Dr. Travis Atkison - Publications

Assistant Professor

Computer Science


Journal Proceedings | Conference Proceedings | Technical Reports and Other Publications


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or distributed without the explicit permission of the copyright holder.

Note that the definitive versions of all published papers appearing here are those that actually appeared in print. In some cases, the versions presented here may differ in minor ways. When citing any published papers provided here, please reference the published versions.



Journal Proceedings (reverse chronological order)

  1. B. Chen, H. Le, T. Atkison, and D. Che, "A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges," Transactions on Machine Learning and Data Mining, 2016. (Accepted)
  2. S. Ponomarev, and T. Atkison, "Feature Extraction Optimization for Network Intrusion Detection in Control System Networks," Journal of Information Security and Applications, 2016. (Submitted)
  3. N. Wallace and T. Atkison, "A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection," Journal of Digital Forensics, Security and Law, 2016. (Submitted)
  4. N. Wallace, and T. Atkison, "On the Detection of Cyber-Events in the Grid Using PCA," International Journal of Critical Infrastructures, 2016. (Accepted)
  5. S. Ponomarev, and T. Atkison, "Industrial Control System Network Intrusion Detection by Telemetry Analysis," IEEE Transaction on Dependable and Secure Computing, vol. 13, no. 2, 2016, pp. 252-260.
  6. P. Shao, T. Atkison, N. Kraft and R. Smith, "Combining Lexical and Structural Information for Static Bug Localization," International Journal of Advancements in Computing Technology, vol. 44, no. 1, 2012, pp. 61-71.
  7. J. Durand, J. Flores, N. Kraft, R. Smith and T. Atkison, "Using Executable Slicing to Improve Rogue Software Detection Algorithms," International Journal of Secure Software Engineering, vol. 2. no. 2, 2011, pp. 53-64.
  8. R. J. Vickery, A. Cedilnik, J. P. Martin, Y. Dandass, T. Atkison, R. J. Moorhead, J. Clarke, and P. Adams, "Web-based Secure High Performance Remote Visualization," Journal of Physics: Computer Series 46, SciDAC 2006, pp. 545-549.

Conference Proceedings (reverse chronological order)

