Cyber Security and Privacy Cluster
|
|
|
- Ronald McLaughlin
- 10 years ago
- Views:
Transcription
1 Cyber Security and Privacy Cluster 1 Evidence-based Impact Statement In 2011, the White House Office for Science and Technology Policy and the National Science and Technology Council s Networking and Information Technology Research and Development Program established a national cyber research and development strategy that aims to foster research in this area. Budgets for research have been increasing, and in 2014 budgets for cyber security and information assurance were $802M, with large amounts in DARPA, NSA, and NSF. Cyber is at the top of everyone s list in the Department of Defense (DoD) in terms of needs and funding (see Appendix B). In 2015, cyber security continues to be a major bipartisan national priority both in terms of funding and economic goals, as explicitly stated by President Obama in his January 20 th State of the Union address: No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids. Moreover, there is projected to be a national deficit of 400,000 Cyber professionals in the United States and an estimated 1,000,000 shortage globally. In April 2015, the Secretary of Defense issued the DoD s cyber strategy. Key points in this strategy are to accelerate research and development to build cyber capabilities and to establish a cyber modeling and simulation capability. Modeling and simulation fit well with UCF strengths. Businesses are also very aware of the need to protect their security and the privacy of their customer s data. UCF cyber security students have received internships and job offers with major corporations including Microsoft, Google, Apple, Amazon, Facebook, Yahoo!, Disney, and Raytheon. There are over 200 students in the UCF Collegiate Cyber Defense Club, demonstrating a large student interest. A student team from this club won the national Collegiate Cyber Defense Competition (CCDC) in 2014 and again in UCF also has a hardware security team that has competed in the Final rounds in NYU Poly s 2014 CCDC team with the CSAW Embedded System Challenge and won second place in both 2013 and The official job projections in cyber areas are better even than those for other Alamo Cup computer-related jobs; according to the Bureau of Labor Statistics, Occupational Outlook Handbook ( Edition), Employment of information security analysts is projected to grow 37 percent from 2012 to 2022, much faster than the average for all occupations CCDC team with the Alamo Cup 2 Vision for the Cluster We envision an energetic, university-wide research cluster that moves the needle for UCF in both research and teaching. This cluster will focus on security (a technical construct), privacy (a social construct), and their intersection (a socio-technical system). Research and consulting in these areas 1
2 will aid both businesses and government, and will enhance faculty expertise for teaching students. Work on these problems involves: human users, physical facilities, hardware, software, communication protocols, and potential attackers. For example, many security breaches are not caused by technology problems, but by people who use weak passwords or click on malicious links. There are numerous ways to exploit infrastructure through such social engineering attacks. Therefore, the modern world needs a comprehensive combination of research that provides integrated solutions to both the human and technological causes of security and privacy problems. In order to produce comprehensive solutions, the work will span many disciplines, including Computer Science, Computer Engineering, Industrial Engineering and Management Systems, Legal Studies, Mathematics, Optics and Photonics, Philosophy, Political Science, Psychology, and Statistics. Integrating the technical and human aspects will set us apart. We plan to hold regular meetings to work on problems of mutual interest. The plan is to alternate loosely structured sessions focused on: Discussions about the landscape of problems, policies, and ethical issues in cyber security and privacy, with the idea of discovering what problems are important and sensible to address in the current social and political context. Brainstorming about approaches to solving some class of problems, with the idea of exchanging information about how such approaches could be evaluated. Presentations on ongoing work, with the idea of getting feedback from multiple perspectives. Through both structured and unstructured events, cluster members will also have opportunities to meet and socialize informally, so that they can form close working relationships. 2.1 Short and Long Term Cluster Objectives The short term objectives of this cluster are to conduct world-class and impactful research on: Security and privacy for the Internet of Things (IoT). Tools and methods for preventing, discovering, and mitigating: o Security and privacy breaches, o Insider threats, and o Privacy risks and source-based self-censoring. Evaluation techniques for determining the efficacy, efficiency, and usability of such tools and methods. The IoT is an area of rapid technological advance where humans interface directly with devices such as refrigerators and thermostats. However, the IoT opens new avenues for attack on systems, such as attacking through a network that maintains connectivity with devices (such as refrigerators or heating systems) for predictive maintenance. Software developers and systems analysts need tools and design methods that help prevent security and privacy breaches. By tools we mean software programs, but tools can also be embodied in hardware. By methods, we mean techniques (such as checklists, best practices, or algorithms) for developing software/hardware or for managing software or networks. Tools and methods can embody insights into topics such as: authentication, program analysis (using programs to discover properties of other programs), reverse engineering of malware, and forensics, as well as methods for secure software development. IT operations staff and cyber security professionals also need tools and methods to help discover when sophisticated attacks are underway and how to mitigate them. People s concerns about privacy, especially from the use of data gathered by IoT devices and other systems, 2
3 can cause underutilization of existing capabilities as a result of self-censorship. The slow penetration of information sharing across the healthcare sector is an example where physicians omit information from patient records due to such concerns. Modeling and simulation can be used to test system designs and how they affect such privacy concerns. Businesses and governments also need tools and methods for preventing, discovering, and mitigating attacks by insiders (people with some legitimate access). These insider threats were recently reinforced by the Snowden case. Having a large population of students interested in cyber security and privacy (including the UCF Collegiate Cyber Defense Club, which has over 200 members), makes it possible to do scientific studies of the efficacy, efficiency, and usability of such tools and methods. Such studies would not be possible at many other universities. The expertise needed to carry out such studies, along with other user studies related to security and privacy meshes well with our expertise in Psychology, Statistics, Industrial Engineering, and Modeling and Simulation. The problems of identifying and preventing insider attacks, promoting capability usage, as well as preventing and detecting attacks and omissions due to privacy concerns could be approached, in part, with AI and statistical techniques (data analytics), and solutions could apply expertise in team processes and team training (through modeling and simulation), all of which are UCF strengths. The analytic capabilities could also address other problems with significant security components (such as the Smart Grid). UCF s capabilities in human-computer interaction and visualization can also address these problems, as well as address the DoD s needs for modeling and simulation capabilities. The long-term objectives of this cluster are to: Develop fundamental breakthroughs in security and privacy, as demonstrated by novel tools and methods. Develop fundamental knowledge about the factors that make tools and methods effective, efficient, and usable. Respond quickly and successfully to opportunities for funded research. This can be done in conjunction with industry partners for some federal grants and contracts. Give expert advice and consulting to government and businesses. Provide talented and well-trained students for government and businesses. This will help ensure that the cluster reflects the needs and interests of industry. UCF has an existing base of researchers who can investigate the above topics. What UCF currently lacks, however, is a group of faculty who are primarily engaged in cyber security and privacy research, and who will lead our existing faculty towards solutions of large and complex problems. This new leadership will make it possible to capitalize on this area s growing opportunities for interdisciplinary and multidisciplinary work. Detailed recruitment plans and plans for enhancing research capacity are developed below. 2.2 Alignment between Cluster Objectives and Strategic Priorities CECS has a strong interest in cyber security, due to interest from students and outside businesses and government. While CECS has two professors who primarily do research in security, and has hired one that does research in privacy, it does not have enough dedicated faculty to capitalize on many governmental and business funding opportunities. CECS hosts the Collegiate Cyber Defense Club (Hack@UCF); a group that is well-known, both on campus and beyond, and has over 200 members. Its success, and the success of UCF s hardware security team, make supporting cyber 3
