Yier Jin. Department of Electrical Engineering and Computer Science University of Central Florida
|
|
|
- Megan Daniels
- 9 years ago
- Views:
Transcription
1 Yier Jin Department of Electrical and Computer Engineering University of Central Florida, Orlando, FL Phone: (407) , Fax: (407) RESEARCH INTERESTS EDUCATION Internet of Things (IoT) security Trusted and reliable processors and integrated circuits Cryptographic hardware and embedded systems Proof-carrying based hardware IP cores protection Functional programming and proof writing for trusted IP cores Trustworthy SoC architecture Hardware-software co-design for system level security protection Yale University, New Haven, Connecticut, USA Ph.D. in Electrical Engineering, 2012 Advisor: Yiorgos Makris Thesis Title: Trusted Integrated Circuits Zhejiang University, Hangzhou, China M.S. in Electrical Engineering, June 2007 Advisors: Shiju Li, Xiaolang Yan and Haibin Shen Thesis Title: High Performance Finite Field Multipliers B.S. in Electrical Engineering, June 2005 Honors Graudate PROFESSIONAL POSITIONS Assistant Professor Department of Electrical Engineering and Computer Science University of Central Florida Associate Partner Intel Collaborative Research Institute for Secure Computing Present Present Cyber-Physical System Security Subcommittee Chair Present IEEE Technical Committee on Cybernetics for Cyber-Physical Systems (CCPS) Member Present Florida Institute for Cyber Security (FICS) at the University of Florida HONORS DISTINCTIONS Best Paper Award, Asian and South Pacific Design Automation Conference (ASP-DAC), 2016 First Place Award (2011), Second Place Award (2008, 2013, 2014, 2015), Third Place Award (2009), NYU-Poly Cyber Security Awareness Week (CSAW) - Embedded System Challenge Second Place Award, CyberSEED IoT Security Challenge, University of Connecticut, 2015 Best Paper Award, Design Automation Conference (DAC), 2015 Travel Award, NSF-SRC-SIGDA-DAC Design Automation Summer School, 2009 Honor Graduate, Zhejiang Provincial Institution of Higher Learning, The Educational Office of Zhejiang Province, China, 2005 Excellent Graduate Award, Zhejiang University, 2005 Undergraduate Scholarship, Zhejiang University,
2 PANELS PUBLICATIONS A. BOOK CHAPTER B. JOURNAL PUBLICATIONS 1. Cyber Physical Systems Security: What Are the Challenges and best Practices? Florida Institute for Cybersecurity Research: Annual Conference on Cybersecurity, February 9, ATARC Visionary Panel - Mobile Technology of the Future, ATARC Federal Mobile Computing Summit, August 12, Hacking Things: Security and Privacy Challenges in Internet of Things, IEEE Conference on Communication and Network Security, September 28, Chip-Hong Chang, Miodrag Potkonjak (Editors), Secure System Design and Trustable Computing, Springer, 2015 (Yier Jin, Dimitry Maliuk, Yiorogs Makris, Chapter 7. Hardware Trojan Detection in Analog/RF Integrated Circuits ) 2. Mark Tehranipoor, Cliff Wang (Editors), Introduction to Hardware Security and Trust, Springer, 2011 (Yier Jin, Eric Love, Yiorgos Makris, Design for Hardware Trust ) 1. Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor, Introduction to Cyber-Physical System Security: A Cross-Layer Perspective, IEEE Transactions on Multi-Scale Computing Systems (to appear) 2. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael Niemier, and X. Sharon Hu, Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs, IEEE Transactions on Emerging Topics in Computing (TETC). (to appear) 3. Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and M. Tehranipoor, Hardware Trojans: Lessons Learned After One Decade of Research, ACM Transactions on Design Automation of Electronic Systems (TO- DAES). (to appear) 4. Sandip Ray, Yier Jin, and Arijit Raychowdhury, The Changing Computing Paradigm with Internet of Things: A Tutorial Introduction, IEEE Design & Test, vol. 33, issue. 2, pp , Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin, Privacy and Security in Internet of Things and Wearable Devices, IEEE Transactions on Multi-Scale Computing Systems, vol. 1, issue 2, pp , Yier Jin, Introduction to Hardware Security, Electronics, vol. 4, issue. 4, pp , Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, and Yier Jin, Emerging Technology based Design of Primitives for Hardware Security, ACM Journal on Emerging Technologies in Computing Systems, vol. 89, no. 2, pp , Yu Bi, Jiann-Shiun Yuan, and Yier Jin, Beyond the Interconnections: Split Manufacturing in RF Designs, Electronics, vol. 4, issue. 3, pp , Daniela Oliveira, Nicholas Wetzel, Max Bucci, Jesus Navarro, Dean Sullivan, and Yier Jin, Hardware-Software Collaboration for Secure Coexistence with Kernel Extensions, ACM SIGAPP Applied Computing Review, vol. 14, no. 3, pp , September Eric Love, Yier Jin, and Yiorgos Makris, Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition, IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, no. 1, pp , January 2012.
