Studnet Projects
Student Researchers at Penn State University
Joseph Gualdoni (Student with SRA major) Research Assistant since June 2016
Research Interests: Cyber-security, Cloud Security, Network SecurityPublications:Andrew Kurtz, Joseph Gualdoni, Syed Rizvi, Megan Wheeler, and Ilva Myzyri, “Secure Online Transaction Algorithm,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (PDF)
Joseph Gualdoni, Andrew Kurtz, Syed Rizvi, Ilva Myzyri, and Megan Wheeler, “Multi-Layer Defense Model for Securing Online Financial Transactions,” 2017 IEEE International Conference on Software Security and Assurance, pp. 75-79, July 24 - 25, 2017, Altoona PA. (PDF)
Hannah Roddy, Ilva Myzyri, Syed Rizvi, and Joseph Gualdoni, “Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third Party Auditor,” Volume 114, 2017, Pages 83-92, 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (PDF)
Ray Zimmerman, Syed Rizvi, Sarah Hoover, Joseph Gualdoni, Andrew Kurtz, “Taint Flow Analysis to Improve Android Application Security.” To 33rd Annual Regional Conference in Cooperation with ACM SIGCSE, Volume 33 Issue 3, Pages 83-97, January 2018 , Muhlenberg College, Allentown, PA. (PDF)
Lamjed Zahrouni, Dayton Blackwood, Syed Rizvi, and Joseph Gualdoni, “Preventing Identity Theft Using Biometrics based Authentication System,” 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1-6, October 11 - 13, 2017, Amman, Jordan. (PDF).
Jonathan Willett (Student with SRA major)Research Assistant since June 2016
Research Interests: Cyber-security, Automobile Security, Big DataPublications:Syed Rizvi , Jonothan Willet, Donte Perino, Chandler Condo, “A Threat to Vehicular Cyber Security and the Urgency for Correction,” Volume 114, 2017, Pages 100-105, 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (PDF)
Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder and Seth Marasco,"Protecting an Automobile Network Using Distributed Firewall System," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (PDF).
Syed Rizvi and Jonathan Willett. 2017. A new hybrid security program for securing automobile networks: poster session. J. Comput. Sci. Coll. 32, 3 (January 2017), 77-77.(PDF)
Syed Rizvi, Jonathan Willet, Tyler Vasbinder, Donte Perino and Seth Marasco, “Hybrid Security System – An Innovative Scheme to Protect Automotive Networks,” 2nd International Conference on Software Security and Assurance (ICSSA 2016), St. Pölten, Austria, August 24-25 2016. Accepted/Presented
Joseph Pfeffer (Student with SRA major)Research Assistant since June 2016
Research Interests: Cloud Security, IoT Security, Cyber-security
Publications:
Andrew Kurtz, Joseph Pfeffer, and Syed Rizvi, “Securing the Internet of Things (IoT): A Security Taxonomy and Dashboard,” To 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), submitted June 2017.
Syed Rizvi, Trent Bolish and Joseph Pfeffer, "Security Evaluation of Cloud Service Providers Using Third Party Auditors," 2nd International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (PDF)
Andrew Kurtz (Student with SRA major)Research Assistant since June 2016Research Interests: Cyber-security, Cloud Security, Network SecurityPublications:Andrew Kurtz, Joseph Gualdoni, Syed Rizvi, Megan Wheeler, and Ilva Myzyri, “Secure Online Transaction Algorithm,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (PDF)
Ray Zimmerman, Syed Rizvi, Sarah Hoover, Joseph Gualdoni, Andrew Kurtz, “Taint Flow Analysis to Improve Android Application Security.” To 33rd Annual Regional Conference in Cooperation with ACM SIGCSE, Volume 33 Issue 3, Pages 83-97, January 2018 , Muhlenberg College, Allentown, PA. (PDF)
Joseph Gualdoni, Andrew Kurtz, Syed Rizvi, Ilva Myzyri, and Megan Wheeler, “Multi-Layer Defense Model for Securing Online Financial Transactions,” 2017 IEEE International Conference on Software Security and Assurance, pp. 75-79, July 24 - 25, 2017, Altoona PA. (PDF)
Gabriel Labrador (Student with SRA major)Research Assistant (fall 2015 to June 2016)
Research Interests: Cloud Security, Network Security Publications:Syed Rizvi, Gabriel Labrador, Matt Guyan and Jeremy Savan, “Advocating for Hybrid Intrusion Detection Prevention System and Framework Improvement,” Procedia Computer Science (2016) pp. 369-374, 21 Sep 2016. (PDF).
