Engineering faculty at a recent USD graduation ceremony

Faculty Scholarship and Patents

​​Leading innovation at USD's Shiley-Marcos School of Engineering.

Our community of faculty scholars engage in interdisciplinary research that focuses on real world problems and lays the groundwork for the innovations of tomorrow that can improve the lives and the livelihood of people around the world. Their research generates the knowledge and understanding needed for a better society, and it strengthens our teaching mission by enriching our students' learning experience in and out of the classroom. We encourage you to further explore our featured undergraduate research work.

The 10 featured or most recent scholarship and patent listings are displayed for each faculty member listed below.

Heckman, Mark

Journal Articles

  • "The promise and limits of Big Data for improving intrusion detection," ISSA Journal, vol. 15, 6, 2017.
  • With Schell, R., "Using proven reference monitor patterns for security evaluation," Information, vol. 7, 2, pp. 23:1-23:24, 2016.
  • "Every secure system wants to be a Reference Monitor," ISSA Journal, vol. 13, 7, 2015.
  • With Zhou, J., Reynolds, B., Carlson, A., and Bishop, M., "Modeling network intrusion detection alerts for correlation," ACM Transactions on Information and System Security (TISSEC), vol. 1, 10, 2007.
  • With Feiertag, R., Rho, S., Benzinger, L., Wu, S., Redmond, T., Zhang, C., Levitt, K., Peticolas D., and McAlerney, J., "Intrusion detection inter-component adaptive negotiation," Computer Networks, vol. 34, 4, 2000.
  • With Zhang, C., Becker, B., Peticolas, D., Levitt, K., and Olsson, R., "Towards applying the composition principle to verify a microkernel operating system," Lecture Notes in Computer Science, vol. 1125, pp. 235-250, 1996.
  • With Zhang, C., Becker, B., Levitt, K., and Olsson, R., "A hierarchical method for reasoning about distributed programming languages," Lecture Notes in Computer Science, vol. 971, pp. 385-400, 1995.
  • With Zhang, C., Shaw, R., Olsson, R., Levitt, K., Archer, M., and Benson, G., "Mechanizing a programming logic for the concurrent programming language microSR in HOL," Lecture Notes in Computer Science, vol. 780, pp. 29-42, 1994.
  • With Lunt, T., Denning, D., Schell, R., and Shockley, W., "The SeaView security model," IEEE Trans. on Software Engineering / IEEE Computer Society, vol. 16, 6, pp. 593-607, 1990.
  • With Lunt, T., Denning, D., Schell, R., and Shockley, W., "Element-level classification with A1 assurance," Computers and Security, vol. 7, 1, pp. 73-82, 1988.
  • With Denning, D., Akl, G., Lunt, T., Morgenstern, M., Neumann, P., and Schell, R., "Views for multilevel database security," IEEE Trans. on Software Engineering, vol. SE?13, 2, pp. 129-140, 1987.

Chapters of Books or Articles within Books

  • With McCready, J., Mayhew, D., and Callahan, W., "Toward a maritime cyber security compliance regime" in Issues in Maritime Cyber Security. 2017, pp. 543-568.

