Lanier A. Watkins, Ph.D. Curriculum Vitae

Size: px
Start display at page:

Download "Lanier A. Watkins, Ph.D. Curriculum Vitae"

Transcription

1 Lanier A. Watkins, Ph.D. Curriculum Vitae JHU/APL MP6-S Johns Hopkins Road Laurel, Maryland SUMMARY OF QUALIFICATIONS Broad research background in malware analysis and research, network traffic analysis and predictive analytics, network security, and signal processing. Experience includes using information leakage to correlate network traffic and system activity, using machine learning techniques to solve networking problems, and reducing problem spaces by using wavelet or spectral analysis. Additionally, experienced in technical management and cyber security policy. EDUCATION Clark Atlanta University Physics B.S Clark Atlanta University Physics M.S Clark Atlanta University Computer Science M.S Georgia State University Computer Science Ph.D Johns Hopkins University Biotechnology Management and Entrepreneurship M.S APPOINTMENTS Senior Professional Staff II Johns Hopkins University Applied Physics Lab present Associate Research Scientist Johns Hopkins University present Lecturer Johns Hopkins University Engineering Professionals present EMPLOYMENT The Johns Hopkins University Applied Physics Lab, Laurel, MD 5/11 Present Sr. Cyber Research Scientist Responsibilities include technical business development (Critical Infrastructure Protection) with the federal government and grant writing to support junior staff members and students. Relevant security technology includes: Mobile Device, Big Data, Predictive Analytics, Cyber Physical (SCADA), Malware Analysis, and Next Generation Intrusion Detection Systems The Johns Hopkins University, Baltimore, MD 10/13 - Present Associate Cyber Research Scientist Responsibilities include developing and maintaining a cyber-security course which serves as a conduit for identifying talented research students. I then train the students to become research assistants by assisting me with solving real-world security problems. AT&T, Atlanta, GA 1/01 5/11 Sr. Technical Product Manager: 06/08 5/11 o Responsibilities included the life-cycle management of a critical internal system that monitored the health and status of the multi-billion dollar revenue generating national cellular network. Sr. Product Manager: 05/06 06/08 o Responsibilities included the portfolio and life-cycle management of Frame Relay and ATM products. Among these duties was the profit and loss management of over a quarter of a billion dollars in revenue. Sr. Product Development Manager: 01/01 05/06 o Responsibilities included writing functional requirements, managing multi-million dollar product development budgets, and leading cross-functional teams that develop and implement telecommunication products and services. Ford Motor Company, Dearborn, MI 10/99 12/00 o Rotational Manager Training Program

2 Invited Talks and Presentations Patents IEEE MALCON 2014, Fajardo, Puerto Rico 10/14 Conference Presentation: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Morgan State University, Computer Science Department, Baltimore, MD 9/17 Invited Talk: "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities" Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: A Tunable Attribution Framework Malware Technical Exchange Meeting 2014, Kirtland Air Force Base, Albuquerque, NM 7/14 Conference Presentation: Fighting Banking Trojans: The Offensive Tactical Reconnaissance Platform IEEE MoST 2013, San Francisco, CA 5/13 Conference Presentation: Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices University of Delaware, Department of Electrical and Computer Engineering, Newark, DE 3/13 Invited Talk: Using Network Traffic to Infer Hardware State IEEE ICC 2008, Beijing, China 5/08 Conference Presentation: Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Networks ACM Gridnets 2007, Lyon, France 10/07 Conference Presentation: Using Network Traffic to Passively Detect Under Utilized Resources in High- Performance Cluster Grid Computing Environments. Patent #3598-SPL Filed 9/14 A Network-Based Mobile Device Application Monitor for Android Mobile Devices Provisional Patent #3659-SPL 11/13 A Network-Based Mobile Device Malware Monitor for Android Mobile Devices Awards, Scholarships, and Fellowships 5-Year BS/MS Scholarship in Physics, Clark Atlanta University 8/92 2-Year MS Scholarship in Computer Science, Clark Atlanta University 8/97 Lawrence R. Hafstad Fellowship, Johns Hopkins University Applied Physics Lab 10/13 Publications Journals Lanier Watkins, William H. Robinson, Raheem Beyah, "Using Network Traffic to Infer Hardware State: A Kernel-Level", In ACM Transactions on Embedded Computing Systems (TECS), Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific-based Risk Metrics, To Appear In the Journal of Information Warfare (JIW), July Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the CPU Resource Discovery Problem in Cluster Grid Networks. In IEEE Transactions on Parallel and Distributed Systems (TPDS), December 2011.