3 11. Yier Jin, and Yiorgos Makris, Hardware Trojans in wireless cryptographic integrated circuits, IEEE Design & Test on Computers,, vol. 27, pp , Haibin Shen, and Yier Jin, Low Complexity Bit Parallel Multiplier for GF(2 m ) Generated by Equally-Spaced Trinomials, Information Processing Letters, Volume 107, Issue 6, 2008, pp Yier Jin, Haibin Shen, Huafeng Chen, and Xiaolang Yan, Research of Fast Modular Multiplier for a Class of Finite Fields, Journal of Electronics (China), Volume 25, Issue 4, 2008, pp C. NEWSLETTER D. CONFERENCE PROCEEDINGS 1. Yier Jin, Hardware Security: Past, Current, and Future, VLSI Circuits and Systems Letter, vol. 1, no. 1, pp , April (invited) 2. Dean Sullivan, Yier Jin, What is Hardware-based Cybersecurity? ACM/SIGDA E-Newsletter, vol. 45, no. 4, April (invited) 1. Yu Bi, Kaveh Shamsi, Xunzhao Yin, Michael Niemier, Sharon Hu, and Yier Jin, Enhancing Hardware Security with Emerging Transistor Technologies, GLSVLSI, (to appear) 2. Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking, IEEE Symposium on Hardware Oriented Security and Trust, (to appear) 3. Kaveh Shamsi and Yier Jin, Security of Emerging Non-Volatile Memories: Attacks and Defenses, IEEE VLSI Test Symposium (VTS), (to appear) 4. Sandip Ray, Swarup Bhunia, Yier Jin, and Mark Tehranipoor, Security Validation in IoT Space (Extended Abstract), IEEE VLSI Test Symposium (VTS), (to appear) 5. Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin, and Dean Sullivan, Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity, IEEE/ACM Design Automation Conference (DAC 16), (to appear) 6. Adib Nahiyan, Domenic Forte, Yier Jin, Mark Tehranipoor, Xiao Kan, and Kun Yang, Framework of Security Vulnerabilities in Finite State Machines, IEEE/ACM Design Automation Conference (DAC 16), (to appear) 7. Travis Meade, Yier Jin, Mark Tehranipoor, and Shaojie Zhang, Gate-Level Netlist Reverse Engineering for Hardware Security: Control Logic Register Identification, IEEE International Symposium on Circuits and Systems (IS- CAS), (to appear) 8. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Francois-Xavier Standaert, and Yier Jin, Leverage Emerging Technologies For DPA-Resilient Block Cipher Design, Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp An Chen, X. Sharon Hu, Yier Jin, Michael Niemier, Xunzhao Yin, Using Emerging Technologies for Hardware Security Beyond PUFs, Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp Travis Meade, Shaojie Zhang, and Yier Jin, Netlist Reverse Engineering for High-Level Functionality Reconstruction, in 21st Asia and South Pacific Design Automation Conference (ASP-DAC 2016), 2016, pp (Best Paper Award) 11. Jacob Wurm, Orlando Arias, Khoa Hoang, Ahmad-Reza Sadeghi and Yier Jin, Security analysis on consumer and industrial IoT Devices, in 21st Asia and South Pacific Design Automation Conference (ASP-DAC 2016), 2016, pp
4 12. Kaveh Shamsi, Pierre-Emmanuel Gaillardon, and Yier Jin, Hardware Platform Protection Using Emerging Memory Technologies, Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp Travis Meade, Shaojie Zhang, Mark Tehranipoor, and Yier Jin, A Comprehensive Netlist Reverse Engineering Toolset for IC Trust, Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, and Yier Jin, More Than Moore in Security: Emerging Device based Low-Power Differentiate Power Analysis Countermeasures, Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp Sandip Ray, and Yier Jin, Security Policy Enforcement in Modern SoC Designs, International Conference On Computer Aided Design (ICCAD), 2015, pp Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, Hierarchy-Preserving Formal Verification Methods for Pre-Silicon Security Assurance, 16th International Workshop on Microprocessor and SOC Test and Verification (MTV), Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael Niemier and X. Sharon Hu, Reliable and High Performance STT-MRAM Architectures based on Controllable-Polarity Devices, IEEE International Conference on Computer Design (ICCD), 2015, pp Omar Nakhila, Yier Jin, and Cliff Zou, Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks, IEEE Military Communications Conference (MILCOM), 2015, pp Yu Bi, Jiann-Shiun Yuan, and Yier Jin, Split Manufacturing in Radio-Frequency Designs, The 2015 International Conference on Security and Management (SAM 15), 2015, pp Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin, HAFIX: Hardware- Assisted Flow Integrity Extension, IEEE/ACM Design Automation Conference (DAC 15), (Best Paper Award) 21. Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, and Prabhat Mishra, Pre-Silicon Security Verification and Validation: A Formal Perspective, IEEE/ACM Design Automation Conference (DAC 15), Yang Liu, Shiyan Hu, Jie Wu, Yiyu Shi, Yier Jin, Yu Hu, and Xiaowei Li, Impact assessment of net metering on smart home cyberattack detection, IEEE/ACM Design Automation Conference (DAC 15), Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Yier Jin, Cyber-Physical Systems: A Security Perspective, European Test Symposium (ETS 15), Jeff Biggers, Travis Meade, Shaojie Zhang, Youngok Pino, and Yier Jin, Automated RTL Code Rebuilding through Netlist Analysis, Government Microcircuit Applications and Critical Technology Conference (GOMACTech-15), 2015, pp Yu Bi, Pierre-Emmanuel Gaillardon, X. Sharon Hu, Michael Niemier, Jiann- Shiun Yuan, and Yier Jin, Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs, Asia Test Symposium (ATS), 2014, pp Yier Jin, Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits, IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2014, pp