Syed Rizvi, Gabriel Labrador, Whitney Hernandez, Kelsey Karpinski, “Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices. Security,” Privacy and Reliability in Computer Communications and Network, The River Publishers Series in Communications. Published.
Whitney Hernandez (Graduated with the BS in SRA)Research Assistant (fall 2015 to June 2016)
Research Interests: Cloud Security, Network Security Publications:Syed Rizvi, Gabriel Labrador, Whitney Hernandez, Kelsey Karpinski, “Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices. Security,” Privacy and Reliability in Computer Communications and Network, The River Publishers Series in Communications. Published.
Katie Cover (Graduated with the BS in SRA)Information Security Auditor II FIS fisglobal.comCollegeville, PAPublications:Syed Rizvi, Abdul Razaque, and Katie Cover, “Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.” accepted to The 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), November 3 - 5, New York USA. (PDF)
Syed Rizvi, Abdul Razaque and Katie Cover, "Cloud Data Integrity Using a Designated Public Verifier," in 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pp.1361-1366, 24-26 Aug. 2015. (PDF). doi: 10.1109/HPCC-CSS-ICESS.2015.277
Syed Rizvi, Katie Cover and Chris Gates, “'A Trusted Third-Party (TTP) Based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment,” 2014 Complex Adaptive Systems, Procedia Computer Science, vol. 36, pp. 381 – 386, November 2014. (PDF)
John Mitchell (Graduated with the BS in SRA)
Cyber Risk Advisor at Deloitte and Touche LLP
New York City, New York
Publications:
Syed S. Rizvi and John K. Mitchell "A New Access Control Scheme for Protecting Distributed Cloud Services and Resources", Services Transactions on Cloud Computing (STCC), 4(3), 2016, pp. 28-41. (PDF)
Syed Rizvi, Nathan Showan, and John Mitchell, “Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking,” To Complex Adaptive Systems 2015, San Jose CA, November 2-4, 2015. (accepted).
John Mitchell, Syed Rizvi, and Jungwoo Ryoo, "A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider," To 2015 The 1st International Conference on Software Security and Assurance (ICSSA'15), July 27, 2015, Sungkyunkwan University, Korea. (accepted & presented)
Diamond Fair, Jaren Schugar, Syed Rizvi, Tyler Milewski, Scott Swetkowski, John Mitchell, "A DMZ based Authentication Scheme for Securing Cloud Environment," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2014), December –12-14, 2014.
Syed Rizvi, John Mitchell, and Nathan Showan. Analysis of Security Vulnerabilities and Threat Assessment in Cognitive Radio (CR) Networks. The 8th International Conference on Application of Information and Communication Technologies (AICT2014), Kazakhstan, Astana, 15-17 October 2014. (PDF)
John Regola, John Mitchell, Brandon Baez, and Syed Rizvi, “Analyzing the Security Susceptibilities of Biometrics Integrated With Cloud Computing," Securing Cloud-Based Databases with Biometric Applications, Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 194 – 211, October 2014. Book Link
John Mitchell and Syed Rizvi, “A Framework for Leveraging Cloud Computing to Facilitate Biometrics,” 2014 International Conference on Security and Management (SAM'14), pp. 344 – 350, Las Vegas, USA, July 21 - 24.(PDF)
Student Researchers at University of Bridgeport
Following are the graduate students who have completed their Master thesis or project under my advising.
