Douglas H. Summerville Conferences

  • J. Feng, Y. Chen, D. Summerville, and Z. Su, "An Extension of RDP Code with Parallel Decoding Procedure," the 9th IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012.
  • J. Feng, Y. Chen, and D. Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011.
  • J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, “Enhancing Cloud Storage Security against Roll-back Attacks with a New Fair Multi-Party Non-Repudiation Protocol”, the 8 th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC’11), short position paper, Las Vegas, Nevada, USA, January 9 - 12, 2011.
  • J. Feng, Y. Chen, D. Summerville, "EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation," the 33rd IEEE Sarnoff Symposium, Princeton, NJ, USA, Apr. 12-14, 2010.
  • Nnamde Nwanze, Sun-il Kim, D. Summerville, “Payload Modeling for Network Intrusion Detection Systems,” in Proceedings of the IEEE Military Communications Conference (MILCOM) 2009, Boston, MA, Oct 18-21, 2009.
  • H. Chen, D. Summerville, and Y. Chen, “Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation,” Proceedings of the 7th International Workshop on Design of Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October 25 – 28, 2009.
  • N. Nwanze, D. Summerville, “Detection of Anomalous Network Packets using Lightweight Stateless Payload Inspection,” Proc. of the Fourth IEEE LCN Workshop on Network Security (WNS 2008), Oct. 2008. Winner of Best Paper Award.
  • A. Volynkin, V. Skormin, D. Summerville, J. Moronski, “Evaluation of Run-Time Detection of Self-Replication in Binary Executable Malware,” Proceedings of the 7th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2006. Winner of Best Paper Award.
  • A. Volynkin, V. Skormin, D. Summerville, J. Moronski, “Prevention of Information Attacks by Run-Time Detection of Self-Replication in Computer Codes,” 3rd International Workshop MMM-ANCS 2005, St. Petersburg, Russia, September 24-28, 2005.
  • N. Nwanze, D. Summerville, V. Skormin, “Real-Time Identification of Anomalous Packet Payloads for Network Intrusion Detection,” Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005.
  • V. Skormin, A. Volynkin, D. Summerville, J. Moronski, “In The Search Of The “Gene Of Self-Replication” In Malicious Codes” Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005.
  • V. A. Skormin, D. H. Summerville, O. I. Shiryayeva, J. S. Moronski, “Analysis of Active Response in the Immune System with Computer Network Considerations,” The 16th International Conference on Systems Research, Informatics and Cybernetics (InterSymp-2004), Baden-Baden, Germany, pp. 15-28, July, 2004.
  • N. A. Moldovyan, A. A. Moldovyan, M. A. Eremeev, D. H. Summerville, “Wireless Networks Security and Cipher Design Based on Data-Dependent Operations: Classification of FPGA Suitable Controlled Elements,” Proceedings of the International Conference on Computing, Communications and Control Technologies: CCCT'04, Austin, TX, August, 2004, pp. 123-128.
  • D. H. Summerville, N. Nwanze, and V. A. Skormin, “Anomalous Packet Identification for Network Intrusion Detection,” Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, pp. 60-67, June 2004.
  • N.D. Goots, A.A. Moldovya, N.A. Moldovya, D.H. Summerville, "Fast DDP-Based Ciphers: from Hardware to Software," 46th IEEE Midwest Symposium on Circuits and Systems, Cairo, Egypt, December 2003.
  • Victor A. Skormin, Douglas H. Summerville and J. Moronski, “Detecting Malicious Codes by the presence of their "Gene of Self-Replication, " International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, (MMM-ACNS'03), Springer-Verlag, LNCS 2776. St. Petersburg, Russia, pp. 195-205, September 2003.
  • Victor Skormin , James Moronski , and Douglas Summerville, “Biological Approach to System Information Security (BASIS): A Multi-Agent Approach to Information Security“, CEEMAS 2003, the 3rd International/Central and Eastern European Conference on Multi-Agent Systems, Prague, Czech Republic, June 2003.
  • V. Skormin, D. Summerville, J. Moronski, and J. Sidoran, “Application of Genetic Optimization and Statistical Analysis for Detecting Attacks on a Computer Network”, Proceedings of the Real-time Intrusion Detection NATO Symposium, Lisbon, Portugal, May 2002.
  • Douglas H. Summerville Journals

  • H. Chen, T. Gaska, Y. Chen, and D. Summerville, “An Optimal Reconfigurable Power Spectral Density Converter for Real-Time Shrew DDoS Attacks Detection,” submitted to Computers and Electrical Engineering, Elsevier, accepted, to appear.
  • J. Feng, Y. Chen, and D. Summerville, “A Survey on XOR-based Erasure Codes for Canonical Storage Systems,” the International Journal of Information, Intelligence and Knowledge (JIIK), Vol. 4, Issue 2, 2012.
  • H. Chen, Y. Chen, and D. Summerville, “A Survey on the Application of FPGAs for Network Infrastructure Security,” IEEE Communications Surveys and Tutorials, vol. 13, issue 4, pp. 541-561, 2011.
  • A. Volynkin, V. Skormin, D. Summerville, J. Moronski, “Prevention of Information Attacks by Run-Time Detection of Self-Replication in Computer Codes,” Journal of Computer Security, Vol. 15, no. 2, 2007, pp. 273-301.
  • Moldovyan N.A., Moldovyanu P.A., Summerville D., “On Software Implementation of Fast DDP-Based Ciphers,” International Journal of Network Security, vol. 4, no.1, 2007, pp 81-89.
  • Douglas H. Summerville Books

  • J. Feng, Y. Chen, D. Summerville, and K. Hwang, “Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part II,” Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, in “Computer Communications and Networks” book series by Springer-Verlag, ISBN 978-1-4471-2236-4, 2012.
  • J. Feng, Y. Chen, D. Summerville, and K. Hwang, “Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part I,” Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, in “Computer Communications and Networks” book series by Springer-Verlag, ISBN 978-1-4471-2236-4, 2012.
  • H. Chen, J. Feng, Y. Chen, and D. Summerville, “Securing Network Infrastructure using Reconfigurable Hardware Devices,” Security Engineering Techniques and Solutions for Information Systems: Management and Implementations, edited by N. Boudriga and M. Hamdi, published by Idea Group, Inc., ISBN 1615208038, March 2010.
  • D. Summerville, Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller: Part I- Assembly Language Programming, Morgan & Claypool Publishers, ISBN 9781608450053, 2009.
  • D. Summerville, Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller: Part II- Hardware Interfacing, Morgan & Claypool Publishers, ISBN 9781608450060, 2009.
  • A. Moldovyan, N. Moldovyan, D. Summerville, V. Zima, Protected Internet, Intranet, & Virtual Private Networks, A-List Publishing, February, 2003.