google-plus
utulsa.edu

Mauricio Papa PhD

Associate Professor of Computer Science College of Engineering & Natural Sciences
Tandy School of Computer Science
918-631-2987
mauricio-papa@utulsa.edu
faculty-photo

Ph.D., The University of Tulsa
M.S., The University of Tulsa
B.S., Universidad Central de Venezuela


Network Security
Distributed Process Control
Network Intrusion Detection
Protocol Analysis

Operating Systems
Computer Networks
Network Security
Computer Graphics
Cyber Physical Systems
Critical Infrastructure Protection


The following may be selected publications rather than a comprehensive list.

Journal Articles


Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

Hawrylak, Peter et al. “Security Risks Associated with Radio Frequency Identification in Medical Environments.” Journal of Medical Systems Special Issue on Radio Frequency Identification in the Healthcare Sector: Applications, Business Models, Drivers and Challenges 36.6 (2012): 3491–3505. Print.

Hawrylak, Peter et al. “Security Risks Associated with Radio Frequency Identification in Medical Environments.” Journal of medical systems 36.6 (2012): 3491–3505. Print.

Hawrylak, Peter et al. “RFID in E-Health: Technology, Implementation.” Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments (2012): 347. Print.

Shenoi, Sujeet, Janica Edmonds, and Mauricio Papa. “Security Analysis of Multilayer SCADA Protocols.” IFIP International Federation for Information Processing 253.1 (2010): n. pag. Print.

Huitsing, Peter et al. “Attack Taxonomies for the Modbus Protocols.” International Journal of Critical Infrastructure Protection 1 (2008): 37–44. Print.

Kilpatrick, Tim et al. “Forensic Analysis of SCADA Systems and Networks.” International Journal of Security and Networks 3.2 (2008): 95–102. Print.

Dawkins, Jerald et al. “A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks.” Journal of Network and Systems Management 13.3 (2005): 253–267. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Access Control.” Journal of Computer Security 11.3 (2003): 331–351. Print.

Papa, Mauricio. “Formal Verification of Cryptographic Protocols.” The University of Tulsa (2001): n. pag. Print.

Papa, Mauricio, Jason Wood, and Sujeet Shenoi. “Evaluating Controller Robustness Using Cell Mapping.” Fuzzy Sets and Systems 121.1 (2001): 3–12. Print.

Papa, Mauricio et al. “IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols.” IEICE Transactions on Information and Systems 84.10 (2001): 1313–1323. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Cell Mapping for Controller Design and Evaluation.” Control Systems, IEEE 17.2 (1997): 52–65. Print.

Chandia, Rodrigo, and Mauricio Papa. “Access Policy Specification for SCADA Networks.” (2017): n. pag. Print.

Book Chapters


Hawrylak, Peter, Jeyasingam Nivethan, and Mauricio Papa. “Automating Electric Substations Using IEC 61850.” Optimization and Security Challenges in Smart Power Grids. Ed. Vijay Pappu, Marco Carvalho, and Panos Pardalos. Springer Berlin Heidelberg, 2013. 117–140. Print.

Brundage, M. et al. “Distributed Monitoring: A Framework for Securing Data Acquisition.” Ed. P. Théron and S. Bologna. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 2013. 144–167. Print.

Hawrylak, Peter, John Hale, and Mauricio Papa. “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions.” Developments in Wireless Network Prototyping, Design and Deployment: Future Generations. Ed. M. A. Matin. IGI Global, 2012. 38–55. Print.

Hawrylak, Peter et al. “RFID in E-Health: Technology, Implementation, and Security Issues.” Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments. Ed. Isabel de la Torre Díez Joel J. P. C. Rodrigues and Beatriz Sainz de Abajo. IGI Global, 2012. 347–368. Print.

Mavridou, Anastasia, and Mauricio Papa. “A Situational Awareness Architecture for the Smart Grid.” Global Security, Safety and Sustainability & e-Democracy. Springer, 2012. 229–236. Print.

G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

East, Samuel et al. “A Taxonomy of Attacks on the DNP3 Protocol.” Critical Infrastructure Protection III. Springer, 2009. 67–81. Print.

Butts, Jonathan et al. “Providing Situational Awareness for Pipeline Control Operations.” Critical Infrastructure Protection III. Springer, 2009. 97–111. Print.

Shayto, Ryan et al. “Assessing the Integrity of Field Devices in Modbus Networks.” Critical Infrastructure Protection II. Springer, 2008. 115–128. Print.

Gonzalez, Jesus, and Mauricio Papa. “Passive Scanning in Modbus Networks.” Critical Infrastructure Protection. Springer, 2008. 175–187. Print.

Edmonds, Janica, Mauricio Papa, and Sujeet Shenoi. “Security Analysis of Multilayer SCADA Protocols.” Critical Infrastructure Protection. Springer, 2008. 205–221. Print.

Chandia, Rodrigo et al. “Security Strategies for SCADA Networks.” Critical Infrastructure Protection. Springer, 2008. 117–131. Print.

Kilpatrick, Tim et al. “An Architecture for SCADA Network Forensics.” Advances in Digital Forensics II. Springer, 2006. 273–285. Print.

Campbell, Clinton et al. “On Modeling Computer Networks for Vulnerability Analysis.” Research Directions in Data and Applications Security. Springer US, 2003. 233–244. Print.

