Dr. Travis Atkison - Publications
Associate Professor
Computer Science
Cyber Security Program Director
This material is presented to ensure timely dissemination of scholarly and technical
work. Copyright and all rights therein are retained by authors or by other copyright holders.
All persons copying this information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may not be reposted or
distributed without the explicit permission of the copyright holder.
Note that the definitive versions of all published papers appearing here are those
that actually appeared in print. In some cases, the versions presented here may differ
in minor ways. When citing any published papers provided here, please reference the
published versions.
Journal Proceedings (reverse chronological order) (*denotes student co-author)
- A. Renninger*, S. Noman*, T. Atkison, and J. Sussman*, "Live Intersection
Data Acquisition for Traffic Simulators," Sensors, 2024. (Accepted)
- H. May* and T. Atkison, "Wormhole Attack Mitigation in Wireless Network
Using Propagation Delay," Journal of Cybersecurity Education, Research
and Practice, 2023. (Accepted)
- K. Ovabor* and T. Atkison, "User-Centric Privacy Control in Identity Management
and Access Control within Cloud-based Systems," International Journal on
Cybernetics and Informatics (IJCI), vol. 12, no. 7, 2023, pp. 59-71.
- S. Noman* and T. Atkison, "Techniques to Overcome Network Attacks (Sybil
Attack, Jamming Attack, Timing Attack) in VANET," The Journal of The Colloquium
for Information Systems Security Education, vol. 10, no. 1, 2023, pp. 7.
- H. Al Ani, Q. Al Maatouk, S. Noman*, and T. Atkison, "A Survey of IEEE
802.15.6: Body Area Networks," International Journal of Computing and Digital
Systems, vol. 14, no. 1, 2023, pp. 691-705.
- H. Al Ani, Q. Al Maatouk, S. Noman*, and T. Atkison, "Internet of Things
Communication, Networking, and Security: A Survey," International Journal of
Computing and Digital Systems, vol. 13, no. 1, 2023, pp. 923-936.
- C. Wang*, T. Atkison, and H. Park*, "Dynamic Adaptive Vehicle Re-routing
Strategy for Traffic Congestion Mitigation of Grid Network," International
Journal of Transportation Science and Technology, 2023.
- B. Yang*, M. Kuai*, P. Subedi*, A. Libde, X. Hong, T. Atkison, and A. Hainen,
"Vehicle-Crowd for Vehicular Fog Computing: An Empirical Study," SSRN Electronic
Journal, 2022.
- S. Talukder*, E. Tedla, A. Hainen, and T. Atkison, "Analytical and Empirical
Evaluation of Freight Priority System in Connected Vehicle Environment," Journal
of Transportation Engineering, Part A: Systems, vol. 148, no. 6, 2021.
- Z. Dong*, T. Atkison, and B. Chen, "Wineinformatics: Using the Full Power
of the Computational Wine Wheel to Understand 21st Century Bordeaux Wines From
the Reviews," Beverages, 2020, vol. 7, no. 1, 2021, article 3.
- S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Trajectory-Based
Signal Control in Mixed Connected Vehicle Environments," Journal of Transportation
Engineering, Part A: Systems, vol. 147, no. 5, 2021, pp. 1-13.
- M. Lee* and T. Atkison, "VANET Applications: Past, Present, and Future,"
Vehicular Communications, vol. 28, no. 1, 2021, pp. 1-14.
- N. Islam*, S. Talukder*, A. Hainen, and T. Atkison, "Characterizing Co-modality
in Urban Transit Systems from a Passengers' Perspective," Public Transport,
vol. 12, no. 2, 2020, pp. 405-430.
- J. Palmer*, V. Sheng*, T. Atkison, and B. Chen, "Classification on Grade,
Price, and Region with Multi-Label and Multi-Target Methods in Wineinformatics,"
Big Data Mining and Analytics, vol. 4, no. 1, 2020, pp. 1-12.
- B. Chen, V. Velchev*, J. Palmer*, and T. Atkison, "Wineinformatics: A
Quantitative Analysis of Wine Reviewers," Fermentation, vol. 4, no. 4, 2018, pp. 82-98.
- S. Haque* and T. Atkison, "A Forensic Enabled
Data Provenance Model for Public Cloud," Journal of Digital Forensics, Security and
Law, vol. 13, no. 3, 2018, article 7.