4 security a top educational and research priority. CECS is investing in new hires, but believes that this cluster can knit together efforts across UCF, leading to greater impact. COS has an emerging interest in cyber security and privacy, especially with respect to the role that research from Psychology, Political Science (with a new PhD program in Security Studies), Sociology, and Statistics can assume in Cyber Security. Specific areas of research in the social and behavioral sciences include: (a) the description, mechanisms, and identification of external and internal (insider) threats in organizations, (b) the selection, training, and career progress of cyber security personnel in both the offensive and defensive roles, (c) the study of teamwork in cyber security applications, and (d) the development, testing, and usability of cyber security tools, such as threat visualizations, etc. Related research interests from Statistics include efficient analysis of big data, as well as supporting the analysis of threat signatures in communications and keystroke data, an area that is also of interest to the modeling, simulation, and training researchers at the Institute for Simulation & Training (IST). Mathematics has an interest in coding theory and cryptography (the latter being a crucial need at UCF). IST, a multi- and inter-disciplinary unit with resident faculty from COS, CECS, CAH, and CON, is uniquely positioned to support this cluster. Also, due to its close interactions with all branches of the DoD, and its work with agencies such as the Department of Homeland Security (DHS), the Defense Intelligence Agency, Intelligence Advanced Research Projects Activity, the Nuclear Regulatory Commission, and the Federal Aviation Administration, IST can provide a ready-made conduit for critical tools and methods in cyber security and privacy. IST will be key to helping the cluster addressing the DoD s strategic priorities in cyber modeling and simulation. We all believe that security and privacy are important and growing areas of opportunity and will remain so for the foreseeable future. Integrating the social and behavioral sciences with more technical areas will position UCF to compete and make fundamental contributions. 3 Cluster Leader and Participating Faculty This cluster will initially be led by Professor Gary T. Leavens, chair of Computer Science. (We expect that leadership will eventually pass to a senior hire.) The following form the core faculty of the cluster, who are committed to ensuring its success: Computer Science (CS): Mainak Chatterjee, Ratan Guha, Gary Leavens, Cliff Zou Electrical and Computer Engineering (ECE): Yier Jin, Peter Yuan. Industrial Engineering and Management Systems: Waldemar Karwowski IST: Randall Shumaker Political Science: Ted Reynolds, Psychology: Peter Hancock, Florian Jentsch Statistics: Morgan Wang The following are associated faculty who are interested in helping with research. They are from the above units and also from Legal Studies, Management, Marketing, Mathematics, Optics and Photonics, and Philosophy: Maureen Ambrose, Mostafa Bassiouni, Carol Bast, James Beckman, Rick Biehl, Joseph Brennan, Shawn Burke, Corey Bohil, Mason Cash, Robert Folger, Roger Handberg, Sumit Jha, Mark Johnson, Dana Joseph, Amit Joshi, Peter Kincaid, Sheau-Dong Lang, Joseph LaViola, Mingjie Lin, Ronald DeMara, Michael Macedonia, David Metcalf, Timothy 4
5 Ravich, Lauren Reinerman-Jones, Martin Richardson, Mark Schafer, Marshall Schminke, Mubarak Shah, Nancy Stanlick, Damla Turgut, Guo-Jun Qi, Zhihua Qu, and Petros Xanthoupoulos. The associated faculty will collaborate on research as opportunities arise, and will participate in discussions about security and privacy topics, but are not committing to work primarily on the cluster s topics. 4 Graduate and Undergraduate Curriculum Statement 4.1 Graduate Curriculum The Modeling and Simulation Graduate degree program graduate certificate in Modeling and Simulation of Behavioral Cybersecurity. This program offers four cyber courses. CECS offers 6 courses related to cyber security and hardware security at the graduate level. CS offers a MS in Digital Forensics degree that will be broadened to include more cyber security if more faculty can be hired in this area. Political Science has a new graduate certificate in Intelligence and National Security, as part of the Intelligence Community Center for Excellence in Intelligence (IC-CEI) grant; this certificate will be offered starting in fall The PhD program in Security Studies needs faculty that support the social science aspects of cyber. The IC-CEI grant can arrange internships in cyber security and privacy at federal agencies such as the Dept. of State, IARPA, and the DoD. 4.2 Undergraduate Curriculum UCF currently has no undergraduate degree in cyber security, but there are a number of courses offered by a variety of units (CS, ECE, Modeling and Simulation, Political Science). CS offers a Secure Computing and Networks Minor for undergraduates. Political Science is offering a course in Cybersecurity (fall 2015). In addition, Political Science has designed an interdisciplinary undergraduate minor on Intelligence Studies as part of the IC-CEI grant; courses on cyber security would enrich the current proposal. Currently, UCF is applying to become designated as a National Security Agency (NSA) Center of Excellence in Cyber Operations. The courses behind this application are the CS and IT bachelor s degrees along with the Secure Computing and Networks minor. In the process of earning their degrees, students need to take several courses; CS is proposing that 15 specific courses that cover the NSA required Knowledge Units earn these students an undergraduate certificate. We plan to grow this certificate program into a BS degree program in cyber security and privacy. 5 Proposed Detailed Hiring Plan The focus of hiring is to bring together UCF interests in cyber security and privacy. These interests are aligned with the cluster s short-term and long term objectives, and are shown as the rounded rectangles in Figure 1 below. We propose to hire at least 5 new faculty, which would be augmented by research faculty hired by the IST. The hires A-E (in ovals and circles) are explained below, but overall are targeted to bring in leaders who will tie together different research interests among our existing faculty. 5
6 Hire A would be a senior person who has both technical and leadership experience in cyber security and privacy, and whose expertise can unite our research from hardware and the IoT, through tools and methods, to evaluation of human behavior. This person also needs to have a grasp of the theory of security and privacy as well as policy and ethical issues. Such a polymath would be someone who has been playing a leading role in a center for security at a research university, and would form the glue that unites and leads our collaboration. Aside from someone who already leads such a center, we would look for someone senior who has not yet formally led such a center, but who is ready to lead our cluster. Other hires would be targeted to bring together areas that already have overlapping research interests. Hire B would be targeted at the intersection between evaluation of human behavior and the policies and ethical considerations that influence those behaviors (as well as the tools and methods that enforce them). Hire C would fill a crucial educational and research gap at UCF in theory of security, particularly in cryptography. Hire D would unite research interests between software and hardware security. Hire E would unite research interests between training and simulation and evaluation of human behaviors, with an interest in evaluation of tools and methods for cyber security and privacy. 5.1 Hiring Details All hires would be done by a cluster committee and would choose their tenure home based on their personal preference. Joint appointments would be made to link together the corresponding interests. Space will be needed for offices for the new faculty hired in the cluster; in total 5 offices will be needed (roughly 110 square feet each, and perhaps a larger one for the senior hire). We prefer to 6
7 have all the new faculty hired located close to each other, and to have lab space for the graduate students of these faculty also located close to each other and to the new faculty offices. Lab space for graduate students would be about 20 square feet per student, and we estimate about 5 students per new faculty member in the long run (so a total of about 500 square feet). When these hires start, they would typically have fewer students, so in the short run we would only need space for about 2 students per new hire (except for the senior person, who might have about 4 students). Thus in the short term we could make do with about 240 square feet of lab space. We would like to locate the offices and labs for these new faculty centrally on the main UCF campus. Research in the cluster needs at least one lab with whose network can be made independent of the university s network (using routing equipment), so that network security experiments can be run. If new space to co-locate the cluster is not available, then co-location of these new faculty with the research interests that they should bring together is also a possibility, especially in the short term. In any case, we plan to leave current faculty (and their students) in their existing offices (and labs). Recruiting senior faculty will be a particular challenge. We plan to leverage our industry partnerships, given their close ties to the research community in cyber security and privacy. We will start active recruiting efforts by hosting visits from leaders who are near the top of the leadership of prominent cyber security centers (see Section 7). The process for hire A may take more than a single academic year to accomplish and will need flexibility and patience from UCF. To retain our hires we must pay them a generous salary, give them reasonable teaching loads, and provide them with good space and equipment. Retention of these faculty will also depend on the core faculty (current and those hired) coming together as a cohesive group in regular meetings and making progress on research together. The current core faculty are committed to this goal. 6 Further Plans 6.1 Plans for Achieving National and International Prominence Our long term plan for achieving national and international prominence for our research is to gain a reputation for careful, scientific evaluation of the efficacy, efficiency, and usability of our proposals in demonstration prototypes. This would not stop UCF researchers from publishing ideas or theoretical papers before experimental evaluation, but we are committed to careful evaluation of tools and methods as soon as possible. This kind of evaluation will yield insights to both the faculty designing tools and methods as well as the faculty doing behavioral studies. Through such behavioral studies we hope to gain insights into the minds of technical specialists and ordinary users, which can contribute to fundamental knowledge of human behavior and also to ideas for developing better tools and methods. We believe that gaining a reputation for careful scientific evaluation will make a solid reputation for work done at UCF, and will also lead to increased understanding, not only among UCF researchers, but within academia, government, and business. Furthermore, we plan to leverage the broad spectrum of interests in this cluster to ensure that our work is aimed at real problems and that the solutions proposed make sense in the context of society, ethics, and politics. We will ensure that problems and solution approaches are thoroughly discussed with our (mostly associated) cluster members in Legal Studies, Management, Marketing, Philosophy, and Political Science. This kind of exchange will increase the understanding of all the 7
