Lanier A. Watkins, Ph.D. Curriculum Vitae
|
|
|
- Annis Berry
- 10 years ago
- Views:
Transcription
1 Lanier A. Watkins, Ph.D. Curriculum Vitae JHU/APL MP6-S Johns Hopkins Road Laurel, Maryland SUMMARY OF QUALIFICATIONS Broad research background in malware analysis and research, network traffic analysis and predictive analytics, network security, and signal processing. Experience includes using information leakage to correlate network traffic and system activity, using machine learning techniques to solve networking problems, and reducing problem spaces by using wavelet or spectral analysis. Additionally, experienced in technical management and cyber security policy. EDUCATION Clark Atlanta University Physics B.S Clark Atlanta University Physics M.S Clark Atlanta University Computer Science M.S Georgia State University Computer Science Ph.D Johns Hopkins University Biotechnology Management and Entrepreneurship M.S APPOINTMENTS Senior Professional Staff II Johns Hopkins University Applied Physics Lab present Associate Research Scientist Johns Hopkins University present Lecturer Johns Hopkins University Engineering Professionals present EMPLOYMENT The Johns Hopkins University Applied Physics Lab, Laurel, MD 5/11 Present Sr. Cyber Research Scientist Responsibilities include technical business development (Critical Infrastructure Protection) with the federal government and grant writing to support junior staff members and students. Relevant security technology includes: Mobile Device, Big Data, Predictive Analytics, Cyber Physical (SCADA), Malware Analysis, and Next Generation Intrusion Detection Systems The Johns Hopkins University, Baltimore, MD 10/13 - Present Associate Cyber Research Scientist Responsibilities include developing and maintaining a cyber-security course which serves as a conduit for identifying talented research students. I then train the students to become research assistants by assisting me with solving real-world security problems. AT&T, Atlanta, GA 1/01 5/11 Sr. Technical Product Manager: 06/08 5/11 o Responsibilities included the life-cycle management of a critical internal system that monitored the health and status of the multi-billion dollar revenue generating national cellular network. Sr. Product Manager: 05/06 06/08 o Responsibilities included the portfolio and life-cycle management of Frame Relay and ATM products. Among these duties was the profit and loss management of over a quarter of a billion dollars in revenue. Sr. Product Development Manager: 01/01 05/06 o Responsibilities included writing functional requirements, managing multi-million dollar product development budgets, and leading cross-functional teams that develop and implement telecommunication products and services. Ford Motor Company, Dearborn, MI 10/99 12/00 o Rotational Manager Training Program
2 Invited Talks and Presentations Patents IEEE MALCON 2014, Fajardo, Puerto Rico 10/14 Conference Presentation: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Morgan State University, Computer Science Department, Baltimore, MD 9/17 Invited Talk: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: A Tunable Attribution Framework Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: Fighting Banking Trojans: The Offensive Tactical Reconnaissance Platform IEEE MoST 2013, San Francisco, CA 5/13 Conference Presentation: Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices University of Delaware, Department of Electrical and Computer Engineering, Newark, DE 3/13 Invited Talk: Using Network Traffic to Infer Hardware State IEEE ICC 2008, Beijing, China 5/08 Conference Presentation: Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Networks ACM Gridnets 2007, Lyon, France 10/07 Conference Presentation: Using Network Traffic to Passively Detect Under Utilized Resources in High- Performance Cluster Grid Computing Environments. Patent #3598-SPL Filed 9/14 A Network-Based Mobile Device Application Monitor for Android Mobile Devices Provisional Patent #3659-SPL 11/13 A Network-Based Mobile Device Malware Monitor for Android Mobile Devices Awards, Scholarships, and Fellowships 5-Year BS/MS Scholarship in Physics, Clark Atlanta University 8/92 2-Year MS Scholarship in Computer Science, Clark Atlanta University 8/97 Lawrence R. Hafstad Fellowship, Johns Hopkins University Applied Physics Lab 10/13 Publications Journals Lanier Watkins, William H. Robinson, Raheem Beyah, "Using Network Traffic to Infer Hardware State: A Kernel-Level", In ACM Transactions on Embedded Computing Systems (TECS), Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific-based Risk Metrics, To Appear In the Journal of Information Warfare (JIW), July Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. In IEEE Transactions on Parallel and Distributed Systems (TPDS), December 2011.