3 Lanier Watkins, William H. Robinson, Raheem Beyah, A Passive Solution to the Memory Resource Discovery Problem in Grid Computing. In IEEE Transactions on Network and Service Management (TNSM), December Lanier Watkins, Cherita Corbett, and Raheem Beyah, Using Link RTT to Passively Detect Unauthorized Wireless Nodes. In the International Journal of Security and Networks, Vol. 4, No. 3, Conferences Georgios Lontorfos, Kevin D Fairbanks, Lanier Watkins, and William H. Robinson, Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior, To Appear in the Proceedings of IEEE Workshop on Network Measurements (WNM), October Lanier Watkins and John Hurley, Cyber Maturity as Measured by Scientific Risk-Based Metrics, In the Proceedings of the International Conference on Cyber Warfare and Security (ICCWS), March Lanier Watkins, Christina Kawka, Cherita Corbett, and William Robinson, "Fighting Banking Botnets By Exploiting Inherent Command and Control Vulnerabilities", In IEEE Proceedings of the International Conference on Malicious and Unwanted Software (MALCON), October Mengchao Yue, William H. Robinson, Lanier Watkins and Chertia Corbett, "Constructing Timing-Based Covert Channels in Mobile Networks by Adjusting CPU Frequency", In the Proceedings of ACM International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June Lanier Watkins, Garth V. Crosby and Afsana Sharmin, 'Using Network Traffic to Infer Power Levels in Wireless Sensor Nodes, In the Proceedings of IEEE the International Conference on Computing, Networking and Communications (ICNC), CNC Workshop, February Lanier Watkins, Cherita Corbett, Benjamin Salazar, Kevin Fairbanks and William H. Robinson, Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices In Proceedings of the IEEE Mobile Security Technologies (MoST), May Lanier Watkins, Raheem Beyah, and Cherita Corbett, Passive Identification of Under Utilized CPUs in High Performance Cluster Grid Netwoks In the Proceedings of the IEEE International Conference on Communications (ICC), May Lanier Watkins, Raheem Beyah, and Cherita Corbett, A Passive Approach to Rogue Access Point Detection. In the Proceedings of the IEEE Global Communications Conference (GLOBECOM), December Lanier Watkins, Raheem Beyah, and Cherita Corbett, Using Network Traffic to Passively Detect Under Utilized Resources in High-Performance Cluster Grid Computing Environments. In the Proceedings of the ACM International Conference on Networks for Grid Applications (GRIDNETS), October Alfred Msezane, Zineb Felfli, Dmitri Sokolovski, Lanier Watkins, et al, Regge-Pole Calculation of the Resonance Contribution to Electron-Atom Cross Sections, 3rd International Conference on Neural, Parallel and Scientific Computations, August Lanier Watkins, Kenneth R. Perry, John S. Hurley, B. Olson, and B. Pain, Wavelet Transform Image Compression Prototype. Technical Proceedings of the International Conference on Modeling and Simulation of Microsystems, Referee Service for Journals / Magazines IEEE Transactions on Parallel and Distributed Systems, 2015

4 Journal of Wireless Communications and Mobile Computing, 2014 Journal of Risk Analysis, 2013 Journal of Wireless Communications and Mobile Computing, 2013 Elsevier Information Sciences, 2013 IEEE Transactions on Parallel and Distributed Systems, 2013 Elsevier AD HOC Networks Journal, 2013 IEEE Mobile Ad-hoc and Sensor Systems, 2013 IEEE Transactions on Parallel and Distributed Systems, 2012 IEEE Transactions on Systems, Man, and Cybernetics, 2011 Security and Communication Networks, 2011 Elsevier Information Sciences, 2010 IEEE Transactions on Parallel and Distributed Systems, 2010 Hindawi Publishing Corporation, 2010 Technical Program Committees International Workshop on Mobile Computing Security, Program Committee, 2015 IEEE ICC - Communication and Information Systems Security Symposium, 2015 IEEE International Symposium on Security and Privacy in Internet of Things, 2013 Euromicro PDP (Special Session on Energy Aware Systems), Program Committee, 2011 International Conference on Computing, Networking and Communication (ICNC) Program Committee, 2011 Professional Society Memberships Institute for Electrical and Electronics Engineers (IEEE): Computer Society, 2010-Present Security Clearance Secret, 2011 to Present Master s Capstone Degrees Supervised Wlajimir Alexis (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Automobile Driver Identification Using the Wavelet Transform and Machine Learning Weihong Lou (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Tunable Attribution: Can Malware Manipulate AV Detection?" Changyun Gong (Current 2015 M.S. Security Informatics Student), Master s Capstone Project: Algorithm Detection in Binary Files Using Magic Numbers and Strings Peizhao Li and Yifan Tian (Current 2015 M.S. Security Informatics Students) Master s Capstone Project: A Network-based Approach to Black Listing Mobile Applications That Exhibit Silent or Obfuscated Network Traffic Kurt Silberberg, M.S. in Security Informatics (Spring 2015) Master s Capstone Project: Monitoring DDoS Botnet C&C s For Computer Forensic Artifacts Ashwini Pugazhendhi, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "A Network-based Thermal Hardware Trojan Detection Method" Georgios Lontorfos, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Remotely Identifying Rich Targets In SCADA Networks" Chengyuan Zhang, Fangyue Chen, and Wentao Li, M.S. in Security Informatics (Fall 2014) Master s Capstone Project: "Mapping The Attack Surface For Zeus Command And Control" Shijie Zhang, Li Xu, and Christina Kawka, M.S. in Security Informatics (Spring 2014) Master s Capstone Project: Malware Analysis of Zeus : The Development of A Tunable Attribution Framework and Remote Command and Control Reconnaissance