- T. Atkison, S. Ponomarev*, R. Smith, and B. Chen, "
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks,"
International Journal of Network Security (IJNS), vol. 20, no. 5, 2018, pp. 853-861.
- S. Haque* and T. Atkison, "An Evolutionary Approach of Attack Graph to Attack Tree
Conversion," International Journal of Computer Network and Information Security
(IJCNIS), vol. 9, no. 11, 2017, pp. 1-16.
- B. Chen, H. Le, T. Atkison, and D. Che, "A Wineinformatics Study for White-box
Classification Algorithms to Understand and Evaluate Wine Judges," Transactions on
Machine Learning and Data Mining, vol. 10, no. 1, 2017, pp. 3-24.
- N. Wallace* and T. Atkison, "A Power Grid Incident Identification Based on Physically
Derived Cyber-Event Detection," Journal of Digital Forensics, Security and Law, vol. 12,
no. 2, 2017, pp. 5-18.
- N. Wallace*, and T. Atkison, "On the Detection of Cyber-Events in the Grid Using PCA,"
International Journal of Critical Infrastructures, vol. 13, no. 2/3, 2017, pp. 96-112.
- S. Ponomarev*, and T. Atkison, "Industrial Control System Network Intrusion Detection
by Telemetry Analysis," IEEE Transaction on Dependable and Secure Computing, vol. 13,
no. 2, 2016, pp. 252-260.
- P. Shao*, T. Atkison, N. Kraft, and R. Smith, "Combining Lexical and Structural Information
for Static Bug Localization," International Journal of Advancements in Computing
Technology, vol. 44, no. 1, 2012, pp. 61-71.
- J. Durand*, J. Flores*, N. Kraft, R. Smith, and T. Atkison, "Using
Executable Slicing to Improve Rogue Software Detection Algorithms," International Journal
of Secure Software Engineering, vol. 2. no. 2, 2011, pp. 53-64.
- R. J. Vickery, A. Cedilnik, J. P. Martin, Y. Dandass, T. Atkison, R. J. Moorhead,
J. Clarke, and P. Adams, "Web-based Secure High
Performance Remote Visualization," Journal of Physics: Computer Series 46, SciDAC
2006, pp. 545-549.
Conference Proceedings (reverse chronological order) (*denotes student co-author)
- K. Ovabor* and T. Atkison, "Exploring Firefly and Greywolf Algorithms for
Multiobjective Optimization in Wireless Sensor Networks," The 2024 ACM Southeast
Conference, Kennesaw, GA, Mar 2024.
- S. Noman*, T. Atkison, M. Irfan*, and M. Rahman, "A Predictive Approach for
Sybil Attack Detection for a Waiting Time-Based Adaptive Traffic Signal Controller,"
Transportation Research Board 2023 Annual Meeting, Washington DC, Jan 2024.
- C. Wang*, T. Atkison and Q. Duan*, "Advancing Short-term Traffic Congestion
Prediction: Exploring Learning-based Methodologies and Navigating Their Challenges,"
The 2023 International Conference on Applied Intelligence, Guangxi, China, Dec 2023.
- K. Ovabor*, A. Adams-Momoh, and T. Atkison, "Cybersecurity-enhanced Gamebased
Learning for Clinical Decision-Making: A Comparative Study," 2nd International Conference
on Education, Pedagogy and Technology (EDUPT 2023), Zurich, Switzerland, Nov 2023.
- C. Wang* and T. Atkison, "Mathematical Treatment for Real-Time Vehicle Recognition
Using Traditional Road Surveillance Cameras," Proceedings of the Future Technologies
Conference (FTC) 2023, Volume 3, San Francisco CA, Nov 2023.
- S. Muhammad*, M. Rahman, T. Atkison, S. Dasgupta*, and A. Hainen, "Reinforcement
Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected
Transportation Systems," Transportation Research Board 2023 Annual Meeting, Washington
DC, Jan 2023.
- S. Noman* and T. Atkison, "Techniques to Overcome Network Attacks (Sybil Attack,
Jamming Attack, Timing Attack) in VANET," The 26th Colloquium for Information Systems
Security Education, online, Nov 2022.
