Tutorials Presentations in International Conferences

  • S. Mukkamala. (2005) Network Defense Essentials. International Conference on Adaptive and Natural Computing Algorithms (ICANNGA).

  • S. Mukkamala. (2004) Short Tutorial on Malware Trends. IEEE International on Advances in Intelligent Systems Theory and Applications (AISTA).

  • S. Mukkamala, A. H. Sung (2004) Principles and Challenges in Network Defense. IEEE International Conference on Information Reuse and Integration.

  • S . Mukkamala, A. H. Sung (2004) Principles and Practices in Network Defense. IEEE International Conference on Computational Cybernetics (ICCC 2004).

  • A. H. Sung, S. Mukkamala, Ed. Paz (2004) Principles, Practices and Challenges in Information Security . IEEE International Conference on Information Technology (ITCC 04).

  • A. H. Sung, S. Mukkamala (2003) Information Security. 10 th International Conference on High Performance Computing (HiPC 2003).

  • A. H. Sung, S. Mukkamala (2003) Need for Information Assurance and Security. IEEE International Conference Systems, Man, and Cybernetics.

  • A. H. Sung, S. Mukkamala (2003) Information Assurance. Proceedings of the Third International Conference on Intelligent Systems Design and Applications (ISDA 03).

Invited Talks

  • S. Mukkamala (2006) Research Trends in Cyber Security. Sathyabama Institute of Technology, Chennai.

  • S. Mukkamala (2006) Cyber Protect. Annual Coalition of Educators for Native American Children Professional Development rally (Problem Solving the Native Way).

  • S. Mukkamala (2005) Cyber Defense Strategies and Network Security Hard Problems. Siddhartha Engineering College, Vijayawada.

  • S. Mukkamala (2005) Network Security and Enterprise Information Security Audits. Information Systems Audit and Control Association and National Association of Software and Service Companies India, Mumbai.

  • S. Mukkamala (2005) Information Assurance and Current Network Security Research Hard Problems. Vellore Institute of Technology, Chennai.

  • S. Mukkamala (2005) Attack Taxonomies and Cyber Defense Strategies. ITT Albuquerque Campus.

  • S. Mukkamala (2005) The New Golden Age: Transforming Education Through Technology: Coalition of Educators for Native American Children, and the BIA Office of Indian Education. (Attended by 300 Teachers, administrators, network administrators, technology coordinators, and business managers nationwide).

  • S. Mukkamala (2005) New Mexico Statewide Information Security Forum (Attended by about 200 State Employees, Researchers, and Industry Participants).

  • S. Mukkamala (2004) Principles and Practices of Network Defense. Luna Community College. Presented to participants form underrepresented schools, minority serving community colleges and a minority serving university.

  • S. Mukkamala (2004) Principles and Practices of Information Security. Coalition of Educators for Native American Children (CENAC). Presented for 12 Pueblos Schools.

  • S. Mukkamala (2004) Information Security and Awareness. 6 th Annual Coalition of Educators for Native American Children Professional Development rally (Transition through Technology).

  • S. Mukkamala, A. H. Sung (2004) Is Information Security a Myth? City of Socorro Rotary Club Meeting.

  • Mukkamala. (2004) Cyber Crime. Home Ministry Government of Andhra Pradesh, C.I.D. (Briefed Senior I.P.S. Officers).

  • S. Mukkamala. (2003) Digital Forensics. Home Ministry Government of Andhra Pradesh (Briefed Senior I.P.S. Officers).

  • S. Mukkamala. (2002) Law Enforcement Challenges in Cyber Crime. Central Bureau of Investigation (Briefed Senior I.P.S. Officers).

  • S. Mukkamala (2003) Information Assurance and Security Awareness. City of Socorro Councilors Meeting.

  • Srinivas Mukkamala, Andrew H. Sung (2002) Audit Data Reduction Using Neural Networks and Support Vector Machines. Digital Forensics Research Workshop, August 7-9, Syracuse University, Center for Systems Assurance. (Plenary Talk).

Briefings

  • S. Mukkamala (2006) Information Assurance and Computational Methods for Computational Analysis of Cyber Terrorism on the U.S. (CACTUS).

  • S. Mukkamala (2005) Detecting Foreign and Malicious Code in Commercial of the Shelf Software COTS. Senior Executive Academic Liaison (SEAL).

  • S. Mukkamala, A. H. Sung (2005) Malware Analysis and Coordinated Distribute Multiple Attacks.

  • S. Mukkamala along with Chris Byrnes of Gartner (2005) Panel Discussion on Enterprise Security. New Mexico Information Security Forum.

  • S. Mukkamala, A. H. Sung, T. Hall (2004) Panel Discussion on New Mexico Enterprise Security Architecture. New Mexico Cyber Security Summit.

  • S. Mukkamala (2004) Information Security and Assurance Challenges: a Government Perspective. Briefing to the Legislators of New Mexico Information Technology Oversight Committee (ITOC).

  • S. Mukkamala (2004) Recent State Break-in: NMT Team Analysis and Assessment Report. Briefing to the Legislators of New Mexico Information Technology Oversight Committee (ITOC).