1- M. A. Khan
M.S. student in Computer Science & Engineering Department (Graduated)
Email: mustafak@bridgeport.edu
Web: www.bridgeport.edu/~mustafak
Research Area: Mobile Ad Hoc Networks (MANET), Network Security, and Information Theory
Papers:
Syed S. Rizvi, Aasia Riasat, Mustafa Khan, and Khaled M. Elleithy, “The Worst and Best Case Capacity Analysis of Mobile Ad Hoc Networks (MANET) using a 3-Phase Algorithm,” Proceeding of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks, pp. 594 – 596, San Francisco Bay Area, June 16-20, 2008.(PDF).
Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Active Scanning: A Better Approach to Reduce Handover Time at MAC Layer for Wireless Networks,” Proceedings of the IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, Karachi, Pakistan, February 17-18, 2009. (PDF)
Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Deterministic Formulization of Bandwidth Efficiency for Multicast Systems, ”Proceedings of the IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, Karachi, Pakistan, February 17-18, 2009. (PDF)
Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, “A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 275 – 279, Springer, 2010, ISBN: 978-90-481-3662-9. (PDF)
Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, “A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 293 – 298, Springer, 2010, ISBN: 978-90-481-3662-9.(PDF)
2-M. S. Rashid
M.S. student in Computer Science & Engineering Department (Graduated)
Email: muhammsi@bridgeport.edu
Web: www.bridgeport.edu/~muhammsi
Research Area: Packet and circuit switching networks, high performance computing, and reconfigurable hardware
Thesis Title: Design and Implementation of Performance and Speed up models for Reconfigurable Hardware and Systems (Currently working)
Papers:
Muhammad S. Rashid, Syed S. Rizvi, and Aasia Riasat, "A New Methodology for Efficient Traffic Management in ATM Networks for ATM Switching Systems," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008. (PDF)
Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “Bandwidth Problem in High Performance Packet Switching Network,” Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 512 – 515, Springer 2008, ISBN: 978-1-4020-8736-3. (PDF) (Audio Presentation)
Muhammad S. Rashid, Syed S. Rizvi, and Aasia Riasat, "A New Methodology for an Efficient Congestion Control in High Performance Packet Switching Networks," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008. (PDF)
Muhammad S. Rashid, Syed S. Rizvi, and Aasia Riasat, "A New Efficient 3-Phase Algorithm for Performing Capacity Analysis of Mobile Ad Hoc Networks (MANET)," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008.(PDF)
Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “An Efficient Scheme for Traffic Management in ATM Networks,” Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 516 – 518, Springer 2008, ISBN: 978-1-4020-8736-3 (PDF)(Audio Presentation)
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, “Analytical and Speedup Models for Performance Evaluation of a Generic Reconfigurable Coprocessor (RC) Architecture,” ASEE Zone I Conference 2008, United States Military Academy, West Point, NY, March 28 – 29, 2008.(PDF)
3- M. R. Qureshi
Kelsey Karpinski (Graduated with BS in SRA)Solution Manager at Atos (http://atos.ne/en-us/home.html)Publications:
Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker. A User Oriented Cloud Security Evaluation Framework, International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 3, No. 2, 2015. (PDF).
Syed Rizvi, Kelsey Karpinski, Abdul Razaque. Novel Architecture of Self-organized Mobile Wireless Sensor Networks, Journal of Computing Science and Engineering, Vol. 9, No. 4, December 2015, pp. 163-176. (PDF)
Syed Rizvi, Kelsey Karpinski, Taryn Walker, and Brennen Kelly, “Utilizing Third Party Auditing to Manage Trust in the Cloud,” Complex Adaptive Systems 2015, Volume 61, 2015, Pages 191–197, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.192
Nathan Showan (Undergrad Research Assistant)Penn State, University Park Campus
Publications:
Syed Rizvi, Nathan Showan, and John Mitchell, “Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking,” To Complex Adaptive Systems 2015, San Jose CA, November 2-4, 2015. (accepted).