- S. Dasgupta*, M. Rahman, T. Atkison, C. Hollis, and S. Jones, "An
Innovative Attack Modelling and Attack Detection Approach for a Waiting
Time-based Adaptive Traffic Signal Controller," ASCE International Conference
on Transportation and Development (ICTD 2022), Seattle WA, June 2022.
- S. Talukder*, A. Lidbe, E. Tedla, A. Hainen, and T. Atkison, "Development
and Evaluation of a Weighted Delay-Based Signal Control Algorithm for Connected
and Non-Connected Vehicles," Transportation Research Board 2021 Annual Meeting,
Washington DC, Jan 2021.
- N. Frissell, D. Joshi, V. Romanek, K. Collins, A. Montare, D. Kazdan, J. Gibbons,
W. Engelke, T. Atkison, H. Kim, S. Cowling, T. McDermott, J. Ackermann, D. Witten,
J. Madey, W. Silver, W. Liles, S. Cerwin, P. Erickson, E. Miller, J, Vierinen, “HamSCI
Personal Space Weather Station (PSWS): Architecture and Current Status,” NSF CEDAR
(Coupling, Energetics, and Dynamics of Atmospheric Regions), Virtual, June 2021.
- M. Lee*, B. Yang*, and T. Atkison, "802.11ac and p in a Simulated VANET
Environment," The 2019 IEEE International Conference on Big Data, Los Angeles,
CA, Dec 2019.
- M. McLeroy*, B. Hallihan*, B. Wright*, and T. Atkison, "Sustainable Mobility:
Developing a Web-based Software Suite for Transportation and Traffic Analysis using
Google Maps," The 17th International Conference on Software Engineering Research and
Practice (SERP’19), Las Vegas, NV, July 2019, pages 29-35.
- L. Malis*, A. Payne*, M. McLeroy*, and T. Atkison, "Vehicle Crashes: Early Detection
Through Image Recognition," The 23rd International Conference on Image Processing, Computer
Vision, and Pattern Recognition (IPCV’19), Las Vegas, NV, July 2019, pages 23-28.
- B. Hallihan*, M. McLeroy*, B. Wright*, and T. Atkison, "Using Isochrones to Examine
NICU Availability in Rural Alabama," The 5th International Conference on Health Informatics
and Medical Systems (HIMS’19), Las Vegas, NV, July 2019, pages 45-50.
- P. Sheinidashtegol*, A. Musaev, and T. Atkison, "Investigating Personally Identifiable
Information Posted on Twitter Before and After Disasters," SERVICES 2019 of SCF 2019,
San Diego, CA, June 2019, pages 31-45.
- C. Wang*, A. Musaev, P. Sheinidashtegol*, and T. Atkison, "Towards Detection of
Abnormal Vehicle Behavior Using Traffic Cameras," 2019 International Congress on
Big Data, San Diego, CA, June 2019, pages 125-136. Best Paper Award
- T. Elliott*, A. Payne*, T. Atkison, and R. Smith, "Algorithms in Law
Enforcement: Toward Optimal Patrol and Deployment Algorithms," The 17th
International Conference on Information & Knowledge Engineering (IKE’18),
Las Vegas, NV, July 2018.
- X. Zhao*, A. Payne*, and T. Atkison, "TTExtS: A Dynamic Framework to Reverse
UML Sequence Diagrams from Execution Traces," The 16th International Conference
on Software Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
- A. Lee*, A. Payne*, and T. Atkison, "A Review of Popular Reverse Engineering
Tools from a Novice Perspective," The 16th International Conference on Software
Engineering Research & Practice (SERP’18), Las Vegas, NV, July 2018.
- E. Caballero-Espinosa*, A. Payne*, and T. Atkison, "An Approach to Analyze
Power Consumption on Apps for Android OS Based on Software Reverse Engineering,"
The 16th International Conference on Software Engineering Research & Practice (SERP’18),
Las Vegas, NV, July 2018.
- N. Eisty*, A. Payne*, and T. Atkison, "Improving the Permission Model to Protect
the Smartphone Users’ Privacy and Applying it on Android," The 2018 International
Conference on Security and Management (SAM’18), Las Vegas, NV, July 2018.
- S. Jones, P. Jutte*, T. Atkison, and O. Musoni, "Understanding Healthcare
Access in a Developing Country through Mapping - Two Case Studies in Rwanda," The
10th International Conference on African Development 2018, Kalamazoo, MI, August 2018.
