Publications
2017
- Corser, G., Masasabi, M., Kivari, L., Fu, H. (2017, in press). Properties of vehicle network privacy. Michigan Academician. (Journal Paper)
- Corser, G. (2017, August). Why IoT security is so important - and what to do about it. IoT Tech News. 4 August 2017. Web. IEEE. (IEEE IoT Tech News Article)
- Corser, G., Banihani, A., Cox, J., Hoque, R., Fu, H. (2017, July). Location privacy, application overhead and congestion in VANET location based services. In 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, 2017, pp. 243-248. IEEE. doi: 10.1109/BigDataSecurity.2017.52 (PDF) (IEEE Conference Paper)
- Corser, G., Fink, G., Aledhari, M., Bielby, J., Nighot, R., Mandal, S., Aneja, N., Hrivnak, C., and Cristache, L. (2017). Internet of Things (IoT) security best practices. Retrieved May 19, 2017, from IEEE Internet Initiative (IEEE White Paper)
2016
- Corser, G. P. (2016). Securing location privacy in vehicular applications and communications (Doctoral dissertation, Oakland University). (PDF) (Nominated for Outstanding Dissertation Award)
- Corser, G., Fu, H., and Banihani, A. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658-2667. doi: 10.1109/TITS.2015.2506579 (Journal paper. Nominated for 2016 Caspar Bowden PET Award.) (PDF) (Journal Impact Factor: 3.724)
- Corser, G. P., Arenas, A., and Fu, H. (2016, February). Effect on vehicle safety of nonexistent or silenced basic safety messages. In Computing, Networking and Communications (ICNC), 2016 International Conference on (pp. 1-5). IEEE. doi: 10.1109/ICCNC.2016.7440550 (PDF)
2015
- Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., and Fu, H. (2015, November). Maps: A multi-dimensional password scheme for mobile authentication. In Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces (pp. 409-412). ACM.doi: 10.1145/2817721.2823479
2014
- Corser, G., Fu, H., Shu, T., D'Errico, P., Ma, W., Leng, S., and Zhu, Y. (2014, June). Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. In Intelligent Vehicles Symposium Proceedings, 2014 IEEE (pp. 1030-1036). IEEE. doi: 10.1109/IVS.2014.6856595
- Alnahash, N., Corser, G., Fu, H. (2014, April). Protecting Vehicle Privacy using Dummy Events. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. (PDF)
- Oluoch, J., Corser, G., Fu, H., Zhu, Y. (2014, April). Simulation Evaluation of Existing Trust Models in Vehicular Ad Hoc Networks. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. (PDF)
- Alrajei, N., Corser, G., Fu, H., Zhu, Y. (2014, February). Energy Prediction Based Intrusion Detection In Wireless Sensor Networks. International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2. IJETAE. (PDF) (Journal paper)
2013
- Corser, G., Fu, H., Shu, T., D'Errico, P and Ma, W. (2013, December). Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks. In Connected Vehicles and Expo (ICCVE), 2013 International Conference on (pp. 369-374). IEEE. doi: 10.1109/ICCVE.2013.6799822
- Corser, G. P., Arslanturk, S., Oluoch, J., Fu, H., and Corser, G. E. (2013). Knowing the Enemy at the Gates: Measuring Attacker Motivation. In International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 83-95. doi: 10.4018/JITN.2013040107 (Journal paper)
2012
- Corser, G. (2012, October). A tale of two CTs: IP packets rejected by a firewall. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 16-20). ACM. doi: 10.1145/2390317.2390320 (Best Paper Runner Up Award)
- Corser, G. (2012, October). Professional association membership of computer and information security professionals. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 9-15). ACM. doi: 10.1145/2390317.2390319 (Best Student Paper Runner Up Award)