5 27. Dean Sullivan, Jeff Biggers, Guidong Zhu, Shaojie Zhang, and Yier Jin, FIGHT- Metric: Functional Identification of Gate-Level Hardware Trustworthiness, Design Automation Conference (DAC), 2014, pp. 173:1 173: Yier Jin, and Dean Sullivan, Real-Time Trust Evaluation in Integrated Circuits, Design, Automation and Test in Europe Conference and Exhibition, (DATE), Yier Jin, EDA Tools Trust Evaluation through Security Property Proofs, Design, Automation and Test in Europe Conference and Exhibition, (DATE), Yier Jin, and Yiorgos Makris, A Proof-Carrying Based Framework for Trusted Microprocessor IP, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2013, pp Yu Liu, Yier Jin, and Yiorgos Makris, Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration and Detection Method Evaluation, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2013, pp Yier Jin, Dimitry Maliuk and Yiorgos Makris, A Post-Deployment IC Trust Evaluation Architecture, Proceedings of IEEE International On-Line Testing Symposium (IOLTS), July 2013, pp (invited) 33. Yier Jin, Bo Yang and Yiorgos Makris, Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), June 2013, pp Ozgur Sinanoglu, Naghmeh karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Dimitry Maliuk, Ke Huang, Yiorgos Makris, Reconciling the IC Test and Security Dichotomy, Proceedings of 18th IEEE European Test Symposium (ETS), May 2013, pp Yier Jin, Michail Mihalis and Yiorgos Makris, Exposing Vulnerabilities of Untrusted Computing Platforms, Proceedings of the IEEE International Conference on Computer Design (ICCD), 2012, pp Yier Jin, and Yiorgos Makris, Proof Carrying-Based Information Flow Tracking for Data Secrecy Protection and Hardware Trust, Proceedings of VLSI Test Symposium (VTS), 2012, pp Yier Jin, Dimitry Maliuk and Yiorgos Makris, Post-Deployment Trust Evaluation in Wireless Cryptographic ICs, Proceedings of the Design, Automation & Test in Europe (DATE), 2012, pp Yier Jin and Yiorgos Makris, PSCML: Pseudo-Static Current Mode Logic, Proceedings of 18th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2011, pp Yier Jin and Yiorgos Makris, Is Single Trojan Detection Scheme Enough?, Proceedings of the IEEE International Conference on Computer Design (ICCD), 2011, pp Eric Love, Yier Jin and Yiorgos Makris, Enhancing Security via Provably Trustworthy Hardware Intellectual Property, Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011, pp Yier Jin and Yiorgos Makris, DFTT: Design-for-Trojan-Test, Proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010, pp Yier Jin, Nathan Kupp and Yiorgos Makris, Experiences in Hardware Trojan Design and Implementation, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2009, pp
6 43. Yier Jin, and Yiorgos Makris, Hardware Trojan Detection Using Path Delay Fingerprint, Proceedings of IEEE International Symposium on Hardware- Oriented Security and Trust (HOST), 2008, pp Yier Jin, and Haibin Shen, Revisiting Scalable Modular Multiplication over GF(2 m ) for Elliptic Curve Cryptography, Proceedings of 8th International Conference on Solid-State and Integrated Circuit Technology (ICSICT), 2006, pp Yier Jin, Haibin Shen, and Rongquan You, Implementation of SMS4 Block Cipher on FPGA, Proceedings of International Conference on Communications and Networking in China (CHINACOM), 2006, pp Haibin Shen, and Yier Jin, Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation, Proceedings of International Conference on Innovative Computing, Information and Control (ICICIC), 2006, pp Dawei Li, Yier Jin, Haibin Shen, and Xiaolang Yan, Design of Random Number Generation Algorithm, Proceedings of International Conference on Computational Intelligence and Security (CIS), 2006, pp Rongquan You, Haibin Shen, and Yier Jin, Interconnect Estimation for Mesh- Based Reconfigurable Computing, Proceedings of The IFIP International Conference on Embedded and Ubiquitous Computing (EUC), LNCS 4096, 2006, pp E. WORKSHOP PUBLICATION F. POSTER (NO PROCEEDINGS) 1. Kelvin Ly, Wei Sun, and Yier Jin, Emerging Challenges in Cyber-Physical Systems: A Balance of Performance, Correctness, and Security, IEEE Infocom CPSS Workshop, Yier Jin, Innovative IoT Authentication Methods Leveraging Smart Sensors, UCF Conference on Sensor Devices and Applications, Oct Ray Potter, Yier Jin, Don t Touch That Dial: How Smart Thermostats Have Made Us Vulnerable, RSA Conference, Yier Jin, Security and Privacy in Internet of Things and Wearable Devices, CHASE Conference on Secure/Trustworthy Systems and Supply Chain Assurance, Yier Jin, Embedded System Security in Smart Consumer Electronics, 4th International Workshop on Trustworthy Embedded Devices (TrustED 2014), 2014, pp Yier Jin, Grant Hernandez, and Daniel Buentello, Smart Nest Thermostat: A Smart Spy in Your Home, Black Hat USA, Yier Jin, and Daniela Oliveira, Trustworthy SoC Architecture with On- Demand Security Policies and HW-SW Cooperation, 5th Workshop on SoCs, Heterogeneous Architectures and Workloads (SHAW-5), Orlando Arias, Grant Hernandez, and Yier Jin, Case Study on IoT Device Security and Privacy, IEEE/ACM Design Automation Conference (DAC 15), Jacob Wurm and Yier Jin, Comprehensive Security Analysis of Commercial and Industrial Internet of Things Devices, FICS Annual Conference on Cybersecurity, Orlando Arias, and Yier Jin, Hardware-Supported Cross-Layer Cybersecurity Solutions, FICS Annual Conference on Cybersecurity, Kaveh Shamsi, and Yier Jin, Emerging Devices in Hardware Security Applications Beyond PUF, FICS Annual Conference on Cybersecurity, 2016.