Syed Rizvi, John Mitchell, and Nathan Showan. Analysis of Security Vulnerabilities and Threat Assessment in Cognitive Radio (CR) Networks. The 8th International Conference on Application of Information and Communication Technologies (AICT2014), Kazakhstan, Astana, 15-17 October 2014. (PDF)
Syed S. Rizvi and Nathan D. Showan, “A Generic Layered Modeling for Cognitive Radio Networks,” In proceeding of the 2014 Spring Simulation Multi-Conference (SpringSim'14), April 13-16, 2014. Tampa, FL, USA.(PDF)
Syed Rizvi and Nathan Showan. “Bandwidth and End-to-End Delay Analysis of IP and End System Multicast (ESM).” Network Security Conference (FloCon 2014), Charleston, South Carolina, on January 13–16, 2014. (Poster-Presentation)
Syed Rizvi and Nathan Showan. A Framework to Facilitate Modeling of a Cognitive Radio Networks Using Layered Architecture. 2014 IEEE 17th International Multi-Topic Conference (INMIC). Karachi - Pakistan. December 08 - 10, 2014. (accepted but not presented).
M.S. student in Computer Science & Engineering Department (Graduated)
Email: majidals@bridgeport.edu
Research Area: Dynamic System, Parallel and Distributed Networks, Web based agent design for distributed networks.
Thesis Title: Dynamic Semantics of the Web: Useful Toll for the New Generation Agent-Based Software
Papers:
Aasia Riasat, Syed S. Rizvi, Faraz Arain, Rizwan M. Qureshi, “Dynamic Semantics of the Web: Useful Toll for the New Generation Agent-Based Software,” Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, pp. 542 – 547, Springer 2008, ISBN: 978-1-4020-8738-7.(PDF) (Audio Presentation)
4- M. A. Jafri
Research Area: Ad Hoc Networks, Routing protocols, Mobile Networks, Distributed and Parallel networks
Thesis Title: Optimizing the performance of Conservative Discrete-Event Simulation System for parallel networks.
Papers:
Majid Jafri, Syed S. Rizvi, Laiali Almazaydeh, and Aasia Riasat. A New Scheme for Improving Route Discovery and Route Maintenance for Mobile Ad Hoc Networks (MANET). International Journal of Information Science and Computer Engineering, Vol. 2, No. 1, pp. 36–41, 2011.
Syed S. Rizvi, Majid A. Jafri, and Khaled Elleithy, “A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET),” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 269 – 274, Springer, 2010, ISBN: 978-90-481-3662-9.(PDF)
5- M. Jasim M.S. student in Computer Science & Engineering Department (Graduated)
Email: mjasim@bridgeport.edu
Research Area: Parallel and distributed systems, computer networks.
Thesis Title: Optimistic algorithms for parallel systems.
6- Ravi Patnam
M.S. student in Electrical Engineering(Graduated)
Email: rpatnam@bridgeport.edu
Research Area: Wireless and mobile communications, Bluetooth technology, RFID.
Thesis Title: Design of Transceiver for an Efficient USB Device
7- Shalini Potham
M.S. student in Computer Science and Engineering Department (Graduated)
Email: spotham@bridgeport.edu
Research Area: Parallel and distributed systems, optimistic algorithm
Thesis Title: A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems
Papers:
Shalini Potham, Syed S. Rizvi, Aasia Riasat, and Khaled Elleithy. Use of Matrix in GVT Computation for Optimistic Time Wrap Algorithm. Engineering Letters (to be appeared in 2011).