8 faculty in the cluster as well as helping ensure that the problems and solutions we pursue are grounded in reality. In the long run, this will help the cluster enhance its reputation and impact. Our short term plans for achieving national and international prominence are to focus on areas that leverage our unique capabilities (such as expertise in modeling and simulation) or that are becoming increasingly important, but which have not yet had an overwhelming number of researchers exploring them. In the short term we plan to focus on security and privacy for the Internet of Things (IoT) and on insider threats. Although these areas are not unknown to other researchers, their prominence is relatively new. In particular, they have only recently become a focus of funding efforts. In both of these areas, we plan to leverage our unique balance between the technical and behavioral aspects of cyber security and privacy. 6.2 Plans for Increasing Scholarly Work Our plan for achieving national and international prominence does not rely on increasing the amount of scholarly work written and submitted for publication, but rather on increasing the quality of the cluster s collective scholarly output by making sure that it addresses real problems, has solutions that are ethically sensible in the current social and political context, and by careful, scientific evaluation. The scientific evaluations will be done in a cooperative manner, and may result in separate publications about evaluation methods. By this strategy, we plan to increase our reputation and the impact of our work, enhancing its influence (e.g., citations). This increased impact should lead to increased funding, which will result in more talented graduate students being hired, hence in more quality publications. Cooperation, between technical and behavioral interests in the cluster will be the key to getting such careful, scientific evaluations done without delaying publication, and in enhancing the value of cooperating with other faculty in the cluster. 6.3 Plans for Enhancing Research Capacity and Funding Base Fundamentally, adding new faculty will allow UCF researchers to pursue large research projects and contracts. It would also help UCF leverage our growing relationship with cyber security firms (such as Raytheon). Having faculty leaders at UCF to focus efforts in this area and to get more faculty thinking about cyber security and privacy issues will draw more faculty time and talent to this area. Currently UCF does not have funding from some federal agencies (e.g., DHS) in cyber security and privacy. Our senior hire (hire A) will have appropriate connections and will take groups of junior faculty to visit funding agencies and promote the strengths/capabilities of the cluster so that funding to the cluster can be enhanced. Our plans for enhancing our research capacity and funding base also include becoming designated as an NSA center for cyber operations, which will give us access to funding opportunities that we would not otherwise have. This designation hinges on various technical courses and a commitment of faculty to consider cyber security and privacy in an integrated manner in various courses. 6.4 Plans for Enhancing Interdisciplinary Publications in Multiple Disciplines Our plan is that interdisciplinary publications will emerge in several ways. First, the cluster s overall emphasis on collaboration between technical and behavioral interests and its commitment 8
9 to careful, scientific evaluation of tools and methods will result in a series of interdisciplinary publications. Second, the interactions between cluster members at the cluster s regular meetings to brainstorm about problems and solutions will spark papers that explore the landscape of problems and solutions. Such papers that are grounded in both technical knowledge and a knowledge of social, political, legal, and business perspectives will be able to use reasoning that is not limited to one of these perspectives. Finally, we have planned our hiring strategy to encourage interdisciplinary research between closely-related research areas, as each cluster hire is targeted to foster cooperation between at least two broad areas of interest in the cluster. 7 Related Centers at Other Universities In this section we discuss other centers that focus on cyber security and privacy. We note that these centers are not focused on the combination of technical and behavioral aspects of cyber security and privacy as we are proposing. The Georgia Tech Information Security Center ( has members from the College of Computing, College of Engineering, College of Business, College of Liberal Arts, the Office of Information Technology and the Georgia Tech Research Institute. The projects mostly deal with secure communications hardware, prototyping, robotics & unmanned systems, threat systems, and test & evaluation. There is hardly any effort on the privacy aspects, end-user involvement, and human factors. The Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University ( includes faculty from six different colleges and 20+ departments across campus. CERIAS has a huge array of projects that include Assured Identity and Privacy, Cryptology and Rights Management, End System Security, Human Centric Security, Network Security, Policy, Law and Management Prevention, Detection and Response, Security Awareness, Education, and Training. While some of these focus on behavioral aspects of security, most of these projects are led by a single PI and not really interdisciplinary. CyLab at Carnegie Mellon University ( is one of the largest university-based cybersecurity research and education centers in the U.S. It has more than 50 faculty and 100 graduate students from more than six different departments and schools. Projects include Trustworthy Computing Platforms & Devices, Next-Generation Secure & Available Networks Mobility, Security of Cyber-Physical Systems, Secure Home Computing Survivable Distributed Systems & Outsourced Services, and Privacy Protection. However, these projects do not typically combine technical and behavioral aspects of security and privacy. The University of Maryland s Cybersecurity Center (MC2) ( is an NSA-designated Center of Academic Excellence in Information Assurance Research. With about 40 faculty involved, the research focus is primarily on wireless and network security, secure software, cyber supply chain security, privacy in social networks, cybersecurity policy, cryptography, attacker behavioral analysis, health care IT, multimedia forensics, and the 9
10 economics of cybersecurity. The scope of their work is broad and overlaps with some of the research we are proposing, but is not focused on the IoT and a combination of technical and behavioral research. The Institute for Security, Technology, and Society (ISTS) at Dartmouth College ( has supported 64 faculty members. ISTS engages in interdisciplinary research, education and outreach programs that focus on information technology (IT) and its role in society, particularly the impact of IT in security and privacy. Current projects include areas of Healthcare Information Technology Security, Education Initiatives in Information Security and Privacy, and Network and Systems Security. There appears to be less emphasis on the combination of technical and behavioral issues than what we are proposing. Virginia Tech ( has three "centers" related to cybersecurity. Virginia Tech offers technical undergraduate and graduate programs in cybersecurity, with faculty conducting research in information security, network security, hardware security, and software security. Research that combines technical and behavioral aspects has taken a back seat to this technical focus. The Florida Center for Cybersecurity (FC 2, at the University of South Florida is intended to be a shared resource for all Florida's higher education, government, defense and business communities. The center was created in 2014 and research projects are just getting started in It has less of a technical focus than the centers described previously, and does not have a research focus that combines technical and behavioral aspects of security. Our plan is to cooperate with the FC 2 to enhance opportunities and education for all of Florida, with UCF providing technical and behavioral expertise to augment their business-focused efforts. As can be seen from the above, many universities have centers already operating in cyber security. UCF s position as a leader in Modeling and Simulation (through the IST) will give us an edge in competing with these centers to provide cyber Modeling and Simulation capabilities (such as the ones that the DoD is seeking). Many of these centers follow the advice of the National Science Foundation and combine faculty experts from very different disciplines, as we are proposing. However, most of these centers do not emphasize behavioral aspects of cyber security and privacy as we propose. 10
11 Appendix A: Relevant Prior or Current Grant Funding Gary Leavens: TWC: Medium: Collaborative: Flexible and Practical Information Flow Assurance for Mobile Apps, NSF, $325K, Mainak Chatterjee: a proposal submitted to the Florida Center for Cybersecurity (FC 2 ): Vulnerability and Survivability of Cyberspace: Basic Science to Applications, FL FC 2, $25K, Sumit Jha: Formal Methods for Security and Privacy in Cyber-Physical Systems, submitted to NSF, $1, Provable Security for Next-Generation Nanoscale Computing Systems using High- Performance Formal Methods, submitted to FL FC 2, $9K, Sheau-Dong Lang: Forensic Science Center for Excellence Program, submitted to NIST, $3.5M, Joseph LaViola: the following were to build systems for cryptographers: Interaction and the Analyst Workstation of the Future, US Air Force Research Lab Award FA , $70,000, June 2008 June Sketching Mathematical Algorithms, US Air Force Research Lab A-SpaceX Award FA C-0131, $53,078 of $250,000, Feb Feb Sketching Mathematical Algorithms, Disruptive Technology Office A-SpaceX Award N C-0186, $75,943 of $350,000, Sept Dec Mubarak Shah: Identity Assurance using Biometrics for Cybersecurity, $50K, FL FC 2, Damla Turgut: TWC: Small: Value of privacy in the mobile economy, submitted to NSF, $364K, Changchun (Cliff) Zou: Modeling and Measuring Botnets, NSF Cyber Trust, $175K, Intel Research Fund on vulnerability analysis and hardware validation, $53K, Yier Jin and Changchun (Cliff) Zou: Smart Grid Security Protection through Cross-Layer Approaches, FL FC 2, $33K, EDU: Collaborative: Cybersecurity Bridging Courses for non-stem Students and Professionals, submitted to the NSF, $100K, 2014 Yier Jin: TWC: Small: Collaborative: Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach, NSF, SaTC: STARSS: RESULTS: Reverse Engineering Synthesis on Ubiquitous Logic for Trustworthiness and Security, submitted to NSF, $338K, Peter Yuan: (also the MIST Center is doing research on hardware security): Information Assurance for Secured Mobile Healthcare Systems, $50K, FL FC2, David Metcalf: work with the Marines and DHS: Combat Hunter Profiling Part-Task Trainer Minigame Phase II Development and Evaluation Study, US JFCOM SIGNS Dept. of Homeland Security / Federal Law Enforcement Training Center 11