- S. Haque*, J. Carver, and T. Atkison, "Causes, Impacts, and Detection Approaches
of Code Smell: A Survey," The 2018 ACM Southeast Conference, Richmond, KY, March 2018.
- T. Willingham*, C. Henderson*, B. Kiel*, S. Haque*, and T. Atkison, "Testing
Vulnerabilities in Bluetooth Low Energy," The 2018 ACM Southeast Conference,
Richmond, KY, March 2018.
- V. Nakade*, A. Musaev, and T. Atkison, "Preliminary Research on Thesaurus-Based
Query Expansion for Twitter Data Extraction," The 2018 ACM Southeast Conference,
Richmond, KY, March 2018.
- S. Kim*, M. Keffeler*, T. Atkison, and A. Hainen, "Using Time Series Forecasting
for Adaptive Traffic Signal Control," The 13th International Conference on Data
Mining (DMIM'17), Las Vegas, NV, July 2017.
- M. Leeds*, M. Keffeler*, and T. Atkison, "Examining Features for Android Malware
Detection," The 2017 International Conference on Security and Management (SAM'17),
Las Vegas, NV, July 2017.
- S. Haque*, M. Keffeler*, and T. Atkison, "An Evolutionary Approach of Attack Graphs
and Attack Trees: A Survey of Attack Modeling," The 2017 International Conference
on Security and Management (SAM'17), Las Vegas, NV, July 2017.
- B. Chen, K. Buck, C. Moore, C. Lawrence, J. Yeatts, and T. Atkison, "Granular
Computing in Wineinformatics," The 2017 13th International Conference on Natural
Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2017), Guilin, China,
July 2017.
- A. Sainju* and T. Atkison, "An Experimental Analysis of Windows Log Events Triggered
by Malware," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- M. Leeds*, M. Keffeler* and T. Atkison, "A Comparison of Features for Android Malware
Detection," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- A. Mahaju* and T. Atkison, "Evaluation of Firefox Browser Forensics Tools," The 2017
ACM Southeast Conference, Kennesaw, GA, April 2017.
- A. Lee* and T. Atkison, "A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and
Future Suggestions," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
- B. Chen, C. Rhodes, D. Fink, and T. Atkison, "Wineinformatics: Wine Regions Determined
by K-Nearest Neighbor," SWDSI 2017 Annual Conference, Little Rock, AR, March 2017.
- M. Al-Zyoud*, T. Atkison, and J. Carver, "An Overview of Emerging Privacy Issues in the
Internet of Things," The 2016 International Symposium on Internet of Things and Internet
of Everything (CSCI-ISOT), Las Vegas, NV, December 2016.
- M. Leeds* and T. Atkison, "Preliminary Results of Applying Machine Learning Algorithms
to Android Malware Detection," The 2016 International Symposium on Mobile Computing,
Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
- S. Ponomarev* and T. Atkison, "Session Duration Based Feature Extraction for Network
Intrusion Detection in Control System Networks," The 2016 International Symposium on
Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV,
December 2016.
- N. Wallace*, S. Semple*, and T. Atkison, "Identification of
State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA," IEEE
Power and Engineering Society General Meeting, National Harbor, MD, July 2014.
- N. Wallace*, S. Ponomarev*, and T. Atkison, "
Identification of Compromised Power System State Variables," The 2014 International
Conference on Information and Knowledge Engineering (IKE'14), Las Vegas, NV, July 2014.
(26% acceptance)
- S. Ponomarev*, N. Wallace*, and T. Atkison, "Fourier
Transform as Feature Extraction for Malware Classification," The 2014 International
Conference on Security and Management (SAM'14), Las Vegas, NV, July 2014.
- S. Ponomarev*, N. Wallace*, and T. Atkison, "Detection
of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis," The 9th
Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014.
- N. Wallace*, S. Ponomarev*, and T. Atkison, "A Dimensional
Transformation Scheme for Power Grid Cyber Event Detection," The 9th Cyber and
Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014. Best
Paper Award
- N. Wallace* and T. Atkison, "Detecting Cyber-Incidents in the Power Grid Using Principal
Component Analysis," The 3rd Annual Graduate Research Conference College of Engineering
and Science, Louisiana Tech University, October, 2013.
- S. Ponomarev*, J. Durand*, N. Wallace*, and T Atkison, "
Evaluation of Random Projection for Malware Classification," The 7th International
Conference on Software Security and Reliability, Washington, DC, June 2013.