Conference Papers and Other Media

  • "The difference between data security and privacy." United States Cybersecurity Magazine, 2017.
  • "Cybersecurity education's cargo cult." United States Cybersecurity Magazine, 2016.
  • With Schell, R. and Reed, E., "A multi-level secure file sharing server and its application to a multi-level secure cloud." IEEE, Proc. Military Communications Conference (MILCOM), Tampa, FL, October 2015, pp. 1224-1229.
  • With Schell, R. and Reed, E., "Towards formal evaluation of a high-assurance guard." Proc. 6th Layered Assurance Workshop, Orlando, FL, December 2012, pp. 25-31.
  • With Schell, R. and Reed, E., "A high-assurance, virtual guard architecture." IEEE, Proc. Military Communications Conference (MILCOM), Orlando, FL, October 2012.
  • With Schell, R. and Reed, E., "Composing a high-assurance infrastructure out of TCB components." 5th Layered Assurance Workshop, Orlando, FL, 2011.
  • With Schell, R. and Reed, E., "Using a high-assurance TCB for infrastructure security." ACM, Proc. 7th Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, TN, 2011.
  • With Levitt, K., "Applying the composition principle to verify a hierarchy of security servers." IEEE, Proc. 31st Hawaii International Conference on System Sciences (HICSS), 1998.
  • With Zhang, C., Shaw, R., Benson, G., Archer, M., Levitt, K., and Olsson, R., "Towards a formal verification of a secure distributed system and its applications." Proc. 17th National Computer Security Conference, Baltimore, MD, 1994, pp. 103-113.
  • With Zhang, C., Shaw, R., Olsson, R., Levitt, K., Archer, M., and Benson, G., "Mechanizing a programming logic for the concurrent programming language microSR in HOL." Higher Order Logic Theorem Proving and Its Applications: 6th International Workshop Proceedings, Vancouver, Canada, August 1993.
  • With Lunt, T., Denning, D., Schell, R., and Shockley, W., "The SeaView security model." Proc. 1988 Symposium on Security and Privacy, 1988, pp. 218-233.
  • "Views for multilevel database security." IEE Computer Society, Proc. 1986 Symposium on Security and Privacy, 1986, pp. 156-172.
  • With Schell, R. and Tao, T., "Designing the GEMSOS security kernel for security and performance." Proc. 8th National Computer Security Conference, 1985, pp. 108-119.
  • With Zhang, C., Becker, B., Levitt, K., and Olsson, R., "A hierarchical method for reasoning about distributed programming languages." Higher Order Logic Theorem Proving and Its Applications: 8th International Workshop Proceedings,
  • With Zhang, C., Becker, B., Peticolas, D., Levitt, K., and Olsson, R., "Towards applying the composition principle to verify a microkernel operating system." Theorem Proving in Higher Order Logics: 9th International Conference (TPHOLs),

Media Appearances and Conferences

  • "7 Habits of Highly Effective Safe Home Computing," Bridges Academy, University of San Diego, 2018.
  • "Where are the Holes in a 'Holistic' View?" Maritime Risk Symposium, Tiffin University, 2017.
  • "Personal and Home Cyber Security, Cyber Security Awareness Month," University of San Diego, 2017.
  • "System MAC Integrity Policy," IEEE Invitational Workshop on a Building Code for Power System Software Security, University of Illinois Urbana-Champaign, 2016.
  • "Staying Safe On-line," Bridges Academy, University of San Diego, San Diego, CA, 2016.
  • "On-line Identify Theft: What you can do to Protect Yourself," University of the Third Age, University of San Diego, San Diego, CA, 2016.
  • "Fundamentals of Cybersecurity: Why Privacy Depends on Cybersecurity," IAPP, San Diego, CA, 2015.
  • "Security Awareness: Engaging Employees in Security and Breach Detection: Finding What is Already There," TribalNet, Austin, TX, 2015.
  • "A multi-level secure file sharing server and its application to a multi-level secure cloud," Military Communications Conference (MILCOM), Tampa, FL, 2015.
  • "The Future of Cybersecurity Education: Being Better than Best Practices," Western Electric Coordinating Council Critical Infrastructure Protection User Group, San Diego, CA, 2015.
  • "Threat Modeling Tools and Techniques," ISSA Sacramento Valley Chapter, 2015.
  • "Can We Count on Security Metrics," ISSA Sacramento Valley Chapter, 2015.
  • "DIY Anomaly Detection," ISSA Sacramento Valley Chapter, 2015.
  • "Computer Security and Privacy for the Genealogist," 34th IAJGS International Conference on Jewish Genealogy, Salt Lake City, UT, 2014.
  • "Towards a High Assurance MLS Network Server Supporting Linux Applications, Work-in-progress," Annual Computer Security Applications Conference, Orlando, FL, 2012.
  • "Towards Formal Evaluation of a High-Assurance Guard," Layered Assurance Workshop, Orlando, FL, 2012.
  • "Composing a High-Assurance Infrastructure out of TCB Components," Layered Assurance Workshop, Orlando, FL, 2011.
  • "COTS Multi-level Secure File Servers for the Cloud, Work-in-progress," Annual Computer Security Applications Conference, Orlando, FL, 2011.
  • "Using a High Assurance TCB for Infrastructure Security," 7th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, 2011.
  • "Applying the Composition Principle to Verify a Hierarchy of Security Servers," 31st Hawaii International Conference on System Sciences, Kohala Coast, HI, 1998.
  • "Towards Applying the Composition Principle to Verify a Microkernel Operating System," Theorem Proving in Higher Order Logics: 9th International Conference (TPHOLs), Turku, Finland, 1996.

Back to Faculty Listing
View faculty profile