[46] Learning Attack Features From Static and Dynamic Analysis of Malware, Ravula, R. R., Liszka, K.J., and Chan, C., Knowledge Discovery, Knowledge Engineering and Knowledge Management, edited by Fred, A.; Dietz, J.; Liu, K.; Filipe, J., (Eds.), Communications in Computer and Information Science, Vol. 348, 2013, pp. 109-125, Springer-Verlag, Berline Heidelberg.

 

[45] Prediction of Movies Box Office Performance Using Social Media, Apala, K. R., Jose, M., Motnam, S., Chan, C., Liszka, K.J., and de Gregorio, F., The 5th International Workshop on Mining and Analyzing Social Networks for Decision Support (MSNDS'13), pp. 1209-1214.

 

[44] Cloud Computing in the Curriculum: A Current Perspective, Liszka, K.J., Chan, C., Collard, M.L., Guarnera, D., and Bordo, N., The 2013 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'13), pp. 268-274.

 

[43] Examining the Performance of Java Static Analyzers, Daimi, K., Ganitaan, S., and Liszka, K. J., The 2013 International Conference on Software Engineering Research and Practice (SERP'13), pp. 256-262.

 

[42] Application of Learning Algorithms to Image Spam Evolution, Wakade, S., Liszka, K. J., and Chan, C.-C., Emerging Paradigms in Machine Learning, edited by S. Ramanna, L. Jain and R. J. Howlett, 2013, Springer, New York, Smart innovation, Systems and Technologies, vol. 13, pp. 471-495, ISBN 978-3-642-28698-8.

 

[41] A Geometric Tiling Algorithm for Wireless Sensor Networks, Martinez, A. P., Norfolk, T. and Liszka, K. J., 2012 International Conference on Wireless Networks, (ICWN'12), pp. 149-155.

 

[40] Text Mining for Sentiment Analysis of Twitter Data, Liszka, K. J., Chan, C.-C., Shekar, C., and Wakade, S., 2012 International Conference on Information and Knowledge Engineering, (IKE'12), pp. 109-114.

 

[39] Experiments in Parallelizing the Type IV Discrete Cosine Transform, O'Neil, T. W., Mugler, D. H., Liszka, K. J., Gummadi, R., and Mirza, A. B., Computer Technology and Application, (3) 2012, pp. 305-314.

 

[38] Application of Rough Set Theory to The Analysis of Micro-blogging Data, Chan, C.-C. and Liszka, K. J., Intelligent Systems Reference Library, edited by Andrzej Skowron, Zbigniew Suraj (Eds.), 2012, Springer, New York, vol 2, pp. 185 - 201, ISBN 978-3-642-30340-1.

 

[37] Dynamic Analysis of Malware Using Decision Trees, Ravula, R. R., Liszka, K. J., and Chan, C.-C., International Conference on Knowledge Discovery and Information Retrieval, KIDR 2011, October 2011, pp. 74-83.

 

[36] Detecting Pharmaceutical Spam in Microblog Messages, Liszka, K. J., Chan, C.-C., and Shekar, Social Network Mining, Analysis and Research Trends: Techniques and Applications, edited by I-Hsien Ting, Tzung-Pei Hong and Leon S.L. Wang, IGI Global, New York, 2011, pp. 101-115, ISBN13: 9781613505137.

 

[35] Following the Trail of Image Spam, Wakade, S., Bruen, R., Liszka, K. J., and Chan, C.-C., The 2011 International Conference on Security and Management (SAM'11), July 2011. pp. 436-441.

 

[34] Twitter on Drugs: Pharmaceutical Spam in Tweets, Shekar, C., Liszka, K. J., and Chan, C.-C., The 2011 International Conference on Security and Management (SAM'11), July 2011. pp. 193-198.