12 Waldemar Karwowski: Complex Systems Engineering for Rapid Computational Socio-Cultural Network Analysis, Award No.: N , , Human Social Cultural Behavioral Program, Office of Naval Research. Mark Shafer and Michael Macedonia: University of Central Florida Intelligence Community Center for Academic Excellence, DIA, Martin Richardson: a contract from DIA for advanced laser intelligence sensing: Long-Range Laser Measurements and Signatures Intelligence, DIA, $150,000, Corey Bohil: (has also published research on cognitive games and user response patterns) Active authentication using covert cognitive interrogation games. DARPA Active Authentication Program Shawn Burke: Leadership-followership: Moving beyond traditional leadership to build highly functioning autonomous teams. NASA $100K, Shared Leadership: Moving Beyond Virtuality and Distribution to Build Capacity in Virtual Organizations. NSF $150K, Understanding, measuring, and modeling the effects of culture in negotiation and collaboration: A dynamic, multi-level view of culture. ARO MURI, $1.88M, Investigating Methods for Improving Performance in Military Multiteam Systems (Leveraging Social Identity as a Way to Reduce Goal Conflict and Improve Coordination Within Military Multiteam Systems, Army Research Institute, $115K , Promoting the understanding of team-level cognition within the warfighter: The application of metrics in simulation. With F. Jentsch. ONR, $215K Examining Leadership Processes in Complex Network Environments. Army Research Institute, $315K, Peter Hancock and Randall Shumaker: RCTA FY2014 Task H1-3: Investigate the Role of Trust and System Transparency in SMM Development during Tactical HRI, General Dynamics, Florian Jentsch and Randall Shumaker: RCTA FY2014 Task H1: Shared Mental Models for Soldier (SR) Teaming, General Dynamics, Dana Joseph: (work on deviant behavior in the workplace related to misuse of data): Measuring Workplace Discrimination: Is Breadth Better than Depth? National Inst. for Occupational Safety and Health, $13K, Blinded by the Light: The Dark Side of Traditionally Desirable Personality Traits, Industrial and Organizational Psychology, Mark Johnson: related to digital forensics: Measuring the Frequency Occurrence of Handwriting and Hand-Printing Characteristics, National Institute of Justice, $500, present. James A. Beckman: Author of a book and several articles on National Security, including Comparative Legal Approaches to Homeland Security (Ashgate, 2008). Timothy Ravich: National expert on Aviation Law and one of only 37 board certified aviation lawyers in the State of Florida. Dr. Ravich is the author of several major books on the topic, including Aviation Law After September 11 th (Vandeplas 2010), Fundamentals of Florida Air 12
13 and Space Law (forthcoming, 2015), and Drone Law (American Bar Association, forthcoming 2015). Carol Bast: Author of multiple books on law and an expert on privacy, wiretapping, eavesdropping, and the Foreign Intelligence Surveillance Act. Dr. Bast s research on the topics of privacy, wiretapping and FISA have appeared in such forums as The Lawyer s Guide to Ethics and Technology, The Oxford Companion to American Law, Criminal Law Bulletin, New York Law School Law Review, St. Mary s Law Review, Midwest Law Review, and many others. Amit Joshi: authored several articles on value/return on investments. Marshall Schminke: authored several articles on workplace privacy issues including The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices, Jour. Bus. Ethics, 2007, and Employee Reactions to Internet Monitoring, Jour. Bus. Ethics, Joseph Brennan: authored articles about coding in smart cards and medical devices including: Low Complexity Multiplication in a Finite Field Using Ring Representation. IEEE Trans. Comput., 2003; Montgomery multiplication over rings, Journal of the Franklin Institute, Nancy Stanlick: authored two books and several articles on ethics including: Asking Good Questions: Case Studies in Ethics and Critical Thinking (Indianapolis: Hackett, 2015); American Philosophy: The Basics (Routledge, 2012); Reconciling with Harm: An Alternative to Forgiveness and Revenge, Florida Philosophical Review, 2010; Individual-Centered Collaborative Research, Teaching Philosophy, 2007; grant: Core Commitments: Educating Students for Personal and Social Responsibility, AAC&U , $ Appendix B: Citations for Cyber Security as a National Priority The nominee for secretary of defense, Dr. Ashton Carter, considers cyber security a priority area (bank info Security, December 3, 2014): Cyber security is the number 1 concern of federal chief information officers (CIOs), as described in the 2014 TechAmerica Federal CIO and CISO Survey: Cyber security is an all encompassing priority for the intelligence community (Federal News Radio, January 22, 2015): Vickers-gives-cyber-premier-priority-status. The shortages in jobs in cyber were reported at the 2014 RSA conference. New DoD Cyber Strategy is found at: Appendix C: Responses to Panel Comments on the Pre-Proposal and at the Q&A The critical mass of faculty seems way too big to manage. Note that there are only 12 core faculty, which would become 17 after hiring. The great interest from associated faculty is an asset, not a liability. We have clarified the role of associated faculty in providing context, for problem definition and solutions. Note that UCF currently has only 2 faculty that spend most of their research time on cyber security. The faculty recruitment plan is ambitious and should be better justified We have scaled back our faculty hiring request to 5 faculty, and given detailed hiring and recruitment plans. Articulate how UCF would move needle. This is addressed in detail above. [Explain] why they are unique and not too late. We expanded on this, see especially section 7. 13
14 Appendix D: Support from Jeff Snyder of Raytheon Dr. A. Dale Whittaker University of Central Florida Provost and Vice President for Academic Affairs Subject: Cyber Security and Privacy Cluster Proposal Dear Dr. Whittaker; As a Cyber Industry professional, I appreciate the great success that Dr. Michael Georgiopoulos and his team have displayed in the Cyber Domain, most recently with their second National Collegiate Cyber Championship, competing against about 200 other prominent Universities and 2400 acclaimed students. I expressly enjoy working with Michael and his team as a member of his Advisory Board and have been impressed with his thought leadership and commitment to the important Cyber Domain. As we all know, this area is so important to our national security and economic stability when you consider the huge intellectual property theft our nation has experienced, cyber crime and financial theft, personal identity theft and cyber nuisance activities. The growth in this cyber threat environment has caused a significant shortage of qualified human capital estimated to be 400,000 in the United States today, 1,000,000 globally, and continuing to grow at a very rapid rate. Well thought out and executed Cyber programs aligned with Engineering and Computer Science are critical to firms like Raytheon, and industry in general, to help close this human capital gap to better protect our nation and its critical infrastructures. I reviewed and commented on the Cyber Security and Privacy Cluster proposal and have significant belief in its foundation, objectives, and the benefit it will generate for UCF and the State of Florida. I am pleased with the proactive approach UCF is taking to expand its Cyber programs and student throughput capability in anticipation of the significant growth in the applicant pool you will experience, particularly in light of your back-to-back National Collegiate Cyber Challenge wins and industry s perception that UCF is a leading Cyber University. In great respect for a great University. Jeff Snyder Vice President, Cyber Programs Raytheon Company (UCF 85) 14
15 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Gary T. Leavens DO NOT EXCEED TWO PAGES PER INVESTIGATOR. Cluster Lead: yes POSITION TITLE, DEPT, & UNIT and or COLLEGE: Chair and Prof., Computer Science, CECS EDUCATION/TRAINING (Begin with baccalaureate or other initial professional education, include postdoctoral training if applicable. Add/delete rows as necessary.) INSTITUTION AND LOCATION DEGREE (if applicable) Completion Date YEAR FIELD OF STUDY Univ. of Michigan, Ann Arbor, Michigan B.S Comp. & Comm. Sciences Univ. of Southern Calif., Los Angeles, California M.S Computer Science Mass. Institute of Technology, Cambridge, Massachusetts Ph.D Computer Science NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster I do research in programming languages and formal methods, which are important techniques used in cyber security. I have also taught graduate classes in static analysis, which are important in cyber security. I also have leadership experience and a breadth of understanding of most areas of computer science related to this cluster. B. Contribution to Scholarship and Creative Activities My work on the design of the formal specification language JML is well known and well cited. (My h-index according to Google Scholar is 47 currently.) I have a Medium NSF grant on information flow security. C. Evidence of Impact & Support I have been program committee chair for several prestigious and important conference in computer science, including the Object-Oriented Programming, Systems, Languages and Applications (OOPSLA) conference (in 2009), the Verified Software: Theories, Tools, and Experiments conference (in 2010), and the Modularity conference (in 2015). I was also general chair of the Systems, Programming, Languages and Applications: Software for Humanity 1
16 (SPLASH) conference in I am on the steering committees for the SPLASH and Modularity conferences. I was editor-in-chief of the journal Transactions on Aspect-Oriented Software Development (published by Springer) from May I am on the editorial board of that journal currently, as well as the editorial boards of the Journal of Object Technology and being an associate editor for the journal Software and Systems Modeling (published by Springer). In addition, I am a member of two IFIP (international Federation of Information Processing Societies) working groups, which are expert groups of senior scientists that nominate their own members. I am a member of working group 2.3 (Software Methodology) and acting chair of working group 1.9/2.15 (Verified Software). 2
17 3 UCF Faculty Cluster Initiative
18 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Mainak Chatterjee DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Associate Professor, CS Division, EECS, CECS EDUCATION/TRAINING Cluster Lead: No INSTITUTION AND LOCATION University of Calcutta, Calcutta, India DEGREE (if applicable) B.Sc. Completion Date YEAR 1994 FIELD OF STUDY Physics (Hons.) Indian Institute of Science, Bangalore, India M.E 1998 Electrical Comm. Engineering University of Texas at Arlington, Arlington, TX Ph.D Comp. Science & Engineering NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster My primary research interest is in the area of security of wireless systems. With most of our devices becoming wireless, we have become vulnerable to a plethora of attacks by virtue of using the shared radio spectrum. Though there is a lot of effort by the industry and governmental agencies, there is still little or no understanding on how to make the wireless systems attack-proof. Oftentimes, the outcome of an attack not only depends on what the attackers do but also on what strategies the defenders take. To that end, we have been applying techniques that lies in the intersection of computer science, electrical engineering, and economics. My value to this cluster lies in my interdisciplinary background allowing me to take more holistic approach towards solving the complex multi-dimensional optimization problems. My understating of real systems with their hardware constraints, the computing and communications vulnerabilities, and the policy loopholes make me uniquely qualified for this cluster. At the same time, I would like to expand my research directions and can use the help of other members of this cluster. 1
