Skip to content

Selected Publications

Here are a few of my more interesting papers. You can also find a more complete list of publications on my CV or my Google Scholar page.

Journals

2020
  • Cifranic, N., Hallman, R.A., Romero-Mariona, J., Souza, B., Calton, T., Coca, G., 2020. Decepti-SCADA: A Cyber Deception Framework for Active Defense of Networked Critical Infrastructures. Internet of Things, Volume 12.
2017
  • Diallo, M.H., August, M., Hallman, R.A., Kline, M., Slayback, S.M. and Graves, C., 2017. AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability. Cluster Computing, Volume 20 Issue 3, pp.1995-2012.

Refereed Conference & Workshop Proceedings

2020
  • Hallman, R.A., Chikkula, A., Prioleau, T., 2020, September. Predicting Criticality in COVID-19 Patients. In Proceedings of the 11th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics (Article 46, pp. 1–7).
  • Hallman, R.A., Major, M., Romero-Mariona, J., Phipps, R., Romero, E., John, M. and Miguel, S., 2020, May. Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration. In Proceedings of the 5th International Conference on Complexity, Future Information Systems and Risk - Volume 1. SCITEPRESS (pp. 43-52).
2018
  • Hallman, R.A., Laine, K., Dai, W., Gama, N., Malozemoff, A.J., Polyakov, Y. and Carpov, S., 2018, January. Building applications with homomorphic encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2160-2162).
  • San Miguel, J.M., Kline, M.E., Hallman, R.A., Slayback, S.M., Rogers, A. and Chang, S.S., 2018, October. Aggregated Machine Learning on Indicators of Compromise in Android Devices. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2279-2281).
  • Hallman, R.A., Diallo, M.H., August, M.A. and Graves, C.T., 2018. Homomorphic Encryption for Secure Computation on Big Data. In Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security - Volume 1. SCITEPRESS (pp. 340-347).
2017
  • Divita, J. and Hallman, R.A., 2017, August. An approach to botnet malware detection using nonparametric Bayesian methods. In Proceedings of the 12th International Conference on Availability, Reliability and Security (pp. 1-9).
  • Hallman, R.A., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., 2017. IoDDoS-the internet of distributed denial of sevice attacks. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1. SCITEPRESS (pp. 47-58).
2016
  • Romero-Mariona, J., Hallman, R.A., Kline, M., San Miguel, J., Major, M. and Kerr, L., 2016, April. Security in the industrial internet of things-the C-SEC approach. In International Conference on Internet of Things and Big Data (Vol. 2, pp. 421-428). SCITEPRESS.
  • Diallo, M.H., August, M., Hallman, R.A., Kline, M., Au, H. and Beach, V., 2016, February. Callforfire: A mission-critical cloud-based application built using the nomad framework. In International Conference on Financial Cryptography and Data Security (pp. 319-327). Springer, Berlin, Heidelberg.
2015
  • Diallo, M.H., August, M., Hallman, R.A., Kline, M., Au, H. and Beach, V., 2015, August. Nomad: A framework for developing mission-critical cloud-based applications. In 2015 10th International Conference on Availability, Reliability and Security (pp. 660-669). IEEE.

Book Chapters

2017
  • Diallo, M.H., August, M., Hallman, R.A., Kline, M., Au, H. and Slayback, S.M., 2017. Nomad: a framework for ensuring data confidentiality in mission-critical cloud-based applications. Data Security in Cloud Computing, Security, pp.19-44.
  • Romero-Mariona, J., Hallman, R.A., Kline, M., Palavicini, G., Bryan, J., San Miguel, J., Kerr, L., Major, M. and Alvarez, J., 2015, November. An Approach to Organizational Cybersecurity. In Enterprise Security (pp. 203-222). Springer, Cham.

Patents (Awarded & Pending)

2020
  • August, M.A., Diallo, M.H., Glasser, D.P., Graves, C.T., Hallman, R.A. and Slayback, S.M., US Secretary of Navy, 2020. Anomaly detection for preserving the availability of virtualized cloud services. U.S. Patent 10,684,909.
2019
  • Diallo, M.H., Hallman, R.A., August, M.A., Kline, M.E.M. and Au, H.G.W., US Secretary of Navy, 2019. System and method for automating indirect fire protocol using fully homomorphic encryption. U.S. Patent 10,439,799.
  • Diallo, M.H., August, M.A., Kline, M.E., Slayback, S.M. and Hallman, R.A., US Secretary of Navy, 2019. System and method for automatically triggering the live migration of cloud services and automatically performing the triggered migration. U.S. Patent 10,375,169.
  • San Miguel, J., Kline, M., Hallman, R.A., Romero-Mariona, J., Phan, J., Slayback, S.M., Weeden,C., US Secretary of Navy.System and Method for Aggregated Machine Learning on Indicators of Compromise onMobile Devices. US Patent Application 16/596,575.

Non-Refereed Technical Documents

2019
  • San Miguel, J.M., Kline, M.E., Hallman, R.A., Phan, J., Slayback, S.M., Weeden, C.M. and Romero-Mariona, J.V., 2019. Aggregated Machine Learning on Indicators of Compromise. NIWC Pacific San Diego United States.
2017
  • Archer, D., Chen, L., Cheon, J.H., Gilad-Bachrach, R., Hallman, R.A., Huang, Z., Jiang, X., Kumaresan, R., Malin, B.A., Sofia, H. and Song, Y., 2017. Applications of homomorphic encryption. HomomorphicEncryption. org, Redmond WA, Tech. Rep.