 

[33] Mining Pharmaceutical Spam from Twitter, Liszka, K. J., Chan, C.-C., Shekar, C. and Wakade, S., International Conference on Intelligent Systems and Applications (ISDA 2010), November 2010, pp. 813-817.

 

[32] Malware Analysis Using Reverse Engineering and Data Mining Tools, Burji, S., Liszka, K. J., and Chan, C.-C., The 2010 International Conference on System Science and Engineering(ICSSE 2010), July 2010, pp. 619-624.

 

[31] Artificial Neural Networks as a Tool for Identifying Image Spam, Hope, P., Bowling, J. R., and Liszka, K. J., The 2009 International Conference on Security and Management (SAM'09), July 2009, pp. 447-451.

 

[30] Implementing DCT Algorithms Using RapidMind on a PS3, Gummadi, R., Liszka, K. J., and Mugler, D. H., The 2009 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'09), July 2009, pp. 559-564.

 

[29] Rogue Softwares - A global menace in the making!, Burji, S., and Liszka, K. J., Northeast Ohio Networking Workshop (NEONet 2009), June 3, 2009.

 

[28] The Poster Session: A Tool for Education, Assessment, and Recruitment, Wheland, E. R., O'Neil, T. O., Adler, J. D., and Liszka, K. J., Mathematics and Computer Education, vol. 34, No. 2, Spring 2009, pp. 141-150.

 

[27] What's the Secret? An Encrypted Treasure Hunt, Saliga, L. M., Nelson, L. D., and Liszka, K. J., The Journal of Computing Sciences in Colleges, vol. 24, no. 1, Oct. 2008, pp. 55-61.

 

[26] A Metric for Robustness in Wireless Mote Communication with Applications in Telemedicine, Liszka, K. J., Sever, M. J., and Bhattarai, S, 2008 International Conference on Wireless Networks (ICWN'08), vol. 2, pp. 401-406, July 2008.

 

[25] Issues in Personal Cardiac Health Monitoring with Sensor Networks, Liszka, K. J., Sever, M. J., Richter, M. E., and Bhattarai, S., Mobile Telemedicine: A Computing and Networking Perspective, edited by Y. Xiao and H. Chen, Auerbach/Taylor & Francis, June 2008, pp. 103-118.

[24] Spam Image Identification Using an Artificial Neural Network, Bowling, J. R., Hope, P., and Liszka, K. J., Proceedings of the 2008 MIT Spam Conference, Cambridge, Massachusetts, March 2008.

 

[23] A Sensor Network Architecture for Cardiac Monitoring, Liszka, K. J., 4th Consumer Communications and Networking Conference, Jan. 2007, pp. 737-740.

 

[22] Teaching in Russia: A Fulbright Experience, Liszka, K. J., Proceedings of the Midwest Celebration of Women in Computing (MidWIC), Sept. 2006, pp. 23-27.

 

[21] A Web Based Architecture for Remote Access of Satellite Emulation Services, Liszka, K. J. and Holtz, A. P., 2006 International Conference on Internet Computing (ICOMP 06), June 2006, pp. 3-7.

 

[20] Performance of Randomized Work Scheduling for Parallel Depth-First Tree Search Discrete Optimization Problems, Hayes, T. A. and Liszka, K. J., Conference on Parallel and Distributed Processing Techniques and Applications, June 2005, pp. 727-731.

 

[19] Keeping a Beat on the Heart, Liszka, K. J., Mackin, M. A., Lichter, M. J., York, D. W., Pillai, D., and Rosenbaum, D. S., IEEE Pervasive Computing, Mobile and Ubiquitous Systems, vol. 3, no. 4, 2004, pp. 42 - 49.

 

[18] Remote Monitoring of a Heterogeneous Sensor Network for Biomedical Research in Space, Liszka, K. J., York, D. W., Rosenbaum, D. S., Mackin, M. A., and Lichter, Proceedings of the International Conference on Pervasive Computing and Communications, June 2004, pp. 829 833.