7 INVITED PRESENTATIONS The 4th Asia Workshop on Smart Sensor System (AWSSS 2016), Beijing, China March 2016 Title: Security and Privacy in IoT Era: From Attack to Defense (Host: Yongpan Liu) FICS Annual Conference on Cybersecurity, Gainesville, FL Feb 2016 Title: IoT Security: From Hacking to Defense (Host: Mark Tehranipoor and Patrick Traynor) Cisco, Gainesville, FL Dec 2015 Title: Remote Assessment for IoT Security: Tools, Metrics, and Test Platforms (Host: Bill Eklow) National Institute of Standards and Technology (NIST), Gainesville, FL Dec 2015 Title: Remote Assessment for IoT Security: Tools, Metrics, and Test Platforms (Host: Donna Dodson) University of Texas, San Antonio, San Antonio, TX Nov 2015 Title: Security and Privacy on IoT and Wearable Devices (Host: Jianwei Niu) ARO Workshop on Cryptography and Hardware Security for the Internet of Things, College Park, MD Oct 2015 Title: Case study on IoT Device Security and Privacy 2015 China Internet Security Conference (Keynote Speech), Beijing, China Sep 2015 Title: Smart vs. Security: IoT Security and Protections Notre Dame University, Notre Dame, IN Sep 2015 Title: Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering (Host: X. Sharon Hu) NIST - Cybersecurity Innovation Forum, Washington, DC Sep 2015 Title: Hardware Trust and Integrity: The First Step Toward Securing Computer Systems (Host: Andrew Regenscheid) Cisco, Gainesville, FL Sep 2015 Title: IoT Security (Host: Tony Jeffs) National Security Campus, Gainesville, FL Aug 2015 Title: Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering (Host: Perry Tapp) Honeywell - FICS, Gainesville, FL Jun 2015 Title: IoT/Hardware Security (Host: Mark Tehranipoor) Raytheon - FICS, Gainesville, FL Jun 2015 Title: Automated Functionality Rebuilding Through Netlist Reverse Engineering (Host: Mark Tehranipoor) Trustworthy Hardware Workshop New York, NY Nov 2014 Title: Computer System Protection through Run-time Hardware-Software Collaboration, (Host: Ramesh Karri) University of George, Athens, GA Sep 2014 Title: Computer System Protection through Hardware-Software Collaboration (Host: Kang Li) Pennsylvania State University, State College, PA Sep 2014 Title: Computer System Protection through Run-Time Hardware-Software Collaboration (Host: Vijaykrishnan Narayanan) University of Connecticut Storrs, CT Aug 2014 Title: Embedded System Security in Smart Consumer Electronics: A Case Study on Google Nest Thermostat (Host: Domenic Forte)
8 Information Sciences Institute/USC Washington, D.C. May 2014 Title: Security in Silicon - Challenges and Opportunities Ahead (Host: Youngok Pino) Intel Corp. Hillsboro, OR Nov 2013 Title: Proof-Carrying Based Trusted Embedded System Design and Secure SoC Integration (Host: David Ott and Mukesh Ranjan) Trustworthy Hardware Workshop New York, NY Nov 2013 Title: Trusted Embedded System Design Through the Unification of Trusted Third-Party Software Programs and Hardware IP Cores (Host: Cliff Wang) Northeastern University Boston, MA Apr 2012 Title: Trusted Integrated Circuits (Host: Edmund Yeh) University of New Mexico Albuquerque, NM Apr 2012 Title: Trusted Integrated Circuits (Host: Nasir Ghani) Stony Brook University New York, NY Apr 2012 Title: Trusted Integrated Circuits (Host: Kenneth Short) University of Maryland College Park, MD Mar 2012 Title: Trusted Integrated Circuits (Host: Gang Qu) George Mason University Fairfax, VA Mar 2012 Title: Trusted Integrated Circuits (Host: Kris Gaj) Illinois Institute of Technology Chicago, IL Mar 2012 Title: Trusted Integrated Circuits (Host: Kui Ren) Intel Corp. Hillsboro, OR Jan 2012 Title: Trusted Integrated Circuits and Proof Carrying-based Hardware Intellectual Property Protection (Host: Dhinesh Manoharan) RESEARCH FUNDING Army Research Office (ARO), Bridging the Hardware-Software Gap: A Proof- Carrying Approach for Computer Systems Trust Evaluation, ($330K) NSF / CISE, CNS , REU Site: Research Experiences in the Internet of Things, (PI: Damla Turgut, co-pi: Yier Jin, $360K) Florida Center for Cybersecurity (FC2) Collaborative Seed Grant Program, Smart Grid Security Protection through Cross-Layer Approaches, (PI: Yier Jin, co-pi: Yao Liu, Cliff Zou, $100K) CISCO, Verification of IP Security and Trust, (PI: Prabhat Mishra, co-pi: Yier Jin, $200K) NSF / CISE, CNS , TWC: Small: Collaborative: Toward Trusted 3rd- Party Microprocessor Cores: A Proof Carrying Code Approach, (PI: Yier Jin, co-pi: Yiorgos Makris, $450K) (REU Supplement $32K) UCF In-House Award, Trustworthiness Evaluation in Integrated Circuits, , $7.5K UCF COS/ORC SEED Grant, SmartPhrog: A Responsive Low-Cost High- Performance Bioacoustic Solution Using the Raspberry Pi Single-Board Computer for Frog Population Monitoring, (PI: Anna Savage, co-pi: Shaojie Zhang, Yier Jin, $36K) SCEEE/Woody Everett Research Initiation Grants, Avalanche Effect in Cyber- Physical Systems Security Under Large-Scale Cyberattacks on Smart Devices, ($32K)