19 B. Contribution to Scholarship and Creative Activities Collaboration: I have been collaborating with the Cyber Defense branch of the Air Force Research Laboratory on projects that are not only relevant to the Air Force but to the nation in general. Professional activities: I have served as the TPC chair of many conferences and workshops. The one that is most relevant to this cluster is my chairing the Workshop on Survivability in Cyberspace (WSC) 2010, which was held in Stockholm. I also serve on the TPC of Cyber Security conferences or Networking conferences with Special tracks on Security. Student advising: I have been advising Ph.D. students whose dissertation is aligned with the focus of this cluster. New faculty members in this cluster can co-advise my students or at least actively participate in the dissertation committees. Faculty Fellowships: AFOSR sponsored Air Force Summer Faculty Fellowship in 2012, 2014 and Publications: Recent publications on Cyber Security, Policy enforcement, Threat analysis, and Trust models citations, h-index= 25. C. Evidence of Impact & Support (Briefly describe evidence of impact and support related to the proposed cluster (i.e. external funding, partnerships, collaborations, synergies, new policies, keynote or invited lectures).) External Grants: The Florida Center for Cybersecurity: Vulnerability and Survivability of Cyberspace: Basic Science to Applications, Duration: May 2015 April 2016, Amount: $25,000 (PI, 100%) AFRL/Information Directorate: Demo: Exploiting Diversity for Survivability of Cyberspace, Duration: July 2014 Oct. 2014, Amount: $53,920 (PI, 100%) AFRL/Information Directorate: Network Diversity for Survivability of Cyberspace, Duration: Aug Dec. 2012, Amount: $16,900 (PI, 100%) AFRL/Information Institute: Multi-modal Sensors for Survivability Prediction of Mobile Devices, Duration: Aug Dec. 2012, Amount: $20,000 (Co-PI: 50%. PI was Dr. Jon White.) AFRL/Information Directorate: Trust Models for Vulnerability Assessment in Wireless Cyberspace, Duration: Aug Dec. 2011, Amount: $30,000 (PI, 100%) NSF: EAGER: Tackling Vulnerabilities in Cognitive Radio Networks: A Game Theoretic Approach, Duration: Sept Feb. 2012, Amount: $100,000 (PI, 100%) Invited Talk Game Theoretic Applications to Cyber Operations at Air Force Research Lab, Rome, NY, June 18,
20 BIOGRAPHICAL SKETCH NAME: Ratan K. Guha Cluster Lead: No POSITION TITLE, DEPT, & UNIT and or COLLEGE: Professor, EECS CS, CECS EDUCATION/TRAINING INSTITUTION AND LOCATION Calcutta University, Kolkata, India Calcutta University, Kolkata, India Penn State University, State College, PA University of Texas, Austin, Texas DEGREE (if applicable) B. Sc. M. Sc. Ph. D. Completion Date YEAR FIELD OF STUDY Honors in Mathematics Applied Mathematics Ph. D. student in Computer Science Computer Science A. Personal Statement- your value to the cluster Since 2000, my research and teaching has been in modeling and simulation, and computer networking and security area. These research areas are very closely related to cyber security research. I have received external research and education grants in these related research areas. My research included modeling and simulation of critical infrastructure protection for computer networks. I have worked with an interdisciplinary group in a multi-university research initiative ARO grant (See section C) related to this research. Several Ph. D. students worked in this research area under my supervision. In 2006, I started developing computer security courses for EECS undergraduate students and developed three courses for Security in Computing and Networks (SCAN) minors. Based on the initial development of the courses, we submitted and received an NSF grant (May 15, '09 April 30 '13), Undergraduate Computer Security Course Enhancement. Co-PI Mostafa Bassiouni, Others Arup Guha, Bonnie Swan. I also developed the graduate course CNT Wireless Security and Forensics for EECS students. B. Contribution to Scholarship and Creative Activities My research area includes computer security and privacy. Currently three Ph. D. and one M. S. students are working in the areas of computer security and privacy. The following Ph. D. students under my direction did their research in computer security and privacy related area. 1. Jonathan Cazalas, Efficient and Scalable Evaluation of Continuous, Spatio-Temporal Queries in Mobile Computing Environment, in Computer Science, Spring Jiangyong Dai, Detecting Malicious Software by Dynamic Execution, Summer Zeeshan Furqan, Developing Strand Space Based Models And Proving The Correctness Of The IEEE i Authentication Protocol With Restricted Security Objectives, August
21 4. Shahabuddin Muhammad, Extending Distributed Temporal Protocol Logic to a Proof Based Framework for Authentication Protocols, August Oleg Kachirski, An Interactive Distributed Simulation Framework with Application to Wireless Networks and Intrusion Detection, June Some of my recent publications are also related to the cyber security area. Some of them are listed below. Lugo-Cordero, H., R. Guha, and E. Ortiz-Rivera, An Adaptive Cognition System for Smart Grids with Context Awareness and Fault Tolerance, IEEE Transactions on SMART GRID, Volume 5, page numbers , May, 2014 (2014), DOI /TSG Asanya, C., and R. Guha, Anonymous Retrieval of k-nn POI in Location Based Services (LBS), Proceedings of The 2013 International Conference on Security and Management, Proceedings of The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp , July 22-25, 2013, DOI p2013/sam9741 Lugo-Cordero, H. and R. Guha, What Defines an Intruder? An Intelligent Approach, Proceedings of 2013 IEEE Symposium on Computational Intelligence, April 15-19, 2013 Hassan, S. and R. Guha, Security and Integrity Analysis using Indicators, Proceedings of 2012 SocialInformatics/CyberSecurity/BioMedCom Conference, December 14-16, 2012, / IEEE DOI /SocialInformatics Lugo-Cordero, H. M., R. K. Guha, K. Lu, and D. Rodriguez, Secure Service Distribution for Versatile Service-Oriented Wireless Mesh Networks, IEEE MALWARE 2011, Fajardo, PR, USA, pp 88 94, Oct C. Evidence of Impact & Support 1. I participated as the PI for UCF in a MURI on critical infrastructure protection sponsored by the Mathematics and Computer Sciences Division of the Army Research Office ( ). The universities include University of Wisconsin Madison, George Washington University, Florida State University, and University of Central Florida. The interdisciplinary team for this grant included people from Department of Mathematics and Statistics, Computer Science, Industrial Engineering (Operation Research and Human Factors group) Mostafa Bassiouni also participated in this grant. 2. As the PI I received a multi-university DURIP grant from US Army Research Office (May '04 - Jan '06) " High Performance Cluster Computing for Collaborative Large Scale Simulation", University members: Florida State University (FSU), George Washington University (GWU), and University of Central Florida (UCF). 3. I gave a key note talk titled Artifacts and Indicators Analysis in Cyber Security, on April 18 in 2013 IEEE Symposium on Computational Intelligence, April 15-19, 2013, Singapore. 4. I gave an invited talk titled An Intelligent Approach to Intrusion Detection in a Networking Environment given in the Department of Computer Science, University of Memphis, April 26,
22 NAME: Cliff C. Zou BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Associate professor Cluster Lead: (no) Computer Science Division Department of Electrical Engineering and Computer Science College of Engineering and Computer Science EDUCATION/TRAINING INSTITUTION AND LOCATION University of Science & Technology of China, Hefei, China DEGREE (if applicable) Completion Date YEAR B.S Automation FIELD OF STUDY University of Science & Technology of China, Hefei, China M.S Automation University of Massachusetts, Amherst, MA, USA Ph.D Electrical & Computer Engineering NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster My main research is focusing on cyber security and network security. Thus I could provide core technical contribution to this cybersecurity cluster. With collaboration with other cluster members, I could advance the research on many technical areas such as software security, networking security, security modeling and defense, etc. B. Contribution to Scholarship and Creative Activities My research on cybersecurity has made significant impact in the academic research field. I have pioneered the research on Internet worm and botnet modeling. My Google Scholar citation is over My research work has been interviewed or reported by various media, including National Public Radio, New Scientist Magazine, IEEE communication magazine, Advances in Engineering Magazine, EurekAlert! News Service, and The Register. Our group s research paper has obtained Best Student Paper Award in the prestigious security conference ACSAC My supervised undergraduate research project "Personal Medication Monitor" won the first price in the first annual UCF Inventing Entrepreneurs Innovation Competition in 2010 (reported by UCF News). 1
23 C. Evidence of Impact & Support Google Scholar Citation is over Prior and Current External Funding: o Florida Cybersecurity Center Collaborative Seed Grant: Smart Grid Security Protection Through Cross-Layer Approaches (co-pi, 03/ /2015, $16,667) o NSF REU supplement for CNS ($16,000, 09/ /2010). o NSF Cyber Trust CNS : "Collaborative Research: CT-ISG: Modeling and Measuring Botnets" (PI, 100% share, , $175,000). o Intel Research Fund on vulnerability analysis and hardware validation (PI, 100% share, 08/ /2010, $53,465). Collaborators: Nick Duffield: AT&T Labs Research; David Dagon, Wenke Lee: Georgia Institute of Technology; Weibo Gong, Lixin Gao, Don Towsley: University of Massachusetts at Amherst; Huiyang Zhou, Ning Zhang, Yier Jin, Damla Turgut, Kien Hua, University of Central Florida 2
24 NAME: Yier Jin BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Assistant Professor, ECE EDUCATION/TRAINING INSTITUTION AND LOCATION DEGREE (if applicable) Cluster Lead: no Completion Date YEAR FIELD OF STUDY Zhejiang University, China B.S Electrical Engineering Zhejiang University, China M.S Electrical Engineering Yale University Ph.D Electrical Engineering NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster The increasing complexity of networked computing systems makes modern network systems vulnerable to various attacks against their resources, infrastructure, and operability. While the reasons for such attacks may be tied to complex sociological issues, the cause of our inadequate defense solutions lies in the single-layered approach used to address computer systems security. Current security approaches separate defense strategies into distinct realms, either hardware or software. Accordingly, cross-layer approaches for secure computing and circuit systems are entirely lacking. In addition, the wide usage of third-party IP cores and outsourcing fabrication/packaging services make it possible for malicious hardware modules to enter the design flow and, therefore, complicates the problem of trusted system design and verification. Upon this request, the Security in Silicon Lab (SSL) led by Dr. Yier Jin focuses on these areas and tries to develop solutions address IP core security, cross-layer protection, and smart device security. Further, Dr. Jin has already started interdisciplinary collaborations with other faculty members in the cluster and initiated several projects which will benefit the cluster. A list of these collaboration projects are listed below: PI: Yier Jin, co-pi: Yao Liu (USF), Cliff Zou, Smart Grid Security Protection through Cross-Layer Approaches, Funded by Florida Center for Cybersecurity (FC^2) Collaborative Seed Grant Program, , $50K. PI: Yier Jin, co-pi: Cliff Zou, Yao Liu (USF), Hongmei Chi (FAMU), EDU: Collaborative: Cybersecurity Bridging Courses for non-stem Students and Professionals, Submitted to National Science Foundation. Senior member: Yier Jin, PI: Hyoung Jin Cho, Co-PI: Damla Turgut, RET Site: Collaborative Research and Education of Design Integration for Teachers (CREDIT), Submitted to National Science Foundation. 1