- N. Wallace* and T. Atkison, "Observing Industrial
Control System Attacks Launched Via Metaspliot Framework," The 51st ACM Southeast
Conference, Savannah, GA, April 2013.
- J. Poore*, J. Flores*, and T. Atkison, "Evolution of Digital Forensics in Virtualization by
Using Virtual Machine Introspection," The 51st ACM Southeast Conference, Savannah, GA,
April 2013.
- S. Semple*, S. Ponomarev*, J. Durand*, and T. Atkison, "
Applying Static Analysis to High-Dimensional Malicious Application Detection," The 51st
ACM Southeast Conference, Savannah, GA, April 2013.
- J. Durand* and T. Atkison, "Applying Random Projection
to the Classification of Malicious Applications using Data Mining Algorithms," The
50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
- J. Flores* and T. Atkison, "Evolution of Traditional Digital Forensics in Virtualization,"
The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
- J. Durand* and T. Atkison, "Using Randomized Projection
Techniques to Aid in Detecting High-Dimensional Malicious Applications," The 49th
ACM Southeast Conference, Kennesaw, GA, March 2011.
- J. Flores* and T. Atkison, "Digital Forensics on a
Virtual Machine," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
- M. Gates*, U. Dhital*, T. Lindsay*, and T. Atkison, "A Different Approach to Network Security:
The Best Defense is a Good Offense," The 3rd Cyberspace Research Workshop, Shreveport,
LA, November 2010.
- S. Kasimalla*, S. Bala*, T. Ahmen*, and T. Atkison, "GSM Security Threats and Countermeasures,"
The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- H. Nuhait*, C. Sakpal*, and T. Atkison, "Securing a Wireless Network - WPA Attacked and
Defended," The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- H. May*, A. Dhungana*, J. Chen*, and T. Atkison, "Defending Against Cross Site Scripting,"
The 3rd Cyberspace Research Workshop, Shreveport, LA, November 2010.
- T. Atkison, "Aiding Prediction Algorithms in Detecting High-
Dimensional Malicious Applications Using a Randomized Prediction Technique," The 48th ACM
Southeast Conference, Oxford, MS, April 2010, ACM.
- B. Malone, T. Atkison, M. Kosa, and F. Hadlock, "Pedagogically
Effective Effortless Algorithm Visualization with a PCIL," Frontiers in Education
39th Annual Conference, San Antonio, Texas, October 2009, IEEE.
- T. Atkison, "Applying Randomized Projection to aid
Prediction Algorithms in Detecting High-Dimensional Rogue Applications," The 47th ACM
Southeast Conference, Clemson, SC, March 2009, ACM.
- T. Atkison, "Using an Information Retrieval
Technique to Discover Malicious Software," In the Proceedings of the 12th World
Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, June 2008,
IIIS, pages 284-289.
- R. Vickery, A. Cedilnik, J. Martin, J. Fowler, R. Morehead, Y. Dandass, T. Atkison,
P. Adams, and J. Clarke, "Web-based High Performance
Remote Visualization," In the Proceedings of the 17th Annual Department
of Defense High Performance Computing Modernization Program's (HPCMP) Users Group
Conference, Pittsburgh, PA, June 2007, IEEE Computer Society.
- T. Atkison, K. Pensy, C. Nicholas, D. Ebert, R. Atkison, and C. Morris, "Case Study: Visualization and Information Retrieval Techniques
for Network Intrusion Detection," In Proceedings of the Third IEEE Eurographics
Visualization Symposium, Ascona, Switzerland, May 2001, Springer, pages 283-290.
- L. Butler, T. Atkison, and E. Miller, "Comparing CPU
Performance Between and Within Processor Families," In the Proceedings of the 25th
Annual International Conference on Computer Measurement and Performance (CMG 2000),
Orlando, FL, December 2000, pages 421-430.
Technical Reports and
Other Publications (reverse chronological order)
- L. Tucker, T. Atkison, "Identifying Roadside Assets Using Machine Learning," The
University of Alabama, Undergraduate Research and Creative Activity Conference,
Tuscaloosa, AL, 2024.
