Recent team publications:
Improving Machine Uptime and Utilization Akshay Guthal, Silvia Caceres, Braeden Callis, Jacob King, Brandon Wallerson, in collaboration with Northrop Grumman. Poster, QUEST Honors Program Conference, Spring 2018 Best Poster Award at conference.
Creating an ISO 9001 Quality Management System, Dennis Chen, Taylor Joyce, Julia Roh, Devin Rosen, in collaboration with Avatar. Poster, QUEST Honors Program Conference, Spring 2018
The Complete Framework of Disruptive Innovations, Mohammed Alghaffari, Snider Undergraduate Research Experience Program. Poster, Undergraduate Research Day, UMCP, April 25, 2018.
An Application of Jeeves for Honeypot Sanitization, Ashton Webster (University of Maryland and RSAC Security Scholar), Abstract and Poster, RSA Conference, San Francisco, CA (April 16-20, 2018).
Fast and Service-preserving Recovery from Malware Infections Using CRIU, Ryan Eckenrod (University of Maryland and RSAC Security Scholar), Abstract and Poster, RSA Conference, San Francisco, CA (April 16-20, 2018).
Improving the User Experience of Authentication, Rohan Bajaj, Chloe Berman, Alyssa Hu, Sam Lewando, Julia Lomakina, in collaboration with Caterpillar. Poster, QUEST Honors Program Conference, Fall 2017. Both Best Project Award and Best Poster Award at conference.
Financial Data Extraction and Classification Prediction, Pete Dziki, Bobby Ellett, Christian Johnson, Jeremy Krach, in collaboration with Bloomberg. Poster, QUEST Honors Program Conference, Spring 2017. Best Project Award at conference.
Dynamic Reconfiguration: A Model for Cyber Subterfuge and Active Defense, Christian Johnson (University of Maryland and RSAC Security Scholar), Abstract and Poster, RSA Conference, San Francisco, CA (February 13-17, 2017). Also: Christian gave an interview while at RSA and described his experiences at the event.
A Comparison of Transfer Learning Algorithms for Defect and Vulnerability Detection, Ashton Webster (University of Maryland), CS Technical Report CS-TR-5053, (February 8, 2017).
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models, Jeffrey Stuckman (University of Maryland), James Walden (Northern Kentucky University) and Riccardo Scandariato (Chalmers University of Technology and the University of Gothenburg), IEEE Transactions on Reliability, (December 2016).
IT Network Security Metrics, Justin Kelman, Neha Kundagrami, Anthony Prus, Linda Yau, in in collaboration with Thales Defense and Security. Poster, QUEST Honors Program Conference, Fall 2016.
Optimizing an Application for a Mobile Platform, Jay Huang, Ben Sheppard, Andrew Lee, Chintan Patel, in collaboration with Lockheed Martin Corporation. Poster, QUEST Honors Program Conference, Spring 2016.
Continuous, Effort-Aware Prediction of Software Security Defects, Jeffrey Stuckman, Doctoral Dissertation, University of Maryland (2015).
Democratizing Facial Recognition with Google Glass. J. Krach. University of Maryland Computer Science Department Technical Report CS-TR-5045 (September 14, 2015).
Assessing learning outcomes in a multidisciplinary program. J. Herrmann, K. King, P. Armstrong and J. Purtilo. Lilly International Spring Conference on Evidenced-based teaching and learning, Bethesda, MD (May 28-31, 2015).
Predicting Vulnerable Components: Software Metrics vs Text Mining. J. Walden, J. Stuckman and R. Scandariato. Proceedings of IEEE International Symposium on Software Reliability Engineering, Naples, Italy (November 2014). This work received the award for Best Research Paper at ISSRE. Congratulations to Jeff Stuckman and his co-authors.
Mining security vulnerabilities from Linux distribution metadata. J. Stuckman and J. Purtilo. Proceedings of 2nd IEEE International Workshop on Reliability and Security Data Analysis, Naples, Italy (November 2014).
Differences in quantitative assessment of myocardial scar and gray zone by LGE-CMR imaging using established gray zone protocols. O. Mesubi, K. Ego-Osuala, J. Jeudy, J. Purtilo, S. Synowski, A. Abutaleb, M. Niekoop, M. Abdulghani, R. Asoglu, V. See, A. Saliaris, S. Shorofsky, T. Dickfeld. The International Journal of Cardiovascular Imaging, DOI 10.1007/s10554-014-0555-0 (October 2014)
Evaluating software product metrics with synthetic defect data. J. Stuckman, K. Wills and J. Purtilo. Proceedings of 7th International Symposium on Empirical Software Engineering and Measurement, Baltimore, MD (October 10-11, 2013) Congratulations to Jeff Stuckman and Kent Wills for winning the award for Best Short Paper at this meeting.
BugBox: A vulnerability corpus for PHP web applications. G. Nilson, K. Wills, J. Stuckman and J. Purtilo. Proceedings of 6th USENIX Workshop on Cyber Security Experimentation and Test, Washington, DC, (August 12, 2013)
Baloo: Personal informatics for decision making. E. K. Smith and J. Purtilo. Proceedings of CHI 2013 Workshop on Personal Informatics in the Wild, Paris, France, (April 27-28, 2013)
Identification of Conducting Channels by Delayed Enhanced Cardiac Magnetic Resonance Imaging. O. Mesubi, M. Jeudy K. Ego-Osuala, Purtilo J, et al. Proceedings of the 2012 American Heart Association Conference, Los Angeles (November 2012)
Comparing and applying attack surface metrics. J. Stuckman and J. Purtilo. Proceedings of 4th International Workshop on Security Measurements and Metrics, Lund, Sweden (September 2012)
A testbed for the evaluation of web intrusion prevention systems. J. Stuckman and J. Purtilo. Proceedings of 3rd International Workshop on Security Measurements and Metrics, Banff, CA (September 2011)
Analyzing the Wikisphere: Methodology and Data to Support Quantitative Wiki Research. J. Stuckman and J. Purtilo. Journal of the American Society for Information Science and Technology, vol. 62, pp. 1564-1576, (August 2011)