25 B. Contribution to Scholarship and Creative Activities Dr. Jin s research focuses on the areas of trusted embedded systems, trusted hardware intellectual property (IP) cores and hardware-software co-protection on computer systems. He proposed various approaches in the area of hardware security, including the hardware Trojan detection methodology relying on local side-channel information, the post-deployment hardware trust assessment framework, and the proof-carrying hardware IP protection scheme. He is also interested in the security analysis on Internet of Things (IoT) and wearable devices with particular emphasis on information integrity and privacy protection in the IoT era. He serves and has served on the Organizing Committees and Technical Program Committees of many Conferences and Workshops including DAC, ICCAD, HOST, ISVLSI, ATS, ICCD, etc. His work has been reported by media including CNN, Associate Press, VentureBeat, NPR, etc. He gave (and will give) talks at prestigious cybersecurity conferences such as Black Hat USA, RSA Conference, etc. C. Evidence of Impact & Support Dr. Jin s expertise in hardware security helps the proposed cluster to cover a wide spectrum of security research topics. Dr. Jin has been invited to various colleges/universities for talks after he joined UCF: Tsinghua University, Beijing, China Oct 2014 Title: Hardware Security from an Emerging Technology Perspective," (Host: Yu Wang) Institute of Computing Technology, Chinese Academy of Science, Beijing, China Oct 2014 Title: Computer System Protection through Hardware-Software Collaboration" (Host: Zhimin Zhang) University of George, Athens, GA Sep 2014 Title: Computer System Protection through Hardware-Software Collaboration" (Host: Kang Li) Pennsylvania State University, State College, PA Sep 2014 Title: Computer System Protection through Run-Time Hardware-Software Collaboration" (Host: Vijaykrishnan Narayanan) University of Connecticut Storrs, CT Aug 2014 Title: Embedded System Security in Smart Consumer Electronics: A Case Study on Google Nest Thermostat" (Host: Domenic Forte) Information Sciences Institute/USC Washington, D.C. May 2014 Title: Security in Silicon - Challenges and Opportunities Ahead" (Host: Youngok Pino) Intel Corp. Hillsboro, OR Nov 2013 Title: Proof-Carrying Based Trusted Embedded System Design and Secure SoC Integration" (Host: David Ott and Mukesh Ranjan) Trustworthy Hardware Workshop New York, NY Nov 2013 Title: Trusted Embedded System Design Through the Unification of Trusted Third-Party Software Programs and Hardware IP Cores" (Host: Cliff Wang) Further, a hardware security team supervised by Dr. Jin has competed in the Final rounds in NYU Poly s CSAW Embedded System Challenge and won Second Place in both 2013 and
26 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Jiann-Shiun Yuan DO NOT EXCEED TWO PAGES PER INVESTIGATOR. Cluster Lead: Gary Leavens POSITION TITLE, DEPT, & UNIT and or COLLEGE: Professor, EECS, CECS EDUCATION/TRAINING (Begin with baccalaureate or other initial professional education, include postdoctoral training if applicable. Add/delete rows as necessary.) INSTITUTION AND LOCATION DEGREE (if applicable) Completion Date YEAR FIELD OF STUDY University of Florida, Gainesville Ph.D Electrical Engineering University of Florida, Gainesville M.S Electrical Engineering National Ocean University B.S Electronic Engineering NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster (Briefly describe your unique value to the cluster and describe any previous interdisciplinary activities related to this cluster.) My research team is working on hardware security using emerging device and STT MRAM technologies. The new computing/memory architectures are targeting for mobile computing and internet of things (IoT) applications. Hardware security can improve cyber security, especially when attackers use software means to attack hardware failure such as repetitive writes to the same memory cell. B. Contribution to Scholarship and Creative Activities (Briefly describe your most significant contributions to scholarship and creative activities. Include appropriate indicators for your area of scholarship and external recognition.) We have published a few papers in the area of hardware security as follows: 1
27 Y. Bi, P. Gaillardon, X. Hu, M. Niemier, J. S. Yuan, and Y. Jin, Leveraging emerging technology for hardware security Case study on silicon nanowire FET and graphene SymFETs, 23 rd Asian Test Symposium, Hangzhou, China, November 16-19, 2014 G. Brussenskily and J. S. Yuan, Robust PUF circuit design against temperature variations and aging effect, International Conference on Security and Management, Las Vages, July 27-20, 2015 Y. Bi, J. S. Yuan, and Y. Jin, Split manufacturing in radio frequency designs, International Conference on Security and Management, Las Vages, July 27-20, 2015 Y. Bi, K. Shamsi, J. S. Yuan, P.-E. Gaillardon, G. de Micheli, X. Yin, X. Hu, M. Niemier, and Y. Jin, Emerging technology based design of primitives for hardware security, ACM Journal on Emerging Technologies in Computing Systems, in revision, C. Evidence of Impact & Support (Briefly describe evidence of impact and support related to the proposed cluster (i.e. external funding, partnerships, collaborations, synergies, new policies, keynote or invited lectures). J.S. Yuan and M. Fang, Information Assurance for Secure Mobile Healthcare Systems, Florida Center of Cybersecurity, $40,000, 3/1/15-2/20/16 2
28 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Waldemar KARWOWSKI DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Professor and Chair, Department of Industrial Engineering and Management Systems, CECS EDUCATION/TRAINING Cluster Lead: no(yes or no) INSTITUTION AND LOCATION Wroclaw University of Technology, Wroclaw, Poland DEGREE (if applicable) M.S. (five year program that integrates BS.) Completion Date FIELD OF STUDY YEAR 1978 Production Engineering Texas Tech University PhD 1982 Industrial Engineering State Institute for Organization and Management in Industry, Warsaw, Poland DSc 2004 Management Science NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster My research and teaching focus on two interdisciplinary fields of study, namely human factors and systems engineering, which includes human-centered design, human-systems integration, cognitive engineering, and computational ergonomics. I also have a very strong background in mathematical modeling and computer simulation of human behavior in the context of humans interacting with complex systems. Throughout my academic career, I have had the opportunity to collaborate with many colleagues from psychology, sociology, health sciences, computer science, computer engineering, design, and mathematics. In close cooperation with other team members at UCF, I will contribute to this cluster by investigating the human aspects of cyber security at the behavioral and social network levels, including insider threats and privacy considerations, and by addressing the related problems of human-centered design of secure cyber infrastructure. As Chair of the IEMS Department, I will also provide the logistical and institutional support of the planned cluster activities, cluster leader(s), as well as the faculty members involved across UCF departments and colleges in order to assure this cluster s success. B. Contribution to Scholarship and Creative Activities Michalski, R., Grobelny, J. and Karwowski, W., 2006, The effects of graphical interface design characteristics on human-computer interaction task efficiency. International Journal of Industrial Ergonomics, 36 (11), Ahram, T.Z., McCauley-Bush, P., and W. Karwowski, 2010, Multi-criteria weighted model to estimate document collections intrinsic dimensionality and enhance information retrieval performance, Journal of Information Sciences, 180 (15),
29 Karwowski, W., Ahram, T.Z., and B. Amaba, Human-Centered Systems Engineering Applications in Service Systems, 5th IEEE International Conference on System of Systems Engineering (SoSE), June 2010, Loughborough University, United Kingdom, pp Bedny, G. and Karwowski, W. (Editors), 2011, Human-Computer Interaction and Operators Performance: Optimizing Work Design with Activity Theory, CRC Press, Taylor & Francis, London. Kantola, J. and Karwowski, W., (Editors), 2012, Knowledge Service Engineering Handbook. CRC Press, Taylor & Francis: London. Karwowski, W. and Ahram, T., 2012, Innovation in user-centered skills and performance improvement for sustainable complex service systems. Work: A Journal of Prevention, Assessment and Rehabilitation, 41: Jiang, H., Karwowski, W., Ahram, T., 2012, Applications of agent-based simulation for human socio- cultural behavior modeling. WORK: A Journal of Prevention, Assessment and Rehabilitation 41: Bedny, G. Z., Karwowski, W., Bedny, I., 2012, Complexity evaluation of computer-based tasks, International Journal of Human-Computer Interaction, 28(4): Çakıt, E., Karwowski, W., Bozkurt, H., Ahram, T., Thompson, W., Mikusinski, P., and Lee, G, 2014, Investigating the relationship between adverse events and infrastructure development in an active war theater using soft computing techniques, Applied Soft Computing, Vol. 25, Mykoniatis, K., Angelopoulou, A. Proctor, M., Karwowski, W., 2014, Virtual humans for interpersonal and communication skills training in crime investigations, Proceedings of the HCI International Conference, 2014, Springer Verlaf, Berlin. Sapkota, N, Karwowski, W. and Ahram, T., Application of evolving self-organizing maps for analysis of human adverse events in the context of complex socio-economic infrastructure interactions, IEEE Transactions on Human-Machine Systems, in press. Member, Board on Human Systems Integration, National Research Council: National Academy of Sciences, USA ( ). Member, Committee on Human Factors, National Research Council: National Academy of Sciences, USA ( ). C. Evidence of Impact & Support Karwowski, W. (PI), Complex Systems Engineering for Rapid Computational Socio-Cultural Network Analysis, Office of Naval Research, Award No.: N ; Karwowski, W. (PI), Modeling Variability of Human Performance in STAMPS. Office of Naval Research, Award No , Invited Keynote Speaker, The challenges of human-systems integration in a complex world: understanding emergent properties of human-systems interactions, IEA th World Congress of the International Ergonomics Association, Recife, Brazil February 2012.