- C. Nguyen, N. Frissell, W. Engelke, A. Liddle, N. Muscalino, T, Atkison, R. Boedicker,
K. Collins, J. Gibbons, and D. Kazdan, "Data Collection and Visualization of the HanSCI
Grape High Frequency Doppler Observations for the 2023 and 2024 North American Solar
Eclipses," Poster at CEDAR, 2023.
- S. Sarah, T. Atkison, "Parking Lot Utilization Using Commodity Hardware and Software,"
The University of Alabama, Undergraduate Research and Creative Activity Conference,
Tuscaloosa, AL, 2023.
- A. Liddle, B. Engelke, and T. Atkison, "Personal Space Weather Station Software
Development," The University of Alabama, Undergraduate Research and Creative Activity
Conference, Tuscaloosa, AL, 2023.
- S. Sarah, T. Atkison, "Parking Lot Utilization Using Commodity Hardware and Software,"
The University of Alabama, Undergraduate Research and Creative Activity Conference,
Tuscaloosa, AL, 2022. 2nd Place Computer Science, MIS
- N. Muscolino, A. Liddle, and T. Atkison, "Personal Space Weather Station Software
Development," The University of Alabama, Undergraduate Research and Creative Activity
Conference, Tuscaloosa, AL, 2022. 1st Place Computer Science, MIS
- R. Weas, S. Al Ani, J. Sussman, and T. Atkison, "Designing a Scalable Architecture
for Live Traffic Data Collection Using IoT Devices," The University of Alabama, Undergraduate
Research and Creative Activity Conference, Tuscaloosa, AL, 2021.
- H. Li, A. Hainen, J. Sturdevant, T. Atkison, S. Talukder, J, Mathew, D. Bullock, D. Nelson,
D. Maas, J. Fink, and T. Stiles, "Indiana Traffic Signal Hi Resolution Data Logger," Indiana
Department of Transportation and Purdue University, West Lafayette, Indiana, 2019.
- L. Malis, A. Payne, and T. Atkison, "Vehicle Crashes: Early Detection through Image
Recognition," The University of Alabama, Undergraduate Research and Creative Activity
Conference, Tuscaloosa, AL, 2019.
- B. Wright, B. Hallihan, and T. Atkison, "Using Isochrones to Examine Healthcare Availability
in Rural Alabama," The University of Alabama, Undergraduate Research and Creative Activity
Conference, Tuscaloosa, AL, 2019. 1st Place Engineering, Transportation, and Energy
- M. McLeroy, M. Keffeler, and T. Atkison, "Sustainable Mobility: Developing a Web-based
Software Suite for Transportation and Traffic Analysis," The University of Alabama, Undergraduate
Research and Creative Activity Conference, Tuscaloosa, AL, 2019. 1st Place Computer
Science, MIS, Cybersecurity, and Statistics
- A. Payne, T. Atkison, "Increasing Optical Character Recognition by Adding Localization
Algorithms," The University of Alabama, Undergraduate Research and Creative Activity
Conference, Tuscaloosa, AL, 2019.
- M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time
Analysis of Hospital Access in Alabama," Poster, 19th Annual Rural Health
Conference, Tuscaloosa, AL, 25-26 April 2018. 3rd Place Poster.
- M. McNamara, A. Hainen, S. Jones, and T. Atkison, "Route-Based Travel Time
Analysis of Hospital Access in Alabama," Poster, SDITE Annual Meeting,
Mobile, AL, 10 April 2018.
- A. Payne, T. Atkison, "Increasing Optical Character Recognition by Adding
Localization Algorithms," The University of Alabama, Undergraduate Research and
Creative Activity Conference, Tuscaloosa, AL, 2018.
- R. Vickery, A. Cedilnik, J. Martin, Y. Dandass, T. Atkison, R. Moorhead, J. Clarke,
and P. Adams, "Remote Visualization of Large
Datasets," Invited Poster, SciDAC 2006 Conference, 25-29 June, Denver, CO.
- R. Vickery, A. Cedilnik, R. Moorhead, Y. Dandass, T. Atkison, and J. Martin, "WebVis
Secure Communications Model and Preliminary Performance Study," RMV-KY5-001 Technical
Report, 1 December 2005.
- T. Atkison, H. Kargupta, and C. Nicholas, "Dimensionality
Reduction Using a Randomized Projection Algorithm: Preliminary Results," University of
Maryland Baltimore County Technical Report TR-CS-01-11, September 2001.