 

[17] Detection and Prevention of Cardiac Arrhythmias During Space Flight, Pillai, D., Rosenbaum, D. S., Liszka, K. J., York, D. W., Mackin, M. A., and Lichter, M. J., Strategic Research to Enable NASA's Exploration Missions Conference and Workshop, June 2004, pp. 784 806.

 

[16] Web Services for Satellite Emulation Development, Liszka, K. J. and Holtz, A. P., Proceedings of the Fourth Space Internet Workshop (SIW-4), June 2004.

 

[15] Remote Arrhythmia Monitoring System Developed, David W. York, Michael A. Mackin, Kathy J. Liszka and Michael J. Lichter, Research and Technology 2003, pp. 223 224.

 

[14] User-Friendly Interface Developed for a Web-based Service for SpaceCAL Emulations, Liszka, K. J. and Holtz, A. P., Research and Technology 2003, pp. 222 223.

 

[13] Parallel Computation for Wavelet Packet Transform, Fu S., Liszka K. J., Xie B., Fourth IASTED International Conference on Parallel and Distributed Computing and Systems 2002, November 2002, pp. 572-576.

 

[12] A Unified Cooperative Web Caching Model, Minhaz, M. N., Dang, X.H., Liszka, K. J., 2002 International Conference on Communications in Computing, June 2002, pp.111-117.

 

[11] Parallel Algorithms for the Third Extension of the Sieve of Eratosthenes, Whittaker, T. A. and Liszka, K. J., Midwest Conference on Parallel Processing, August 1999.

 

[10] Real-Time Scheduling in Command and Control, Meilander, W. C., Potter, J. L., Liszka, K. J., and Baker, J. W., Midwest Conference on Parallel Processing, August 1999.

 

[9] An Associative Calculus Data Structure, Potter, J. L. and Liszka, K. J., Journal of Parallel and Distributed Computing, vol. 51, no. 1, pp. 63-74, May 25, 1998.

 

[8] Problems with Comparing Interconnection Networks: Is an Alligator Better than an Armadillo? , Liszka, K.J., Antonio, J. K., and Siegel, H. J., IEEE Concurrency, vol. 5, no. 4, pp. 18-28, Oct.-Dec. 1997.

 

[7] An Associative Calculus, Potter, J. L. and Liszka, K. J., 11th Annual International Symposium on High Performance Computing, July 1997, pp. 495-503.

 

[6] "On the Parallel k-th Extension of the Sieve of Eratosthenes", Liszka, K. J. and Quesada, A. R., Parallel Algorithms and Applications, vol. 10, October 1996, pp. 111-125.

 

[5] " Metrics for Metrics: Why It Is Difficult to Compare Interconnection Networks OR How Would You Compare an Alligator to an Armadillo?", Siegel, H. J., Antonio, J. K., and Liszka, K. J., Proceedings of the New Frontiers, A Workshop on Future Directions of Massively Parallel Processing, edited by I. Scherson, IEEE Computer Society Press, October 1993, pp. 97-106.

 

[4] A Generalized Bitonic Sorting Network", Liszka, K. J. and Batcher, K. E., Proceedings of the 22nd International Conference on Parallel Processing, August 1993, pp. 105-108.

 

[3] A Modulo Merge Sorting Network", Liszka, K. J. and Batcher, K. E., Proceedings of the Fourth Symposium on the Frontiers of Massively Parallel Computation, October 1992, pp. 164-169.

 

[2] "Factoring Large Numbers on the MPP", McCurdy (Liszka), K. J., Proceedings of the Phoenix Conference on Computers and Communications, February 1987, pp. 78-81.

 

[1] "The Factorization of Large Composite Numbers on the MPP", McCurdy (Liszka), K. J. and Wunderlich, M. C., Proceedings of the First Symposium on the Frontiers of Massively Parallel Scientific Computation, September 1986, pp. 265-269.

 

Updated January 1, 2013