Magill, Stephen et al. “Implementation and Verification of Programmable Security.” Research Directions in Data and Applications Security. Springer US, 2003. 285–299. Print.

Papa, Mauricio et al. “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.” Security and Privacy in the Age of Uncertainty. Springer US, 2003. 349–360. Print.

Hale, John et al. “Language Extensions for Programmable Security.” Data and Application Security. Springer US, 2001. 221–232. Print.

Papa, Mauricio et al. “Simulation and Analysis of Cryptographic Protocols.” Data and Application Security. Springer US, 2001. 89–100. Print.

Hale, John, Mauricio Papa, and Sujeet Shenoi. “Programmable Security for Object-Oriented Systems.” Database Security XII. Springer US, 1999. 109–123. Print.

Books


Shenoi, Sujeet, and Mauricio Papa. Critical Infrastructure Protection IV. IFIP International Federation for Information Processing, 2010. Print.

Papa, Mauricio, and Sujeet Shenoi. Critical Infrastructure Protection II. Vol. 290. Springer, 2008. Print.

Technical Report


Mueller, Carsten, Jeremy Daily, and Mauricio Papa. Assessing the Accuracy of Vehicle Event Data Based on CAN Messages. SAE Technical Paper, 2012. Print.

Conference Proceedings


Hill, Z. et al. “Verifying Attack Graphs through Simulation.” 2017 Resilience Week (RWS). 2017. 64–67. Print.

Nichols, W. et al. “Introducing Priority into Hybrid Attack Graphs.” Proceedings of the 12th Annual Conference on Cyber and Information Security Research. ACM, 2017. 12:1–12:4. Print.

Hill, Zachary et al. “Simulation and Analysis Framework for Cyber-Physical Systems.” Proceedings of the 12th Annual Conference on Cyber and Information Security Research. ACM, 2017. 7:1–7:4. Print.

Hawrylak, Peter, John Hale, and Mauricio Papa. “Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.” Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact. ACM, 2017. 53:1–53:4. Print.

Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

Nivethan, Jeyasingam, Mauricio Papa, and Peter Hawrylak. “Modeling and Simulation of Electric Power Substation Employing an IEC 61850 Network.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. ACM, 2014. 89–92. Print.

Haney, Michael, and Mauricio Papa. “A Framework for the Design and Deployment of a SCADA Honeynet.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014. 121–124. Print.

Nivethan, Jeyasingam, Mauricio Papa, and Peter Hawrylak. “Estimating Link Availability and Timing Delays in Ethernet-Based Networks.” Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM, 2013. 46:1–46:4. Print.

Hawrylak, P.J. et al. “Using Hybrid Attack Graphs to Model Cyber-Physical Attacks in the Smart Grid.” Resilient Control Systems (ISRCS), 2012 5th International Symposium On. 2012. 161–164. Print.

González-Pino, Jesús, Janica Edmonds, and Mauricio Papa. “Attribute Selection Using Information Gain for a Fuzzy Logic Intrusion Detection System.” Defense and Security Symposium. 2006. 62410D–62410D. Print.

El-Semary, Aly et al. “Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection.” Information Assurance Workshop, 2006 IEEE. 2006. 100–107. Print.

J. Edmonds, A. el-Semary, J. González-Pino, and M. Papa, “Implementation of a Hybrid Intrusion Detection System using FuzzyJess,” Proceedings of the Seventh International Conference on Enterprise Information Systems (ICEIS), Miami, Florida, May 2005.

El-Semary, Aly et al. “A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems.” Fuzzy Systems, 2005. FUZZ’05. The 14th IEEE International Conference On. 2005. 325–330. Print.

Edmonds, Janica, and Mauricio Papa. “Cryptographic Protocol Analysis Using Goal Extraction.” Null. 2004. 75. Print.

J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

Papa, Mauricio et al. “Extending Java for Package Based Access Control.” Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference. 2000. 67–76. Print.

Hale, John et al. “Security Policy Coordination for Heterogeneous Information Systems.” Acsac. 1999. 219. Print.

Berryman, M et al. “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.” Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects. 1997. 385–388. Print.

Tai, Heng-Ming, Mauricio Papa, and Sujeet Shenoi. “On Global Analysis and Design of Fuzzy Control Systems.” Industrial Electronics, Control, and Instrumentation, 1996., Proceedings of the 1996 IEEE IECON 22nd International Conference On. Vol. 1. 1996. 372–377. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Effect of Cell Map Granularity on Fuzzy Control System Analysis.” Fuzzy Systems, 1996., Proceedings of the Fifth IEEE International Conference On. Vol. 1. 1996. 411–415. Print.

Papa, Mauricio, Heng-Ming Tai, and Sujeet Shenoi. “Evaluation of Cell State Techniques for Optimal Controller Design.” Fuzzy Systems, 1995. International Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and The Second International Fuzzy Engineering Symposium., Proceedings of 1995 IEEE Int. Vol. 3. 1995. 1331–1338. Print.


CS 1043 Introduction to Programming and Problem- Solving
CS 3053 Operating Systems
CS 4333 Computer Networks
CS 4613 Fund of Comp Graphics
CS 6113 Operating Systems and Discrete Structures
CS 7473 Network Security
CS 7863 Special Topics in Computer Science
CS 9981 Research and Dissertation
CS 9989 Research and Dissertation