performance Remote Visualization," Journal of Physics: Computer Series 46, SciDAC 2006, pp. 545-549.

Conference Proceedings (reverse chronological order) (*denotes student co-author)

  1. S. Dasgupta*, M. Rahman, T. Atkison, C. Hollis, and S. Jones, "An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller," ASCE International Conference on Transportation and Development (ICTD 2022), Seattle WA, June 2022.
  2. S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Development and Evaluation of a Weighted Delay-Based Signal Control Algorithm for Connected and Non-Connected Vehicles," Transportation Research Board 2021 Annual Meeting, Washington DC, Jan 2021.
  3. N. Frissell, D. Joshi, V. Romanek, K. Collins, A. Montare, D. Kazdan, J. Gibbons, W. Engelke, T. Atkison, H. Kim, S. Cowling, T. McDermott, J. Ackermann, D. Witten, J. Madey, W. Silver, W. Liles, S. Cerwin, P. Erickson, E. Miller, J, Vierinen, “HamSCI Personal Space Weather Station (PSWS): Architecture and Current Status,” NSF CEDAR (Coupling, Energetics, and Dynamics of Atmospheric Regions), Virtual, June 2021.
  4. M. Lee*, B. Yang*, and T. Atkison, "802.11ac and p in a Simulated VANET Environment," The 2019 IEEE International Conference on Big Data, Los Angeles, CA, Dec 2019.
  5. M. McLeroy*, B. Hallihan*, B. Wright*, and T. Atkison, "Sustainable Mobility: Developing a Web-based Software Suite for Transportation and Traffic Analysis using Google Maps," The 17th International Conference on Software Engineering Research and Practice (SERP’19), Las Vegas, NV, July 2019, pages 29-35.
  6. L. Malis*, A. Payne*, M. McLeroy*, and T. Atkison, "Vehicle Crashes: Early Detection Through Image Recognition," The 23rd International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV’19), Las Vegas, NV, July 2019, pages 23-28.
  7. B. Hallihan*, M. McLeroy*, B. Wright*, and T. Atkison, "Using Isochrones to Examine NICU Availability in Rural Alabama," The 5th International Conference on Health Informatics and Medical Systems (HIMS’19), Las Vegas, NV, July 2019, pages 45-50.
  8. P. Sheinidashtegol*, A. Musaev, and T. Atkison, "Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters," SERVICES 2019 of SCF 2019, San Diego, CA, June 2019, pages 31-45.
  9. C. Wang*, A. Musaev, P. Sheinidashtegol*, and T. Atkison, "Towards Detection of Abnormal Vehicle Behavior Using Traffic Cameras," 2019 International Congress on Big Data, San Diego, CA, June 2019, pages 125-136. Best Paper Award
  10. T. Elliott*, A. Payne*, T. Atkison, and R. Smith, "Algorithms in Law Enforcement: Toward Optimal Patrol and Deployment Algorithms," The 17th International Conference on Information & Knowledge Engineering (IKE’18), Las Vegas, NV, July 2018.
  11. X. Zhao*, A. Payne*, and T. Atkison, "TTExtS: A Dynamic Framework to Reverse UML Sequence Diagrams from Execution Traces," The 16th International Conference on Software Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
  12. A. Lee*, A. Payne*, and T. Atkison, "A Review of Popular Reverse Engineering Tools from a Novice Perspective," The 16th International Conference on Software Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
  13. E. Caballero-Espinosa*, A. Payne*, and T. Atkison, "An Approach to Analyze Power Consumption on Apps for Android OS Based on Software Reverse Engineering," The 16th International Conference on Software Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
  14. N. Eisty*, A. Payne*, and T. Atkison, "Improving the Permission Model to Protect the Smartphone Users’ Privacy and Applying it on Android," The 2018 International Conference on Security and Management (SAM’18), Las Vegas, NV, July 2018.
  15. S. Jones, P. Jutte*, T. Atkison, and O. Musoni, "Understanding Healthcare Access in a Developing Country through Mapping - Two Case Studies in Rwanda," The 10th International Conference on African Development 2018, Kalamazoo, MI, August 2018.