9 TEACHING EXPERIENCE Instructor for Courses Dec Present Electrical Engineering and Computer Science Department, University of Central Florida Graduate Course: EEE Trustworthy Hardware Graduate Course: EEE 5390C - Full Custom VLSI Design Undergraduate Course: EEE 4346C - Hardware Security and Trusted Circuit Design Teaching Fellow Fall 2010, Fall 2008 School of Engineering and Applied Science, Yale University Graduate Course: EENG875 - Introduction to VLSI System Design Teaching Fellow Spring 2010 School of Engineering and Applied Science, Yale University Undergraduate Course: EENG201b - Introduction to Computer Engineering CURRENT PHD STUDENTS CURRENT UNDERGRAD PREVIOUS PHD STUDENTS PREVIOUS UNDERGRAD Xiaolong Guo since Aug 2013 Dean Sullivan since Jan 2014 Raj Gautam Dutta since Aug 2014 Kaveh Shamsi since Aug 2014 Travis Meade (co-advised by Dr. Shaojie Zhang) since Aug 2014 Orlando Arias (senior student) Kelvin Ly (senior student) Jacob Wurm (junior student) Khoa Hoang (sophomore) Alexis Drayton (sophomore) Coleman Rogers (sophomore) Yu Bi (co-advised by Dr. Peter Yuan) Thomas Louisville Andrew Mendoza Igor Prokopenko (Associate Information Security and Compliance Analyst at Publix Super Markets) Patrick Armengol (Graduate student at the Florida International University) Grant Hernandez (PhD student at the University of Florida) Dean Sullivan (PhD student at the University of Central Florida) Brandon Frazer (Associate electrical engineer at Mitsubishi Power Systems Americas) Ryan Dixon (Electrical engineer associate at Lockheed Martin) Victor Medina Danny Aybar Ritika Oswal Roland Anderson Richard Klimek Jeff Biggers Henry Chan
10 INSTITUTIONAL SERVICE UCF Cyber Cluster faculty search committee UCF Computer Engineering faculty search committee Sep Present Oct Present ECE representative on the cybersecurity task force committee Aug Present Faculty Library Representative for the Electrical and Computer Engineering Division of the Department of Electrical Engineering and Computer Science, University of Central Florida Present PhD Thesis Committee: Sirui Luo (Advisor: Dr. Juin J. Liou), Zhixin Wang (Advisor: Dr. Juin J. Liou), Jianling Yin (Advisor: Dr. Jun Wang), Ruijun Wang (Advisor: Dr. Jun Wang), Yunfeng Xi (Advisor: Dr. Juin J. Liou), Jun Ding (Advisor: Dr. Nancy Hu) PROFESSIONAL SERVICE Associate Editor IET Computers & Digital Techniques (March ) IEEE SMC Society Technical Committee on CCPS Newsletter (September ) Guest Editor IEEE Transactions on Multi-Scale Computing Systems. Special Issue/Section on Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing. Proposal Panel Florida Center of Cybersecurity (FC2) review panel, 2015, 2016 CHIST-ERA review panel, 2016 Ontario Research Fund - Research Excellence (ORF-RE), 2016 Conference/Workshop (Co-)Chair IEEE International Workshop on Design Automation for Cyber-Physical Systems (CPSDA), 2016 IEEE INFOCOM Workshop on Cross-Layer Cyber-Physical Systems Security (CPSS), 2016 Organizing Committee IEEE International Workshop on Information Forensics and Security (WIFS 16) Design Automation Summer School (DASS 16) Asia Workshop on Smart Sensor System (AWSSS 16) Security B-Sides Orlando, 2015, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 15, 16) International Symposium on VLSI Design and Test (VDAT 14) Technical Program Committee International Symposium for Testing and Failure Analysis (ISTFA 16) IEEE International Conference on Computer Design (ICCD 12, 15, 16) SIGDA PhD Forum at DAC 2016 IEEE International System-on-Chip Conference (SOCC 15, 16) International Test Conference (ITC 15, 16) 37th IEEE Real-Time Systems Symposium (RTSS 16) 14th International Conference on Applied Cryptography and Network Security (ACNS 16)