  • S. Mukkamala, A. H. Sung. (2004) New Mexico Tech (NMT) IA Capabilities. Presented to New Mexico Chief Information Technology Office.

  • S. Mukkamala, A. H. Sung (2004) Feasibility Study (with respect to information assurance) on New Mexico Voter Registration and Election Management System (VERMS). Office of the Secretary of State of New Mexico.

  • A. H. Sung, S. Mukkamala (2004) Obfuscation Attacks on Security Technologies. Presented to Defense Information Systems Agency (DISA).

  • S. Mukkamala (2004). Distributed Agent Based IDS. Accenture.

  • S. Mukkamala (2003) Distributed Detection of Stealthy Probes.

  • S. Mukkamala (2003) Modeling Intrusion Detection Systems (Learning Machines Perspective).

  • S. Mukkamala (2003) Distributed Agent Based IDS. Centers of Academic Excellence in Information Assurance Education ( CAE/IAE).

  • S. Mukkamala (2003) Information Assurance Research at Tech. SEAL .

  • S. Mukkamala (2000) Mobile Agent Security. Institute for Complex Additive System Analysis (ICASA).

University Outreach

  • S. Mukkamala (2006) Today’s Computer Networks with Respect to Cyber Security.

  • S. Mukkamala (2005) Information Assurance Research at Tech. Research Day at Tech.

  • S. Mukkamala (2005) Safe Computing at Your School. Engineering Weekend New Mexico Tech.

  • S. Mukkamala (2004) Malware: Viruses, Worms, Trojans, etc. Fall Exploration Day at Tech.

  • S. Mukkamala (2004). Computer Science and Information Technology Research Opportunities. Spring Exploration Day at Tech.

  • S. Mukkamala (2004) Computer Attacks (The Dark Side of Computers). Research Day at Tech.

  • S. Mukkamala (2004) Need for Information Assurance. NASA Young Ambassadors Program.

  • S. Mukkamala (2003) Information Assurance. Fall Exploration Day at Tech.

  • S. Mukkamala (2003) Judge New Mexico Science Olympiad.

  • S. Mukkamala (2003) Judge New Mexico Science and Engineering Fair.

  • S. Mukkamala (2003) Steganography Techniques. Spring Exploration Day at Tech.

  • S. Mukkamala and S. Ball (2003) Carrier less Steganography Demonstration. Science Olympiad.

  • S. Mukkamala (2003) Code Book Steganography. Research Day at Tech.

  • S. Mukkamala (2003) Malware Analysis. New Mexico Tech.

  • S. Mukkamala (2003) Model Selection and Featuring Ranking Issues in Building Intrusion Detection Systems. Sathyabama Engineering College. ( Chennai, India)

  • S. Mukkamala (2002) Judge New Mexico Science Olympiad

  • S. Mukkamala (2002) Machine Learning Techniques for Computer Security. Indian Institute of Information Technology (IIIT). ( Hyderabad, India)

  • S. Mukkamala (2002) Intrusion Detection Systems. Sathyabama Engineering College. (Chennai, India)

  • S. Mukkamala (2002) Information Assurance. Indian Institute of Technology (IIT). (Kanpur, India)

  • S. Mukkamala (2002) Information Assurance. New Mexico Tech.

Conference Presentations

  • S. Mukkamala, Qingzhong Liu, R. Veeraghattam, A. H. Sung (2005) Computational Intelligent Techniques for Tumor Classification (Using Micro array Gene Expression Data). Proceedings of World Congress on Lateral Computing (WCLC 2005) . ( Bangalore, India)

  • J. Xu, A. H. Sung, Q. Liu, S. Mukkamala (2005) Fraud Detection System Based on Behavior Mining and Anomaly Detection. Proceedings of Second Indian International Conference on Artificial Intelligence (IICAI 2005). ( Pune, India)

  • S . Mukkamala, A. H. Sung, R. Veeraghattam, A. S. Vieira, J. C. Neves (2005) Are Neural Networks the Best Classifiers for Bankruptcy Detection?. Proceedings of The Twelth International Conference on Neural Information Processing (ICONIP). (Taipie, Taiwan)

  • S. Mukkamala, A. H. Sung, R. Veeraghattam (2005) Classification Models For Intrusion Detection Systems. Proceedings of 2nd International Conference on Intelligent Knowledge Systems (IKS-2005). (Istanbul, Turkey)

  • S . Mukkamala, B. Ribeiro, A. H. Sung. (2005) Model Selection for Kernel Based Intrusion Detection Systems . International Conference on Adaptive and Natural Computing Algorithms (ICANNGA). ( Coimbra, Portugal)

  • A. H. Sung, J. Xu, P. Chavez, S. Mukkamala (2004) Static Analyzer for Vicious Executables (SAVE). 20 th Annual Computer Security Applications Conference (ACSAC) . ( Tucson, USA)

  • S. Mukkamala, A. H. Sung (2004) Coordinated Distributed Multi Attacks (CDMA). IEEE International on Advances in Intelligent Systems Theory and Applications. ( Luxembourg)

