SFS Student Research

Masters students in the AZSecure Cybersecurity Fellowship program are required to conduct independent research and write a Master's Paper their final semester in the program. Students are encouraged to collaborate with other students and faculty, present at conferences, and submit their research for publication. Fellowship students are matched with appropriate faculty and senior Ph.D. students for mentoring throughout their program and meet regularly with the Program Administrator, Dr. Mark Patton, for reviews of their progress, academic plan, and Independent Studies.  They also attend the Artificial Intelligence Lab's weekly research meeting with Dr. Hsinchun Chen and report out on their independent and team research progress. See also the Cybersecurity Research and Education page on the website of the Artificial Intelligence Lab for additional background and information.

Published Output

Other Scholarly Output


Publications

Conference Papers and Presentations

  • V. Ercolani, M. Patton, and H. Chen, “Shodan Visualized,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745467
  • J. Grisham, C. Barreras, C. Afarin, M. Patton, and H. Chen, “Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745477
  • R. Jicha, M. Patton, and H. Chen, “Identifying Devices across the IPv4 Address Space,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745469
  • A. Jicha, M. Patton, and H. Chen, “SCADA Honeypots: An In-depth Analysis of Conpot,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745468
  • M. Patton, E. Gross, R. Chinn, S. Forbis, L. Walker, and H. Chen, “Uninvited Connections: A Study of the Vulnerable Devices on the Internet of Things (IoT),” ISI 2014, Proceedings of 2014 IEEE International Conference on Intelligence and Security Informatics, The Netherlands, September 2014. DOI: 10.1109/JISIC.2014.43
  • R. Rohrmann, M. Patton, and H. Chen, “Anonymous Port Scanning Performing Network -Reconnaissance Through Tor,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745475
  • S. Samtani, and H. Chen, “Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745500
  • S. Samtani, R. Chinn, and H. Chen, “Exploring Hacker Assets in Underground Forums,” ISI 2015, Proceedings of 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, Maryland, May 2015. DOI: 10.1109/ISI.2015.7165935
  • S. Samtani, K. Chinn, C. Larson, and H. Chen, “AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745437
  • S. Samtani, S. Yu, H. Zhu, M. Patton, and H. Chen, “Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745438

Forthcoming in the Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017:

  • Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Assessing Medical Device Vulnerabilities on the Internet of Things”
  • Ryan Williams, Emma McMahon, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach”
  • John Grisham, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence”
  • Malaka El, Sagar Samtani, Hsinchun Chen, Mark Patton and Emma McMahone, (2017). “Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments”
  • Rodney Rohrmann, Vincent Ercolani, Mark Patton, (2017). “Large Scale Port Scanning Through Tor Using Parallel Nmap Scans to Scan Large Portions of the IPv4 Range”

Journal Articles

  •  Samtani, S., Chinn, R., Chen, H., and Nunamaker, J.F. (under review). "Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence".  Journal of Management Information Systems.
  • S. Samtani, S. Yu, H. Zhu, M. Patton, J. Matherly, and H. Chen, (under review). "Identifying SCADA Systems and their Vulnerabilities on the Internet of Things: A Text Mining Approach".  Journal of Management Information Systems.
  • S. Samtani, S. Yu, and H. Zhu (under review). "Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk". Transactions on Replication Research. 

 


 

Book Chapters 

  •  Benjamin, V., Samtani, S., and Chen, H. (2017). "Conducting Large-Scale Analyses of Underground Hacker Communities." Cybercrime through an Interdisciplinary Lens.  Holt, Thomas H..  Routledge.  New York, NY.  DOI: 10.4324/9781315618456

 Other Scholarly Output

 Master's Papers

2017

2016

2015

Abstracts of all Master's Papers.


 

Conference/Workshop Presentations and Posters

  • S. Samtani (2017). "DIBBs-ISI Tool Inventory for ISI Research." Panel presentation and discussion during Cybersecurity Big Data and Analytics Sharing Workshop held at Women in Cybersecurity, March, Tucson, AZ.  
  • S. Samtani (2017). "AZSecure Hacker Assets Portal." Panel presentation and discussion during Cybersecurity Big Data and Analytics Sharing Workshop held at Women in Cybersecurity, March, Tucson, AZ.  
  • S. Samtani (2017). "Hacker Web Assets Portal." Presented at CyberCorps Scholarship-for-Service Job Fair, January, Arlington, VA.
  • S. Samtani (2017). "Hacker Community Collection and Analytics." Poster presented at Secure and Trustworthy Cyberspace Principal Investigators' Meeting, January, Arlington, VA.
  • S. Samtani (2017). "Identifying SCADA Devices and their Vulnerabilities on the IoT." Poster presented at Secure and Trustworthy Cyberspace Principal Investigators' Meeting, January, Arlington, VA. 
  • S. Samtani (2016). "Understanding Malicious Tools in Underground Hacker Communities." Presented at INFORMS Annual Meeting, November, Nashville, Tennessee.
  • S. Samtani (2016). "Exploring SCADA Devices and their Vulnerabilities on the Internet of Things." Presented at INFORMS Annual Meeting, November, Nashville, Tennessee.