  1. B. Chen, C. Rhodes, D. Fink, and T. Atkison, "Wineinformatics: Wine Regions Determined by K-Nearest Neighbor," SWDSI 2017 Annual Conference, Little Rock, AR, March 2017.
  2. M. Al-Zyoud, T. Atkison, and J. Carver, "An Overview of Emerging Privacy Issues in the Internet of Things," The 2016 International Symposium on Internet of Things and Internet of Everything (CSCI-ISOT), Las Vegas, NV, December 2016.
  3. M. Leeds, and T. Atkison, "Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  4. S. Ponomarev, and T. Atkison, "Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  5. N. Wallace, S. Semple, and T. Atkison, "Identification of State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA," IEEE Power and Engineering Society General Meeting, National Harbor, MD, July 2014.
  6. N. Wallace, S. Ponomarev, and T. Atkison, " Identification of Compromised Power System State Variables," The 2014 International Conference on Information and Knowledge Engineering (IKE'14), Las Vegas, NV, July 2014. (26% acceptance)
  7. S. Ponomarev, N. Wallace, and T. Atkison, "Fourier Transform as Feature Extraction for Malware Classification," The 2014 International Conference on Security and Management (SAM'14), Las Vegas, NV, July 2014.
  8. S. Ponomarev, N. Wallace, and T. Atkison, "Detection of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014.
  9. N. Wallace, S. Ponomarev, and T. Atkison, "A Dimensional Transformation Scheme for Power Grid Cyber Event Detection," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014. Best Paper Award
  10. N. Wallace and T. Atkison, "Detecting Cyber-Incidents in the Power Grid Using Principal Component Analysis," The 3rd Annual Graduate Research Conference College of Engineering and Science, Louisiana Tech University, October, 2013.
  11. S. Ponomarev, J. Durand, N. Wallace and T Atkison, " Evaluation of Random Projection for Malware Classification," The 7th International Conference on Software Security and Reliability, Washington, DC, June 2013.
  12. N. Wallace and T. Atkison, "Observing Industrial Control System Attacks Launched Via Metaspliot Framework," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  13. J. Poore, J. Flores and T. Atkison, "Evolution of Digital Forensics in Virtualization by Using Virtual Machine Introspection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  14. S. Semple, S. Ponomarev, J. Durand and T. Atkison, " Applying Static Analysis to High-Dimensional Malicious Application Detection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  15. J. Durand and T. Atkison, "Applying Random Projection to the Classification of Malicious Applications using Data Mining Algorithms," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  16. J. Flores and T. Atkison, "Evolution of Traditional Digital Forensics in Virtualization," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  17. J. Durand and T. Atkison, "Using Randomized Projection Techniques to Aid in Detecting High-Dimensional Malicious Applications," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  18. J. Flores and T. Atkison, "Digital Forensics on a Virtual Machine," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  19. M. Gates, U. Dhital, T. Lindsay and T. Atkison, "A Different Approach to Network Security: The Best Defense is a Good Offense," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  20. S. Kasimalla, S. Bala, T. Ahmen and T. Atkison, "GSM Security Threats and Countermeasures," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  21. H. Nuhait, C. Sakpal and T. Atkison, "Securing a Wireless Network - WPA Attacked and Defended," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  22. H. May, A. Dhungana, J. Chen and T. Atkison, "Defending Against Cross Site Scripting," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
  23. T. Atkison, "Aiding Prediction Algorithms in Detecting High- Dimensional Malicious Applications Using a Randomized Prediction Technique," The 48th ACM Southeast Conference, Oxford, MS, April 2010, ACM.
  24. B. Malone, T. Atkison, M. Kosa, and F. Hadlock, "Pedagogically Effective Effortless Algorithm Visualization with a PCIL," Frontiers in Education 39th Annual Conference, San Antonio, Texas, October 2009, IEEE.
  25. T. Atkison, "Applying Randomized Projection to aid Prediction Algorithms in Detecting High-Dimensional Rogue Applications," The 47th ACM Southeast Conference, Clemson, SC, March 2009, ACM.
  26. T. Atkison, "Using an Information Retrieval Technique to Discover Malicious Software," In the Proceedings of the 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, June 2008, IIIS, pages 284-289.
  27. R. Vickery, A. Cedilnik, J. Martin, J. Fowler, R. Morehead, Y. Dandass, T. Atkison, P. Adams and J. Clarke, "Web-based High Performance Remote Visualization," In the Proceedings of the 17th Annual Department of Defense High Performance Computing Modernization Program's (HPCMP) Users Group Conference, Pittsburgh, PA, June 2007, IEEE Computer Society.
  28. T. Atkison, K. Pensy, C. Nicholas, D. Ebert, R. Atkison and C. Morris, "Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection," In Proceedings of the Third IEEE Eurographics Visualization Symposium, Ascona, Switzerland, May 2001, Springer, pages 283-290.
  29. L. Butler, T. Atkison, and E. Miller, "Comparing CPU Performance Between and Within Processor Families," In the Proceedings of the 25th Annual International Conference on Computer Measurement and Performance (CMG 2000), Orlando, FL, December 2000, pages 421-430.

Technical Reports and Other Publications (reverse chronological order)

  1. R. Vickery, A. Cedilnik, J. Martin, Y. Dandass, T. Atkison, R. Moorhead, J. Clarke and P. Adams, "Remote Visualization of Large Datasets," Invited Poster, SciDAC 2006 Conference, 25-29 June, Denver, CO.
  2. R. Vickery, A. Cedilnik, R. Moorhead, Y. Dandass, T. Atkison and J. Martin, "WebVis Secure Communications Model and Preliminary Performance Study," RMV-KY5-001 Technical Report, 1 December 2005.
  3. T. Atkison, H. Kargupta and C. Nicholas, "Dimensionality Reduction Using a Randomized Projection Algorithm: Preliminary Results," University of Maryland Baltimore County Technical Report TR-CS-01-11, September 2001.