  16. S. Haque*, J. Carver, and T. Atkison, "Causes, Impacts, and Detection Approaches of Code Smell: A Survey," The 2018 ACM Southeast Conference, Richmond, KY, March 2018.
  17. T. Willingham*, C. Henderson*, B. Kiel*, S. Haque*, and T. Atkison, "Testing Vulnerabilities in Bluetooth Low Energy," The 2018 ACM Southeast Conference, Richmond, KY, March 2018.
  18. V. Nakade*, A. Musaev, and T. Atkison, "Preliminary Research on Thesaurus-Based Query Expansion for Twitter Data Extraction," The 2018 ACM Southeast Conference, Richmond, KY, March 2018.
  19. S. Kim*, M. Keffeler*, T. Atkison, and A. Hainen, "Using Time Series Forecasting for Adaptive Traffic Signal Control," The 13th International Conference on Data Mining (DMIM'17), Las Vegas, NV, July 2017.
  20. M. Leeds*, M. Keffeler*, and T. Atkison, "Examining Features for Android Malware Detection," The 2017 International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  21. S. Haque*, M. Keffeler*, and T. Atkison, "An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling," The 2017 International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  22. B. Chen, K. Buck, C. Moore, C. Lawrence, J. Yeatts, and T. Atkison, "Granular Computing in Wineinformatics," The 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2017), Guilin, China, July 2017.
  23. A. Sainju* and T. Atkison, "An Experimental Analysis of Windows Log Events Triggered by Malware," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
  24. M. Leeds*, M. Keffeler* and T. Atkison, "A Comparison of Features for Android Malware Detection," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
  25. A. Mahaju* and T. Atkison, "Evaluation of Firefox Browser Forensics Tools," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
  26. A. Lee* and T. Atkison, "A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
  27. B. Chen, C. Rhodes, D. Fink, and T. Atkison, "Wineinformatics: Wine Regions Determined by K-Nearest Neighbor," SWDSI 2017 Annual Conference, Little Rock, AR, March 2017.
  28. M. Al-Zyoud*, T. Atkison, and J. Carver, "An Overview of Emerging Privacy Issues in the Internet of Things," The 2016 International Symposium on Internet of Things and Internet of Everything (CSCI-ISOT), Las Vegas, NV, December 2016.
  29. M. Leeds* and T. Atkison, "Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  30. S. Ponomarev* and T. Atkison, "Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  31. N. Wallace*, S. Semple*, and T. Atkison, "Identification of State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA," IEEE Power and Engineering Society General Meeting, National Harbor, MD, July 2014.
  32. N. Wallace*, S. Ponomarev*, and T. Atkison, " Identification of Compromised Power System State Variables," The 2014 International Conference on Information and Knowledge Engineering (IKE'14), Las Vegas, NV, July 2014. (26% acceptance)
  33. S. Ponomarev*, N. Wallace*, and T. Atkison, "Fourier Transform as Feature Extraction for Malware Classification," The 2014 International Conference on Security and Management (SAM'14), Las Vegas, NV, July 2014.
  34. S. Ponomarev*, N. Wallace*, and T. Atkison, "Detection of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014.
  35. N. Wallace*, S. Ponomarev*, and T. Atkison, "A Dimensional Transformation Scheme for Power Grid Cyber Event Detection," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014. Best Paper Award
  36. N. Wallace* and T. Atkison, "Detecting Cyber-Incidents in the Power Grid Using Principal Component Analysis," The 3rd Annual Graduate Research Conference College of Engineering and Science, Louisiana Tech University, October, 2013.
  37. S. Ponomarev*, J. Durand*, N. Wallace*, and T Atkison, " Evaluation of Random Projection for Malware Classification," The 7th International Conference on Software Security and Reliability, Washington, DC, June 2013.