11 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 16) IEEE Computer Society Annual Symposium on VLSI (ISVLSI 14, 15, 16) IFIP/IEEE International Conference on Very Large Scale Integration (VLSI- SoC 15, 16) Design Automation Conference (DAC 15, 16) Great Lake Symposium on VLSI (GLSVLSI 16) The 28th Conference on VLSI Design and the 15th Conference on Embedded Systems (VLSI Design 16) Asia and South Pacific Design Automation Conference (ASP-DAC 16) IEEE International Symposium on Nanoelectronic and Information Systems (inis 15) The 13th International Conference on Information Technology (ICIT 14) The 23rd Asian Test Symposium (ATS 14) IEEE International Symposium on Hardware Oriented Security and Trust (HOST 14) IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT 12)
Yier Jin RESEARCH INTERESTS
Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: [email protected]
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: [email protected] Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,
Sustainability and Energy Efficiency in Data Centers Design and Operation
Sustainability and Energy Efficiency in Data Centers Design and Operation Krishna Kant Intel and GMU [email protected] David Du University of Minnesota [email protected] Abstract The tutorial will provide
Jason A. Duan (Jun Duan)
Jason A. Duan (Jun Duan) McCombs School of Business The University of Texas at Austin One University Station B6700 Austin, TX 78712 Office: CBA 7.250 Office Phone: (512) 232-8323 Fax: (512) 471-1034 Email:
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
Secured Embedded Many-Core Accelerator for Big Data Processing
Secured Embedded Many- Accelerator for Big Data Processing Amey Kulkarni PhD Candidate Advisor: Professor Tinoosh Mohsenin Energy Efficient High Performance Computing (EEHPC) Lab University of Maryland,
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
CURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807
Minah Oh CONTACT INFORMATION Department of Mathematics and Statistics 540-568-4929 305 Roop Hall, MSC 1911 [email protected] James Madison University http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807 EDUCATION
NATIONAL SUN YAT-SEN UNIVERSITY
NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures
09/2015 Lead: George Mason University, Total Budget: $330,481, HU budget: $53,016
Hassan Salmani Department of Electrical and Computer Engineering Howard University 2300 6th Street NW, Washington, DC 20059 [email protected] http://www.eece.ceacs.howard.edu/users/hsalmani (860)
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus
Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: [email protected] Education
The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
The 2014-2016 Board of Directors
The 2014-2016 Board of Directors President Yang, Honggang, Ph.D. 杨 红 钢 Dean, School of Humanities and Social Sciences Nova Southeastern University [email protected] Vice President Chen, Jie, Ph.D. 陈 捷 Dean,
RUI SUN, Ph.D. RESEARCH INTERESTS: Fiscal Federalism State and Local Government Finance Nonprofit finance Economic Development
RUI SUN, Ph.D. Department of Public Administration Office: SBS-D314 College of Business Administration and Public Policy Tel: (310) 243-3331 California State University, Dominguez Hills Fax: (310) 601-4593
ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards
ADAM MACNEIL BATES Ph.D. Candidate Office: E451 CSE Building Department of Computer & Information Sciences & Engineering Gainesville, FL 32653 University of Florida USA email: [email protected] Phone:
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION
Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: [email protected] EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA 19104 [email protected].
Education Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA 19104 [email protected] PhD-Computer Science, May 2010 Columbia
XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS
XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Paolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3
CURRICULUM VITAE ET STUDIORUM Paolo Maistri September 8, 2008 TABLE OF CONTENTS Personal Information 2 Education and Studies 2 Academic Activities and Affiliations 3 Teaching Activities 4 Teaching Assistance......................................