30 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Randall Shumaker DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Director, Institute for Simulation and Training EDUCATION/TRAINING (Begin with baccalaureate or other initial professional education, include postdoctoral training if applicable. Add/delete rows as necessary.) INSTITUTION AND LOCATION DEGREE (if applicable) Cluster Lead: (yes or no) No Completion Date YEAR University of Pennsylvania BSEE 1967 EE FIELD OF STUDY University of Pennsylvania MSE 1969 Computer Engineer University of Pennsylvania PhD 1976 Computer Science A. Personal Statement- your value to the cluster (Briefly describe your unique value to the cluster and describe any previous interdisciplinary activities related to this cluster.) I have had extensive experience with DoD security and computing issues and have maintained close contact with DoD researchers and with technical progress in these areas. I also have significant past and current experience in acquiring and executing multidisciplinary research programs. This experience and linkages within the field will be very useful in developing and sustaining the cluster. The impact of human performance issues with the technical side is an important discriminator for UCF s efforts when compared to others, and this is the area of focus that I bring to the group. B. Contribution to Scholarship and Creative Activities (Briefly describe your most significant contributions to scholarship and creative activities. Include appropriate indicators for your area of scholarship and external recognition.) The modeling and simulation for training grad program administered and supported by IST has grown to 150 students, 80 of which are PhD students.. C. Evidence of Impact & Support (Briefly describe evidence of impact and support related to the proposed cluster (i.e. external funding, partnerships, collaborations, synergies, new policies, keynote or invited lectures).) During the past 7 years under my Directorship IST has nearly tripled in the amount of funded research acquired and has the most diverse span of sponsored research within UCF. I am the PI for the ARL robotics cooperative technology alliance (RCTA) effort in Human Robot Interaction. This has resulted in just under $5M in contracts during the past 5 years supporting collaboration among 4 units within UCF, and links with 4 other major universities. This has just been renewed for an additional 5 years. 1
31 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Florian Jentsch DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Professor, Department of Psychology & Institute for Simulation & Training (IST) [Interim Associate Dean for Research & Faculty Development, College of Sciences] EDUCATION/TRAINING Cluster Lead: no INSTITUTION AND LOCATION Technische Universität Berlin, Germany DEGREE (if applicable) Diplom Ingenieur Completion Date FIELD OF STUDY YEAR 1993 Aeronautical and Astronautical Engineering Embry-Riddle Aeronautical University M.S Aeronautical Science University of Central Florida Ph.D Psychology Human Factors NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster I believe my unique value to the proposed FCI cluster on cyber security and privacy is related to two areas: at the technical level (where I have studied human factors in multiple, securityrelevant areas) and at the collaborative level (where I have both studied teamwork and gained experience administering and collaborating in multiple inter- and multi-disciplinary projects). First, on a technical level, I am very experienced in conducting research for the Departments of Defense, of Homeland Security, and of Transportation in security-related areas at the intersection of human and machine systems. I have studied teamwork, human learning, and human-(automated) system interaction in aviation, security, and robotics. I have also contributed to the understanding of how human difference variables should be represented in the mathematical and computational modeling of crowds, and I have overseen the development of software for training applications in aviation and elsewhere. This research has important implications for the current faculty cluster proposal in that constructs such as mental models, system knowledge, among others, have direct applicability to the problems in cyber security and cyber privacy that the cluster seeks to investigate. Additionally, I have been able to build a successful history and, consequently, a rapport with many of the U.S. departments and agencies that have interest in cyber security. 1
32 Second, my research on human teamwork and the collaboration of teams, especially with respect to heterogeneous teams (in aviation, the military, and elsewhere) and human-systems teaming, is also important to the collaborative challenges that a multi- and interdisciplinary cluster entails. Through the application of these research findings, but also based on my 20+ year experience in conducting multi- and interdisciplinary research at the intersection of psychology, engineering, and computer science, I believe I can be an effective facilitator that helps to bridge disciplinary gaps. For example, I have worked on and led multi-disciplinary projects in aviation, the military, and in security applications. I have also worked on an ONRfunded MURI project and currently am the lead for Human-Robot Interaction in the U.S. Army s Robotics Technology Collaborative Alliance (RCTA). In this role, one of my primary activities is to help coordinate and facilitate the collaboration of human factors psychologists, engineers, computer science, and traditional roboticists. Based on that the combined experience, I believe I will be able to fulfill a similar coordinating role in the proposed faculty cluster. B. Contribution to Scholarship and Creative Activities My focal research areas have been in Team Performance in security-sensitive application areas, as well as in Human-Automation and Human-Robot Interaction in aviation and in the military. I have also led multi-disciplinary teams in the development of software for training and assessment tools in these areas. In my core areas of research, I have maintained a consistent publication record of journal articles, books, chapters, and peer-reviewed proceedings. As of April 2015, I have edited three books, and co-authored 30+ journal articles, 30+ book chapters, 130+ peer-reviewed proceedings papers, and 80+ other articles and presentations. In the area of externally funded contracts and grants, I have been sole PI, lead PI, or Co-PI on 25+ external contracts and grants, often of multi-year duration, with funding from sources such as the Federal Aviation Administration, U.S. Army (ARL, RDECOM, STRICOM), U.S. Navy (ONR, NAWCTSD), Department of Homeland Security, and National Science Foundation. Of this funding, I received individual and unique PI/co-PI credit for $7.1+ million. I was twice recognized as one of the UCF FY Millionaires, in and C. Evidence of Impact & Support The impact and quality of my research has been recognized in multiple ways: In addition to the traditional impact via citations and use by other scientists, I have been invited to editorial activities (e.g., as Associate Journal Editor for several journals), as a frequent reviewer to journals and federal grant panels (including for the U.S. Air Force for a cyber-related project and for the Department of Homeland Security for aviation security applications), and as a representative for large research projects before federal review boards. I have also received numerous awards and recognitions, including two prestigious awards from the American Psychological Association. Finally, my research products have been transitioned to daily use by airlines, the military, and other industries, and I have contributed to applied product development in communications technology and robotics. 2
33 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Morgan C. Wang DO NOT EXCEED TWO PAGES PER INVESTIGATOR. Cluster Lead: no POSITION TITLE, DEPT, & UNIT and or COLLEGE: Professor and Dir. of Data Mining, Statistics, COS EDUCATION/TRAINING (Begin with baccalaureate or other initial professional education, include postdoctoral training if applicable. Add/delete rows as necessary.) INSTITUTION AND LOCATION National Chiao-Tung University, Hsinchu, Taiwan Mankato State University, Mankato, Minnesota Iowa State University, Ames, Iowa DEGREE (if applicable) M.S. B.S. Ph.D. Completion Date YEAR FIELD OF STUDY Marine Management Math/Computer Science Statistics NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster My expertise is in statistics and data mining. I have experience helping companies find knowledge from the vast amounts of data they collected. For this cluster, I am interested in applications statistical techniques to security and privacy problems. Privacy problems certainly need statistical expertise, especially in the era of big data and I am eager to do research in collaboration with others for this cluster. B. Contribution to Scholarship and Creative Activities I set up, maintain, and administrate the Data Mining Laboratory for the Data Mining Program at UCF. I have personally developed and direct the MS in Data Mining program at UCF. I have been instrumental in developing our proposal for a PhD in data analytics. I have developed several courses in statistics, including Statistical Graphics (STA 3096), Nonparametric Statistics (STA 6537), Linear Methods (STA 6246), Statistical Computing (STA 6106), Computer Processing Statistical Data (STA 4102), Advanced Computer Processing Statistical Data (STA 1
34 5103), Data Mining Methodology (STA 6704), Data Preparation (STA 6714), Statistical Analysis (STA 5206), and Data Mining Methodology II (STA 6705). C. Evidence of Impact & Support The following are some of my recent journal publications: Morgan C. Wang and William J. Kennedy, Comparison of Algorithms for Bivariate Normal Probabilities Over a Rectangle Based on Self-Validating Result from Interval Analysis, Journal of Statistical Computation and Simulation, vol. 37, pp (1990). Morgan C. Wang and William J. Kennedy, A Numerical Method for Accurately Approximating Multivariate Normal Probabilities, Computational Statistics and Data Analysis, vol. 13, pp (1992). Morgan C. Wang- and Ned Silver, A Microsoft FORTRAN 77 Program for Determining the Confidence Interval Around the Estimate of the Population Correlation Coefficient for the Vote-Counting Method, Educational and Psychological Measurement, vol. 54, pp (1994). Morgan C. Wang and William J. Kennedy, Self-validating Computations of Probabilities and Percentiles for Selected Central and Non-Central Univariate Probability Functions, Journal of the American Statistical Association, vol. 89, pp (1994). 13 Mary Ann Evans, Myrna Whigham, and Morgan C. Wang, The Effect of a Role Model Project Upon the Attitudes of Ninth Grade Science Students, Journal of Research in Science Teaching, vol. 32, pp (1995). Brad Bushman and Morgan C. Wang, A Procedure for Combining Sample Correlation and Vote Counts to Obtain Estimate and Confidence Interval for the Population Correlation of Coefficient, Psychological Bulletin, vol. 117, pp (1995). Morgan C. Wang and William J. Kennedy, Numerical Methods for Use in Preparing High Quality Statistical Tables, Statistics of Quality, (1997). H. M. Al-Deek, P. D. Angelo, Morgan C. Wang, Travel Time Prediction with NonLinear Time Series, ASCE Journal of Transportation Engineering, Vol. 122, No. 6, (1998) Morgan C. Wang and Brad J. Bushman, Using Normal Quantile Plots in Meta-Analysis, Psychological Methods, Psychological Methods, Vol. 3, No. 1, (1998). Jennifer E. Irvin, Clint A. Bowers, Michael E. Dunn, and Morgan C. Wang, Efficacy of Relapse Prevention: A Meta-Analytic Review, Journal of Consulting and Clinical Psychology, Vol. 67, No. 4, (1999). P. D. Angelo, Al-Deek, and Morgan C. Wang, Travel Time Prediction for Freeway Corridors, Journal of Transportation Research Board, No. 1676, pp (1999). Ahn Y., Nicholson, D. W., and Morgan C. Wang, Inverse method for identifying the underlying crack distribution in plates with random strengths, Journal of ACTA MECHANICA, No. 144 (3-4), pp (2000). 2
35 BIOGRAPHICAL SKETCH Provide the following information for all the core cluster personnel. Follow this format for each person. NAME: Ted Reynolds DO NOT EXCEED TWO PAGES PER INVESTIGATOR. POSITION TITLE, DEPT, & UNIT and or COLLEGE: Senior Research Fellow in Terrorism Studies, Office of Global Perspectives EDUCATION/TRAINING (Begin with baccalaureate or other initial professional education, include postdoctoral training if applicable. Add/delete rows as necessary.) INSTITUTION AND LOCATION DEGREE (if applicable) Cluster Lead: no Completion Date YEAR FIELD OF STUDY Rollins College BA 2000 International Affairs UCF MA 2008 Political Science University of St. Andrews PhD 2015 International Relations NOTE: The Biographical Sketch may not exceed two pages. Follow the formats and instructions below. A. Personal Statement- your value to the cluster I hope to bring a different perspective to the cluster by examining various aspects of social media and other computer mediated communications and how they are used in various movements. B. Contribution to Scholarship and Creative Activities Ongoing research is focused on understanding online behavioral analytics toward identifying persons of interest in extremist/terrorist fora. C. Evidence of Impact & Support Currently hold a U.S. Patent for a threat identification and mitigation system in online environments, work with cyber warfare contractors, and engage with various elements within government in this area of interest. Facilitated a teaming agreement between UCF and RSIGNIA, which is a cyber warfare contractor in Maryland. Security clearance held by UCF. 1
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Graduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of
We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.