  38. N. Wallace* and T. Atkison, "Observing Industrial Control System Attacks Launched Via Metaspliot Framework," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  39. J. Poore*, J. Flores*, and T. Atkison, "Evolution of Digital Forensics in Virtualization by Using Virtual Machine Introspection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  40. S. Semple*, S. Ponomarev*, J. Durand*, and T. Atkison, " Applying Static Analysis to High-Dimensional Malicious Application Detection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  41. J. Durand* and T. Atkison, "Applying Random Projection to the Classification of Malicious Applications using Data Mining Algorithms," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  42. J. Flores* and T. Atkison, "Evolution of Traditional Digital Forensics in Virtualization," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  43. J. Durand* and T. Atkison, "Using Randomized Projection Techniques to Aid in Detecting High-Dimensional Malicious Applications," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  44. J. Flores* and T. Atkison, "Digital Forensics on a Virtual Machine," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  45. M. Gates*, U. Dhital*, T. Lindsay*, and T. Atkison, "A Different Approach to Network Security: The Best Defense is a Good Offense," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  46. S. Kasimalla*, S. Bala*, T. Ahmen*, and T. Atkison, "GSM Security Threats and Countermeasures," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  47. H. Nuhait*, C. Sakpal*, and T. Atkison, "Securing a Wireless Network - WPA Attacked and Defended," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  48. H. May*, A. Dhungana*, J. Chen*, and T. Atkison, "Defending Against Cross Site Scripting," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  49. T. Atkison, "Aiding Prediction Algorithms in Detecting High- Dimensional Malicious Applications Using a Randomized Prediction Technique," The 48th ACM Southeast Conference, Oxford, MS, April 2010, ACM.
  50. B. Malone, T. Atkison, M. Kosa, and F. Hadlock, "Pedagogically Effective Effortless Algorithm Visualization with a PCIL," Frontiers in Education 39th Annual Conference, San Antonio, Texas, October 2009, IEEE.
  51. T. Atkison, "Applying Randomized Projection to aid Prediction Algorithms in Detecting High-Dimensional Rogue Applications," The 47th ACM Southeast Conference, Clemson, SC, March 2009, ACM.
  52. T. Atkison, "Using an Information Retrieval Technique to Discover Malicious Software," In the Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, June 2008, IIIS, pages 284-289.
  53. R. Vickery, A. Cedilnik, J. Martin, J. Fowler, R. Morehead, Y. Dandass, T. Atkison, P. Adams, and J. Clarke, "Web-based High Performance Remote Visualization," In the Proceedings of the 17th Annual Department of Defense High Performance Computing Modernization Program's (HPCMP) Users Group Conference, Pittsburgh, PA, June 2007, IEEE Computer Society.
  54. T. Atkison, K. Pensy, C. Nicholas, D. Ebert, R. Atkison, and C. Morris, "Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection," In Proceedings of the Third IEEE Eurographics Visualization Symposium, Ascona, Switzerland, May 2001, Springer, pages 283-290.
  55. L. Butler, T. Atkison, and E. Miller, "Comparing CPU Performance Between and Within Processor Families," In the Proceedings of the 25th Annual International Conference on Computer Measurement and Performance (CMG 2000), Orlando, FL, December 2000, pages 421-430.

Technical Reports and Other Publications (reverse chronological order)

  1. M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time Analysis of Hospital Access in Alabama," Poster, 19th Annual Rural Health Conference, Tuscaloosa, AL, 25-26 April 2018. 3rd Place Poster.
  2. M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time Analysis of Hospital Access in Alabama," Poster, SDITE Annual Meeting, Mobile, AL, 10 April 2018.
  3. R. Vickery, A. Cedilnik, J. Martin, Y. Dandass, T. Atkison, R. Moorhead, J. Clarke, and P. Adams, "Remote Visualization of Large Datasets," Invited Poster, SciDAC 2006 Conference, 25-29 June, Denver, CO.
  4. R. Vickery, A. Cedilnik, R. Moorhead, Y. Dandass, T. Atkison, and J. Martin, "WebVis Secure Communications Model and Preliminary Performance Study," RMV-KY5-001 Technical Report, 1 December 2005.
  5. T. Atkison, H. Kargupta, and C. Nicholas, "Dimensionality Reduction Using a Randomized Projection Algorithm: Preliminary Results," University of Maryland Baltimore County Technical Report TR-CS-01-11, September 2001.