Hsuan-Chi Chen. Associate Professor, Anderson School of Management, The University of New Mexico
Area of Interest Research: Teaching: Hsuan-Chi Chen Associate Professor in Finance Anderson School of Management The University of New Mexico Albuquerque, NM 87131 Phone: 505-277-4702 Email: [email protected]
YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015
EDUCATION YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015 Post-Doctoral Bridge Program, University of Florida, Gainesville, FL, AACSB, Jul,
Todd D. Kravet. University of Washington, Foster School of Business Ph.D. in Accounting, August 2009 M.S. in Business Administration, June 2008
August, 2015 Todd D. Kravet School of Business University of Connecticut 2100 Hillside Road, Unit 1041a Storrs, CT 06269-1041 Office: (860) 486-1361 Email: [email protected] EDUCATION University
Tian (Lori) Tang Assistant Professor of Finance University of Louisville
Tian (Lori) Tang Assistant Professor of Finance University of Louisville University of Louisville Department of Finance College of Business, Room 274 Louisville, KY, 40292 Tel: (502) 852-4819 (Office)
BEIBEI (BACY) DONG EDUCATION EMPLOYMENT EDITORIAL POSITIONS PUBLICATIONS. Updated 05/25/2015 Beibei (Bacy) Dong
BEIBEI (BACY) DONG Updated 05/25/2015 Lehigh University College of Business & Economics Department of Marketing Tel : (610) 758-3439 621 Taylor Street Bethlehem, PA 18015-3117 E-mail: [email protected]
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
M.S. in Computer Science 2009-2011
Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 [email protected] http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software
Microsemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
How To Become A Computer Scientist
Fabio Pasqualetti Curriculum Vitae June 2015 Address: Department of Mechanical Engineering University of California at Riverside A309 Bourns Hall, Riverside, CA, 92521 Phone: +1 951 827 2327 Email: [email protected]
Understanding Integrated Circuit Security Threats. Asif Iqbal Senior Program Manager, Apple Inc. SDM 11
Understanding Integrated Circuit Security Threats Asif Iqbal Senior Program Manager, Apple Inc. SDM 11 Outline Vulnerability at different layers and relative impact Some Cases and Proof of Concepts Integrated
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Fengwei Zhang. Research Interest. Education. Employment History
Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 [email protected] http://fengwei.me Research Interest My primary research interests are in the areas of systems
BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008)
Georges EL-HOWAYEK Valparaiso University Electrical and Computer Engineering Building, Room 223 Valparaiso, IN 46383, USA [email protected] http://www.unm.edu/~ghowayek/ RESEARCH INTERESTS Communication
Curriculum Vitae. Education Nanjing University, International Business School, Nanjing, P. R.China Bachelor of Arts in Economics, July 1994
Curriculum Vitae Zhining Hu Office Contact Information Department of Economics Gettysburg College Gettysburg, PA 17325 Office phone number: 717-337-6676 E-mail address: [email protected] Education Nanjing
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA
Pengtao Xie Carnegie Mellon University Machine Learning Department School of Computer Science 5000 Forbes Ave Pittsburgh, PA 15213 Tel: (412) 916-9798 Email: [email protected] Web: http://www.cs.cmu.edu/
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Keumseok Kang. EMPLOYMENT August 2011 current: Visiting Assistant Professor, College of Business Administration, Florida International University
Keumseok Kang Decision Sciences and Information Systems, College of Business Administration Florida International University, Modesto A. Maidique Campus 11200 S.W. 8th Street, Miami, Florida 33199-0001
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
TAO LI. Assistant Professor, Department of Operations Management and Information Systems
Education TAO LI Assistant Professor Department of Operations Management and Information Systems Leavey School of Business, Santa Clara University 500 El Camino Real, Santa Clara, CA 95053 Phone: (408)
Curriculum for a Master s Degree in ECE with focus on Mixed Signal SOC Design
Curriculum for a Master s Degree in ECE with focus on Mixed Signal SOC Design Department of Electrical and Computer Engineering Overview The VLSI Design program is part of two tracks in the department:
Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
Workshop Program 23 October 2015
IEEE VIRTUAL WORKSHOP ON EARLY CAREER FACULTY DEVELOPMENT Student Assessment Workshop Program 23 October 2015 Time: 1100 1300 hours (all times in Eastern Time Zone) AGENDA 1100 1105 Opening Address Dr.
RESEARCH INTERESTS: Computer, Networking and Information Security; Digital topology and image processing
Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA 31907 706-507-8180(office) [email protected], [email protected]
Sharareh Noorbaloochi Department of Psychology New York University 6 Washington Place, 559, New York, NY 10003 noorbaloochi@nyu.
Sharareh Noorbaloochi Department of Psychology New York University 6 Washington Place, 559, New York, NY 10003 [email protected] (650) 919-3485 EDUCATION AND EMPLOYMENT Postdoctoral Associate, Department
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy
The Changing Threat Surface in Embedded Computing Riley Repko Vice President, Global Cyber Security Strategy Embedded Computing History First embedded system was the Apollo Guidance Computer First integrated
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
Mobile Network Security Technology Research Center Kyungpook National University
The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
List of courses MEngg (Computer Systems)
List of courses MEngg (Computer Systems) Course No. Course Title Non-Credit Courses CS-401 CS-402 CS-403 CS-404 CS-405 CS-406 Introduction to Programming Systems Design System Design using Microprocessors
Curriculum Vitae. Vladimír Guzma. Flat 16, Moore Court, 2 Dodd Road, WD24 5DA, Watford, United Kingdom Telephone(s) +44 (0)7581 342 766
Curriculum Vitae Personal information Surname(s) / First name(s) Address(es) Flat 16, Moore Court, 2 Dodd Road, WD24 5DA, Watford, United Kingdom Telephone(s) +44 (0)7581 342 766 Email(s) Nationality(-ies)
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
ANYI LIU. 125M, 2101 E. Coliseum Blvd. Tel: 1-(260)-481-5426 Indiana Univ. Purdue Univ. Fort Wayne Web: http://web.ics.purdue.