Faculty of Engineering School of Computing Lecturer / Associate Professor in Computer Science We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to
UNIVERSITY PROPOSAL SAMPLES
UNIVERSITY PROPOSAL SAMPLES Appalachian State University: The Institution and Physics Department Appalachian state University (ASU) is a mid-sized regional state university serving approximately 15,000
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Department of Marketing College of Business Florida State University. 2007 2011 Strategic Plan
Department of Marketing College of Business Florida State University 2007 2011 Strategic Plan Updated Version Adopted December 10, 2007 International Acclaim. Individual Attention. Department of Marketing
Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security
Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
NORTHEASTERN 2025. Distinctively Excellent PhD Education. Context
Draft: April 10, 2016 NORTHEASTERN 2025 Distinctively Excellent PhD Education Context We are in a moment of Northeastern s history when our PhD programs have the opportunity to excel by building on the
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
FC 2 Collaborative Seed Grant Program
FC 2 Collaborative Seed Grant Program Program Description: The Florida Center for Cybersecurity (FC 2 ) supports and encourages collaboration across the State University System (SUS) to promote research
BS Environmental Science (2013-2014)
BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan ([email protected]) Support for University and College Missions Marshall University is a multi-campus public
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Program Assessment: School of Criminology and Criminal Justice.
Program Assessment: School of Criminology and Criminal Justice. Florida Atlantic University David Binninger, Ph.D. Scott H. Decker, Ph.D. Mark R. Pogrebin, Ph.D. On March 9-12, the external review team
Call for Proposals Next Generation Faculty Program
Call for Proposals Next Generation Faculty Program Introduction Traditional faculty hiring at Georgia State University has focused upon the important task of building disciplinary-specific scholarly depth
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
School of Accounting Florida International University Strategic Plan 2012-2017
School of Accounting Florida International University Strategic Plan 2012-2017 As Florida International University implements its Worlds Ahead strategic plan, the School of Accounting (SOA) will pursue
OFFICE OF THE VICE CHANCELLOR FOR ACADEMIC AFFAIRS. OFFICE OF THE DEAN Org Code: MADNEG
OFFICE OF THE CHANCELLOR STATE OF HAWAI'I UNIVERSITY OF HAWAI'I UNIVERSITY OF HAWAI'I AT MĀNOA OFFICE OF THE VICE CHANCELLOR FOR ACADEMIC AFFAIRS External Advisory Council** Internal Administrative Council**
CURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
LETTER OF INTENT DOCTOR OF PHILOSOPHY IN HEALTH SERVICES POLICY AND PRACTICE UNIVERSITY AT BUFFALO
LETTER OF INTENT DOCTOR OF PHILOSOPHY IN HEALTH SERVICES POLICY AND PRACTICE UNIVERSITY AT BUFFALO A. Program Identity and Abstract 1. Proposed title: Health Services Policy and Practice 2. Proposed award:
MASTER OF SCIENCE IN ELECTRICAL AND COMPUTER ENGINEERING DEGREE PROPOSAL PURDUE UNIVERSITY CALUMET SUMMARY
MASTER OF SCIENCE IN ELECTRICAL AND COMPUTER ENGINEERING DEGREE PROPOSAL PURDUE UNIVERSITY CALUMET SUMMARY 1. Characteristics of the Program The objective is to establish a Master of Science in Electrical
Strategic Plan 2013 2017
Plan 0 07 Mapping the Library for the Global Network University NYU DIVISION OF LIBRARIES Our Mission New York University Libraries is a global organization that advances learning, research, and scholarly
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
How To Become Director Of Development At Northeastern
DIRECTOR OF DEVELOPMENT BOSTON, MA Position Overview The College of Computer and Information Science (CCIS) at Northeastern University seeks an entrepreneurial, proactive, and engaging fundraising professional
THE UNIVERSITY OF MARYLAND COLLEGE PARK MISSION STATEMENT
PREAMBLE THE UNIVERSITY OF MARYLAND COLLEGE PARK MISSION STATEMENT The University of Maryland at College Park, founded in 1856, is the flagship campus and the original land grant institution of the University
The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
Master of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS
BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS Program: Ph.D. in International Crime and Justice CIP Code: 43.0104 Institution: Florida International
ONLINE ONLINE. Master of Science in. Bachelor of Science in
ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear
Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems
Faculty of Engineering School of Electronic and Electrical Engineering University Academic Fellow Smart Energy Systems With a vision and drive to develop a prestigious internationally competitive research
Computer Science. College of Engineering
Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree
LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE
LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE 021015 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
Strategic Initiatives College of Science, August, 2004
College of Science Strategic Initiatives College of Science, August, 2004 MISSION: To graduate students who understand and appreciate the art of scholarship, who have an excellent grasp of the fundamental
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It
THE ASSESSMENT OF GRADUATE PROGRAMS IN ART AND DESIGN. National Association of Schools of Art and Design
THE ASSESSMENT OF GRADUATE PROGRAMS IN ART AND DESIGN National Association of Schools of Art and Design Copyright 2009, 1992, 1990 by the National Association of Schools of Art and Design Reston, Virginia
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS
BOARD OF GOVERRS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS Program: Doctor of Social Work CIP Code: 51.1503 Institution: Florida Atlantic University Proposed Implementation
The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization
The University of Texas at Austin - Portugal An international partnership in graduate education, research, and technology commercialization Technical Appendix to the Memorandum of Understanding toward
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
An Invitation to Apply: UNIVERSITY of CALIFORNIA IRVINE DIRECTOR, PROGRAM IN NURSING SCIENCE
An Invitation to Apply: UNIVERSITY of CALIFORNIA IRVINE DIRECTOR, PROGRAM IN NURSING SCIENCE THE SEARCH The University of California, Irvine (UCI) invites applications and nominations for the position
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)
Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein,
SCHOOL OF URBAN AFFAIRS & PUBLIC POLICY CRITERIA AND PROCEDURES FOR PROMOTION AND TENURE
SCHOOL OF URBAN AFFAIRS & PUBLIC POLICY CRITERIA AND PROCEDURES FOR PROMOTION AND TENURE The School of Urban Affairs and Public Policy is an interdisciplinary graduate and professional school, designated
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
Computer Science at James Madison University
Computer Science at James Madison University Dr. Sharon Simmons Department Head for Computer Science Dr. Nathan Sprague and Dr. Chris Mayfield Faculty Members and CS Advisors February 14, 2015 1 WHAT IS
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Cover/Signature Page Full Template
Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &
Dean of the College of Pharmacy and Health Sciences
1 Dean of the College of Pharmacy and Health Sciences Texas Southern University invites nominations and applications for the position of Dean of the College of Pharmacy and Health Sciences (COPHS). Reporting
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Northrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Security Education for the new Generation
Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 AM @ WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor
How To Get A Computer Science Degree At Coastal Carolina University
New Degree Program in Information Technology Mike Murphy, Ph.D., Assistant Professor, Department of Computing Sciences Will Jones, Ph.D., Associate Professor and Chair, Department of Computing Sciences
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Master of Science in Engineering - Electrical Engineering Option (MSE-EE) Student Outcomes Assessment Plan (SOAP)
Master of Science in Engineering - Electrical Engineering Option (MSE-EE) Student Outcomes Assessment Plan (SOAP) Updated August 4, 2010 Mission Statement The objective of MSE-EE Program is to provide
CONTENT. King Hussein Faculty of Computing Sciences
CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.