  • S. Mukkamala, A. H. Sung (2004) A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach). IEEE International Conference Systems, Man, and Cybernetics. (The Hague, Netherlands)

  • T. Xie, A. H. Sung, S. Mukkamala, Q. Liu (2004) Reactive Tamper Detection for Image Authentication. Fourth International Conference on Intelligent Systems Design and Applications. ( Budapest, Hungary)

  • S. Mukkamala, A. H. Sung, A. Abraham (2004) Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE). ( Ottawa, Canada)

  • S. Mukkamala, A H. Sung (2004) Computational Intelligent Techniques for Detecting Denial of Service Attacks. 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE). ( Ottawa, Canada)

  • M. Paprzycki, A. Abraham, R. Guo, S. Mukkamala. (2004) Data Mining Approach for Analyzing Call Center Performance. 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE). (nominated as best paper). ( Ottawa, Canada)

  • A. H. Sung, J. Xu, K. Ramamurthy, P. Chavez, S. Mukkamala, T. Sulaiman, T. Xie (2004) Static Analyzer for Vicious Executables (SAVE). Presented in Work-in-progress Section of IEEE Symposium on Security and Privacy. ( Berkley, USA)

  • A. H. Sung, G. K. Tadiparthi, S. Mukkamala (2004) Defeating the Current Steganlytic Techniques ( Robust Steganography). International Conference on Information Technology. ( Las Vegas, USA)

  • S. Mukkamala, A. H. Sung, A. Abraham (2003) Distributed Multi-Intelligent Agent Frame Work for Detection of Stealthy Probes. International Conference on Hybrid Intelligent Systems. ( Melbourne, Australia)

  • S. Mukkamala, A. H. Sung (2003) Artificial Intelligent Techniques for Intrusion Detection. IEEE International Conference Systems, Man, and Cybernetics. ( Washington D.C., USA)

  • S. Mukkamala, A. H. Sung. (2003) A Distributed Agent Based IDS for Stealthy Probe Detection. First Indian International Conference on Artificial Intelligence (IICAI 2003) , pp. 413-422. (Nominated as Best Paper). ( Hyderabad, India)

  • S. Mukkamala, A. H. Sung (2003) Soft Computing Techniques for Intrusion Detection. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University. ONR and AFSOR Sponsored Workshop on Intrusion Detection. (Fair Fax, USA)

  • S. Mukkamala, A. H. Sung (2003) A Comparative Study of Techniques for Intrusion Detection. 15 th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003). ( Sandiago, USA)

  • S. Mukkamala, A. H. Sung, A. Abraham (2003) Intrusion Detection Using Ensemble of Soft Computing Paradigms . Third International Conference on Intelligent Systems Design and Applications. ( Tulsa, USA)

  • G. K. Tadiparthi, S. Mukkamala, A. H. Sung (2003) A Steganography Database. Digital Forensics Research Workshop. ( Cleveland, USA)

  • S. Mukkamala, A. H. Sung (2003) Detecting Denial of Service Attacks Using Support Vector Machines. IEEE International Conference on Fuzzy Systems (IEEE FUZZ). ( St. Louis, USA)

  • A. H. Sung, S. Mukkamala (2003) Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. International Symposium on Applications and the Internet Technology (SAINT). ( Orlando, USA)

  • A. H. Sung, S. Mukkamala (2003) Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines. 82nd Annual Meeting of the Transportation Research Board (of the National Academies). ( Washington D.C., USA)

  • S. Mukkamala, A. H. Sung (2002) Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. Second International Conference on Hybrid Intelligent Systems. ( Santiago, Chile)

  • S. Mukkamala, A. H. Sung (2002) I dentifying Key Features for Intrusion Detection Using Neural Networks. 15 th International Conference on Computer Communications. ( Mumbai, India)

  • S. Mukkamala, A. H. Sung (2002) Learning machines for Intrusion Detection: Support Vector Machines and Neural Networks. International Conference on Security and Management. ( Las Vegas, USA)

  • S. Mukkamala, A. H. Sung (2002) Feature ranking and Selection for Intrusion detection Systems. International Conference on Information and Knowledge Engineering . ( Las Vegas, USA)

  • S. Mukkamala, A. H. Sung (2002) Comparison of Neural Networks and Support Vector Machines in Intrusion Detection. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University. ( Baltimore, USA)

  • S. Mukkamala, G. Janoski, A. H. Sung (2002) Intrusion Detection Using Neural Networks and Support Vector Machines. IEEE International Joint Conference on Neural Networks (IJCNN). ( Honolulu, USA)

  • S. Mukkamala, G. Janowski, A. H. Sung. (2001) Intrusion Detection Using Neural Networks and Support Vector Machines. International Conference on Hybrid Intelligent Systems (HIS). ( Adelaide, Australia)

  • G. Janoski, N. Benslimame, S. Mukkamala, and A. Sung. (2001) Using Neural Networks for System Security Monitoring. International Conference Intelligent Systems and Control. ( Tampa, Florida)

 





Locations of visitors to this page