Ph.D., The University of Tulsa
M.S., The University of Tulsa
B.S., The University of Tulsa
Mathematics Education and Pedagogy
History of Mathematics
The following may be selected publications rather than a comprehensive list.
Shenoi, Sujeet, Janica Edmonds, and Mauricio Papa. “Security Analysis of Multilayer SCADA Protocols.” IFIP International Federation for Information Processing 253.1 (2010): n. pag. Print.
Edmonds, Janica, Mauricio Papa, and Sujeet Shenoi. “Security Analysis of Multilayer SCADA Protocols.” Critical Infrastructure Protection. Springer, 2008. 205–221. Print.
El-Semary, Aly et al. “Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection.” Information Assurance Workshop, 2006 IEEE. 2006. 100–107. Print.
González-Pino, Jesús, Janica Edmonds, and Mauricio Papa. “Attribute Selection Using Information Gain for a Fuzzy Logic Intrusion Detection System.” Defense and Security Symposium. 2006. 62410D–62410D. Print.
J. Edmonds, A. el-Semary, J. González-Pino, and M. Papa, “Implementation of a Hybrid Intrusion Detection System using FuzzyJess,” Proceedings of the Seventh International Conference on Enterprise Information Systems (ICEIS), Miami, Florida, May 2005.
El-Semary, Aly et al. “A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems.” Fuzzy Systems, 2005. FUZZ’05. The 14th IEEE International Conference On. 2005. 325–330. Print.
Edmonds, Janica, and Mauricio Papa. “Cryptographic Protocol Analysis Using Goal Extraction.” Null. 2004. 75. Print.
J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.
J. Edmonds, “Interactive Calculus,” Presented at Mathematical Association of America Oklahoma Arkansas Section Sixty-Second Annual Meeting, Russellville, Arkansas, April 2000.