3 Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the Memory Resource Discovery Problem in Grid Computing. In IEEE Transactions on Network and Service Management (TNSM), December Lanier Watkins, Cherita Corbett, and Raheem Beyah, Using Link RTT to Passively Detect Unauthorized Wireless Nodes. In the International Journal of Security and Networks, Vol. 4, No. 3, Conferences Georgios Lontorfos, Kevin D Fairbanks, Lanier Watkins, and William H. Robinson, Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior, To Appear in the Proceedings of IEEE Workshop on Network Measurements (WNM), October Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific Risk-Based Metrics, In the Proceedings of the International Conference on Cyber Warfare and Security (ICCWS), March Lanier Watkins, Christina Kawka, Cherita Corbett, and William Robinson, "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities", In IEEE Proceedings of the International Conference on Malicious and Unwanted Software (MALCON), October Mengchao Yue, William H. Robinson, Lanier Watkins and Chertia Corbett, "Constructing Timing-Based Covert Channels in Mobile Networks by Adjusting CPU Frequency", In the Proceedings of ACM International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June Lanier Watkins, Garth V. Crosby and Afsana Sharmin, 'Using Network Traffic to Infer Power Levels in Wireless Sensor Nodes, In the Proceedings of IEEE the International Conference on Computing, Networking and Communications (ICNC), CNC Workshop, February Lanier Watkins, Cherita Corbett, Benjamin Salazar, Kevin Fairbanks and William H. Robinson, Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices In Proceedings of the IEEE Mobile Security Technologies (MoST), May Lanier Watkins, Raheem Beyah, and Cherita Corbett, Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Netwoks In the Proceedings of the IEEE International Conference on Communications (ICC), May Lanier Watkins, Raheem Beyah, and Cherita Corbett, A Passive Approach to Rogue Access Point Detection. In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December Lanier Watkins, Raheem Beyah, and Cherita Corbett, Using Network Traffic to Passively Detect Under Utilized Resources in High-Performance Cluster Grid Computing Environments. In the Proceedings of the ACM International Conference on Networks for Grid Applications (GRIDNETS), October Alfred Msezane, Zineb Felfli, Dmitri Sokolovski, Lanier Watkins, et al, Regge-Pole Calculation of the Resonance Contribution to Electron-Atom Cross Sections, 3rd International Conference on Neural, Parallel and Scientific Computations, August Lanier Watkins, Kenneth R. Perry, John S. Hurley, B. Olson, and B. Pain, Wavelet Transform Image Compression Prototype. Technical Proceedings of the International Conference on Modeling and Simulation of Microsystems, Referee Service for Journals / Magazines IEEE Transactions on Parallel and Distributed Systems, 2015
4 Journal of Wireless Communications and Mobile Computing, 2014 Journal of Risk Analysis, 2013 Journal of Wireless Communications and Mobile Computing, 2013 Elsevier Information Sciences, 2013 IEEE Transactions on Parallel and Distributed Systems, 2013 Elsevier AD HOC Networks Journal, 2013 IEEE Mobile Ad-hoc and Sensor Systems, 2013 IEEE Transactions on Parallel and Distributed Systems, 2012 IEEE Transactions on Systems, Man, and Cybernetics, 2011 Security and Communication Networks, 2011 Elsevier Information Sciences, 2010 IEEE Transactions on Parallel and Distributed Systems, 2010 Hindawi Publishing Corporation, 2010 Technical Program Committees International Workshop on Mobile Computing Security, Program Committee, 2015 IEEE ICC - Communication and Information Systems Security Symposium, 2015 IEEE International Symposium on Security and Privacy in Internet of Things, 2013 Euromicro PDP (Special Session on Energy Aware Systems), Program Committee, 2011 International Conference on Computing, Networking and Communication (ICNC) Program Committee, 2011 Professional Society Memberships Institute for Electrical and Electronics Engineers (IEEE): Computer Society, 2010-Present Security Clearance Secret, 2011 to Present Master s Capstone Degrees Supervised Wlajimir Alexis (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Automobile Driver Identification Using the Wavelet Transform and Machine Learning Weihong Lou (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Tunable Attribution: Can Malware Manipulate AV Detection?" Changyun Gong (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Algorithm Detection in Binary Files Using Magic Numbers and Strings Peizhao Li and Yifan Tian (Current 2015 M.S. Security Informatics Students) Master s Capstone Project: A Network-based Approach to Black Listing Mobile Applications That Exhibit Silent or Obfuscated Network Traffic Kurt Silberberg, M.S. in Security Informatics (Spring 2015) Master s Capstone Project: Monitoring DDoS Botnet C&C s For Computer Forensic Artifacts Ashwini Pugazhendhi, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "A Network-based Thermal Hardware Trojan Detection Method" Georgios Lontorfos, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Remotely Identifying Rich Targets In SCADA Networks" Chengyuan Zhang, Fangyue Chen, and Wentao Li, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Mapping The Attack Surface For Zeus Command And Control" Shijie Zhang, Li Xu, and Christina Kawka, M.S. in Security Informatics (Spring 2014) Master s Capstone Project: Malware Analysis of Zeus : The Development of A Tunable Attribution Framework and Remote Command and Control Reconnaissance
5 Amritha Lal, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Network-Based Detection of Malware in Mobile Networks Shuang Xie and Tianning Yang, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Identifying Mobile Malware Instructions Which Induce Information Leakage in Network Traffic Mengchao Yue, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Covert Timing Channel: An Android-Based Mobile Application
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y
Solving the Federal Government s Toughest Cyber Security Problems NETWORK PROTECTION AND INFORMATION ASSURANCE NETWORKS WITH A RICH HERITAGE OF ACHIEVEMENT AND LEVERAGING THE EXPERTISE AND RESOURCES OF
NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security
NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)
Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno [email protected] http://www.cs.unr.edu/ monica June 1998 - May 2003: University
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
PhD in Strategic Management, College of Management, Georgia Institute of Technology, 2008
Andrew M. Hess Curriculum Vitae Williams School of Commerce, Economics, and Politics Washington & Lee University, Lexington VA, 24450 Work: 540.458.8346; Fax: 540.458.8639 Email: [email protected]; Web: http://www.wlu.edu/williams-school/business-administration/faculty-and-staff/profile?id=x2975
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION A. Present University Department or Unit: Information Systems Technologies School of Information Systems and
WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model
WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/
CURRICULUM VITAE 1 Igor V. Maslov Contact information 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304 Tokyo 151-0073 E-mail: [email protected] Japan Web: http://www.columbia.edu/~ivm3/ Education
Frank T. Ferrese, PhD, PE
Frank T. Ferrese, PhD, PE Contact Information FJT Technologies LLC Phone: (856) 924-4690 414 First Avenue E-mail: [email protected] Haddon Heights, NJ 08035 Web: www.fjttech.com Professional Profile
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Secured Embedded Many-Core Accelerator for Big Data Processing
Secured Embedded Many- Accelerator for Big Data Processing Amey Kulkarni PhD Candidate Advisor: Professor Tinoosh Mohsenin Energy Efficient High Performance Computing (EEHPC) Lab University of Maryland,
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
Cybersecurity in a Mobile IP World
Cybersecurity in a Mobile IP World Alexander Benitez, Senior Scientist, ComSource Introduction by Robert Durbin, Cybersecurity Program Manager, ComSource Introduction ComSource s cybersecurity initiative
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
James L. Salmon, Ph.D., P.E. Senior Engineer 513-376-7974 direct 513-254-5949 mobile [email protected] PROFESSIONAL EXPERIENCE
James L. Salmon, Ph.D., P.E. 513-376-7974 direct 513-254-5949 mobile [email protected] PROFESSIONAL EXPERIENCE Current Caulfield Engineering, LLC Naperville, Illinois Dr. Salmon specializes in the
Fengwei Zhang. Research Interest. Education. Employment History
Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 [email protected] http://fengwei.me Research Interest My primary research interests are in the areas of systems
Defending against modern threats Kruger National Park ICCWS 2015
Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter
A General-purpose Laboratory for Large-scale Botnet Experiments
A General-purpose Laboratory for Large-scale Botnet Experiments Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla Cyber Defense Fraunhofer
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS
STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS
XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Publications of Ugo Fiore
Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
Nicholas J. Kelling, Ph.D.
Nicholas J. Kelling, Ph.D. Curriculum Vitae EDUCATION Assistant Professor of Psychology University of South Florida College of Arts and Sciences 4202 East Fowler Ave. Tampa, FL 33620 e-mail: [email protected]
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Curriculum Vitae JOON-YEOUL OH
Curriculum Vitae JOON-YEOUL OH Department of Mechanical and Industrial Engineering Texas A&M University - Kingsville Kingsville, Texas 78363-8203 (361) 593-3941, [email protected] EDUCATION Ph.D. Industrial
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Quantification of Security and Survivability
Quantification of Security and Survivability ITI Workshop on Dependability and Security Urbana, Illinois Kishor Trivedi Department of Electrical and Computer Engineering Duke University Durham, NC 27708-0291
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Enterprise Capabilities Descriptions
1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Mike Perkins, Ph.D. [email protected]
Mike Perkins, Ph.D. [email protected] Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008)
Georges EL-HOWAYEK Valparaiso University Electrical and Computer Engineering Building, Room 223 Valparaiso, IN 46383, USA [email protected] http://www.unm.edu/~ghowayek/ RESEARCH INTERESTS Communication
Center of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona
Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration California State Polytechnic University, Pomona
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Special Issue on Advances of Utility and Cloud Computing Technologies and Services
Special Issue on Advances of Utility and Cloud Computing Technologies and Services Aims Computing is rapidly moving towards a model where it is provided as services that are delivered in a manner similar
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
How To Protect Your Mobile From Attack From A Signalling Storm
ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
Automata Designs for Data Encryption with AES using the Micron Automata Processor
IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.7, July 2015 1 Automata Designs for Data Encryption with AES using the Micron Automata Processor Angkul Kongmunvattana School
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso
Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
Cyberspace Security Econometrics System (CSES) Portfolio. Robert K. Abercrombie Organized by FY Updated October 20, 2014
Cyberspace Security Econometrics System (CSES) Portfolio Robert K. Abercrombie Organized by FY Updated October 20, 2014 4 Patents (Issued or Pending) 6 ORNL Intellectual Property Invention Disclosures
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012
EDUCATION Ph.D. Computer Engineering University of Southern California 1999 MS Computer Engineering University of Southern California 1994 B.S. Electrical Engineering Tehran University 1988 AWARDS & FELLOWSHIPS
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