CONTACT ANYI LIU 125M, 2101 E. Coliseum Blvd. Tel: 1-(260)-481-5426 Indiana Univ. Purdue Univ. Fort Wayne Web: http://web.ics.purdue.edu/ liu1010/ Fort Wayne, Indianan 46805 U.S.A. Email: [email protected]
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems
Hila Etzion Assistant Professor of Technology and Operations Stephen M. Ross School of Business University of Michigan 701 Tappan St. Ann Arbor, MI 48109-1234 (734)-358-1854 E-mail: [email protected] EDUCATION
August 2013. Emory University, Atlanta, GA Double major: Sociology and Political Science December 2005
CODY W. TELEP School of Criminology and Criminal Justice Arizona State University Mail Code 4420 411 N. Central Avenue, Suite 600 Phoenix, AZ 85004 Phone: 602.496.1295 Fax: 602.496.2366 Email: [email protected]
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
DOMAIN EXPERTISE METHODOLOGY SKILLS
Xixi Li Assistant Professor Department of Management Science and Engineering Tsinghua University Beijing China 100086 EDUCATION Ph.D., Department of Management & Marketing, Faculty of Business Aug 2006
Kun Huang. B.A. Huazhong University of Science and Technology, Wuhan, China, 1995 Major: English
Kun Huang Social Sciences Building 3002 School of Public Administration 1 University of New Mexico Albuquerque, NM 87131-0001 Phone: 1-505-277-7757 [email protected] Education Ph.D. University of Arizona,
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
YUNTAO DONG. Assistant Professor, School of Business, University of Connecticut
YUNTAO DONG 2100 Hillside Road, Unit 1041 School of Business, Management Department University of Connecticut Storrs, CT 06269-1041, USA Phone: 1-860-486-1614 Fax: 1-860-486-6415 Email: [email protected]
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
Systems on Chip Design
Systems on Chip Design College: Engineering Department: Electrical First: Course Definition, a Summary: 1 Course Code: EE 19 Units: 3 credit hrs 3 Level: 3 rd 4 Prerequisite: Basic knowledge of microprocessor/microcontroller
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
VITA: DR. YEN-HUNG HU
VITA: DR. YEN-HUNG HU EXPERIENCE 2011 Present: Director of Information Assurance Center at Hampton University (IAC@HU). http://science.hamptonu.edu/compsci/iac/ Offer a variety of IA courses. Conduct IA
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Donghang Zhang. Assistant Professor, Department of Finance, Moore School of Business, University of South Carolina, 08/02 05/2010
Donghang Zhang Associate Professor of Finance Moore School of Business, University of South Carolina Columbia, SC 29208 Phone: (803) 777-0242 E-mail: [email protected] Education Ph.D. University of Florida
Jenshan Lin. Affiliation and Contact Information. Education. Employment. Other Appointments. Professional Organizations
Jenshan Lin Affiliation and Contact Information Education Department of Electrical and Computer Engineering University of Florida 1064 Center Drive, 559 Engineering Building Gainesville, FL 32611-6130
Elizabeth A. Arnold. Academic Experience. Education
Elizabeth A. Arnold Department of Mathematics and Statistics James Madison University Harrisonburg, VA 22807 (540) 568-6532 http://www.math.jmu.edu/~arnoldea [email protected] Academic Experience James
Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing
Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen
Cyber Security of the Power Grid
Cyber Security of the Power Grid Chen-Ching Ching Liu Professor of Power Systems University College Dublin Research for Ireland s Future Ireland -Country of natural beauty -Quality of life ranked among
LI XU December, 2012 E-mail address: [email protected] Contact Phone: 443-617-4496
LI XU December, 2012 E-mail address: [email protected] Contact Phone: 443-617-4496 EDUCATION Duke University, Ph.D. in Business Administration, Durham, NC Dec, 2006 Advisor: Jennifer Francis Suffolk
RUI SUN, Ph.D. College of Business Administration and Public Policy California State University, Dominguez Hills
RUI SUN, Ph.D. Department of Public Administration College of Business Administration and Public Policy California State University, Dominguez Hills 1000 E. Victoria Street Carson, CA 90747 Office: SBS-D314
Innovative improvement of fundamental metrics including power dissipation and efficiency of the ALU system
Innovative improvement of fundamental metrics including power dissipation and efficiency of the ALU system Joseph LaBauve Department of Electrical and Computer Engineering University of Central Florida
Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona
Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration California State Polytechnic University, Pomona
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
