The Military College of South Carolina
give online buttongive online button apply now buttonapply now button


  1. Shankar M. Banik, Deepti Joshi, “Embedding Cybersecurity in Introduction to Programming I”, Information Systems Education Conference (ISECON) 2015, November 5 – 7, 2015, Orlando, Florida. (accepted for publication).

  2. Shankar M. Banik, Luis Pena, “Deploying Agents in the Network to Detect Intrusions, IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015), June 28 – July 1, 2015, Las Vegas, Nevada.

  3. Shankar M. Banik, Hugh Urey, “Protecting Peer-to-peer Network with Roaming Agents”, IEEE SoutheastCon 2015, April 9 - 12, 2015 - Fort Lauderdale, Florida.

  4. Jonathan Ng, Deepti Joshi, Shankar M. Banik, “Applying Data Mining Techniques to Intrusion Detection”, 12th International Conference on Information Technology - New Generations (ITNG) 2015, Las Vegas, Nevada.

  5. John I. Moore, Jr., “BadInputFilter revisited,” JavaWorld, November 14, 2013.

  6. Shankar M. Banik, Derek Bernsen, Muhammad Javed, “IMAIDS: Intelligent Mobile Agent-based Intrusion Detection System”, 51st ACM Southeast Conference (ACMSE 2013), Savannah, Georgia, April 2013.
Back to Top