Syed S. Rizvi, Shalini Poathan, and Khaled M. Elleithy, “A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems, “Advanced Techniques in Computing Sciences and Software Engineering, pp. 589 – 593, Springer, 2010, ISBN:978-90-481-3659-9.[PDF]
8- Faraz Arain
M.S. student in Computer Science & Engineering Department (Graduated)
Email: farain@bridgeport.edu
Research Area: Modeling and simulation of complex dynamic systems, Multicluster systems and grids computing, scheduling problem and load balancing in cluster
Thesis Title: An Architecture and Message Filtering Protocol for Location-Aware Mobile Advertising
Papers:
Syed S. Rizvi, Aasia Riasat, and Faraz Arain, ”Innovative Glass-Box Approach: A Better Way to Enhance Learning of Complex Dynamic Systems,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28-29. (PDF)
Aasia Riasat, Syed S. Rizvi, Faraz Arain, Rizwan M. Qureshi, “Dynamic Semantics of the Web: Useful Toll for the New Generation Agent-Based Software,” Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, pp. 542 – 547, Springer 2008, ISBN: 978-1-4020-8738-7.
Aasia Riasat, Syed S. Rizvi, Farheen Zehara, and Faraz Arain, “The Role of System Dynamics in Learning Environments,” Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, pp. 538 – 541, Springer 2008, ISBN: 978-1-4020-8738-7. (PDF)
Former Student Researchers: Following are the graduate students who have conducted research and published papers with me while they were taking my courses in University of Bridgeport.
M.S. student in Computer Science Email: vedla@bridgeport.eduResearch Area: Performance optimization of mobile Ad Hoc Networks
Papers:
Syed S. Rizvi,Saroj Poudyal, Varsha Edla, and Ravi Nepal, “A Novel Approach for Creating Trust to Reduce Malicious Behavior in MANET,” Proceedings of the 2007 ACM CoNEXT conference, Columbia University, New York, NY, December 10 -13, 2007. [PDF] (Video Presentation)
Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks,” Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics, pp. 526 – 531, Springer 2008, ISBN: 978-1-4020-8736-3. [PDF] (Audio Presentation)
Syed S. Rizvi and Varsha Edla, "REPU-TRUST Algorithm: An Efficient way for Minimizing the Malicious Behavior of Mobile Nodes in Ad Hoc Networks," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Varsha Edla, Syed S. Rizvi, and Aasia Riasat, "Bit Error Rate (BER) Analysis of Synchronous DSCDMA Multiuser Receivers," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008.
Varsha Edla, Syed S. Rizvi, and Aasia Riasat, "A New Software Based Approach for Minimizing Interference in RFID Application," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008.
Varsha Edla and Syed S. Rizvi, "REPU-TRUST Algorithm: An Efficient way for Minimizing the Malicious Behavior of Mobile Nodes in Ad Hoc Networks," the 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, University of Maryland, College Park, MD, March 27-29, 2008.
M.S. student in Computer Science Email: avekaria@bridgeport.eduResearch Area: Routing protocols for MANET
Papers:
Ashish Vekaria and Syed S. Rizvi, "A New Efficient Routing Approach for Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
4-Varsha Edla
M.S. student in Computer Science Email: kpatel@bridgeport.eduResearch Area: Resource optimization of sensor networks
Papers:
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing the Energy Consumption”, Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics, pp. 520 – 525, Springer 2008, ISBN: 978-1-4020-8736-3. [PDF] (Audio Presentation)
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, and Khaled M. Elleithy, ”An Approach to Reduce the Energy Consumption in Wireless Sensor Networks through Active Nodes Optimization,” 2007 NEW ENGLAND AMERICAN SOCIETY FOR ENGINEERING EDUCATION CONFERENCE,April 20-21, 2007 [PDF].
3-Ashish Vekaria
1-Jalpa Bani M.S. student in Computer Science Email: jbani@bridgeport.eduResearch Area: Network SecurityPapers:
Jalpa Bani and Syed S. Rizvi, "A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack," International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No.1, 2009.
Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 399-404, April 24-26, 2008.[PDF]
Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm to Prevent Cache Timing Attack,” ASEE Zone I Conference 2008, United States Military Academy, West Point, NY, March 28 – 29, 2008.[PDF]
2-Khushboo Patel