5 Amritha Lal, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Network-Based Detection of Malware in Mobile Networks Shuang Xie and Tianning Yang, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Identifying Mobile Malware Instructions Which Induce Information Leakage in Network Traffic Mengchao Yue, M.S. in Security Informatics (Fall 2013) Master s Capstone Project: Covert Timing Channel: An Android-Based Mobile Application

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University

More information

network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y

network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y Solving the Federal Government s Toughest Cyber Security Problems NETWORK PROTECTION AND INFORMATION ASSURANCE NETWORKS WITH A RICH HERITAGE OF ACHIEVEMENT AND LEVERAGING THE EXPERTISE AND RESOURCES OF

More information

NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security

NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at

More information

Malicious Network Traffic Analysis

Malicious Network Traffic Analysis Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003) Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno [email protected] http://www.cs.unr.edu/ monica June 1998 - May 2003: University

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role

More information

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004 Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905

More information

PhD in Strategic Management, College of Management, Georgia Institute of Technology, 2008

PhD in Strategic Management, College of Management, Georgia Institute of Technology, 2008 Andrew M. Hess Curriculum Vitae Williams School of Commerce, Economics, and Politics Washington & Lee University, Lexington VA, 24450 Work: 540.458.8346; Fax: 540.458.8639 Email: [email protected]; Web: http://www.wlu.edu/williams-school/business-administration/faculty-and-staff/profile?id=x2975

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Symptoms Based Detection and Removal of Bot Processes

Symptoms Based Detection and Removal of Bot Processes Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION

CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION A. Present University Department or Unit: Information Systems Technologies School of Information Systems and

More information

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model

WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH

More information

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

June Zhang (Zhong-Ju Zhang)

June Zhang (Zhong-Ju Zhang) (Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez

More information

CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/

CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/ CURRICULUM VITAE 1 Igor V. Maslov Contact information 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304 Tokyo 151-0073 E-mail: [email protected] Japan Web: http://www.columbia.edu/~ivm3/ Education

More information

Frank T. Ferrese, PhD, PE

Frank T. Ferrese, PhD, PE Frank T. Ferrese, PhD, PE Contact Information FJT Technologies LLC Phone: (856) 924-4690 414 First Avenue E-mail: [email protected] Haddon Heights, NJ 08035 Web: www.fjttech.com Professional Profile

More information

The Behavioral Analysis of Android Malware

The Behavioral Analysis of Android Malware , pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,

More information

Secured Embedded Many-Core Accelerator for Big Data Processing

Secured Embedded Many-Core Accelerator for Big Data Processing Secured Embedded Many- Accelerator for Big Data Processing Amey Kulkarni PhD Candidate Advisor: Professor Tinoosh Mohsenin Energy Efficient High Performance Computing (EEHPC) Lab University of Maryland,

More information

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative

More information

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education

More information

Cybersecurity in a Mobile IP World

Cybersecurity in a Mobile IP World Cybersecurity in a Mobile IP World Alexander Benitez, Senior Scientist, ComSource Introduction by Robert Durbin, Cybersecurity Program Manager, ComSource Introduction ComSource s cybersecurity initiative

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

James L. Salmon, Ph.D., P.E. Senior Engineer 513-376-7974 direct 513-254-5949 mobile [email protected] PROFESSIONAL EXPERIENCE

James L. Salmon, Ph.D., P.E. Senior Engineer 513-376-7974 direct 513-254-5949 mobile jsalmon@caulfieldeng.com PROFESSIONAL EXPERIENCE James L. Salmon, Ph.D., P.E. 513-376-7974 direct 513-254-5949 mobile [email protected] PROFESSIONAL EXPERIENCE Current Caulfield Engineering, LLC Naperville, Illinois Dr. Salmon specializes in the

More information

Fengwei Zhang. Research Interest. Education. Employment History

Fengwei Zhang. Research Interest. Education. Employment History Fengwei Zhang Wayne State University 5057 Woodward Avenue, Suite 3010 Detroit, Michigan 48202 [email protected] http://fengwei.me Research Interest My primary research interests are in the areas of systems

More information

Defending against modern threats Kruger National Park ICCWS 2015

Defending against modern threats Kruger National Park ICCWS 2015 Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter

More information

A General-purpose Laboratory for Large-scale Botnet Experiments

A General-purpose Laboratory for Large-scale Botnet Experiments A General-purpose Laboratory for Large-scale Botnet Experiments Thomas Barabosch, Sebastian Eschweiler, Mohammad Qasem, Daniel Panteleit, Daniel Plohmann and Elmar Gerhards-Padilla Cyber Defense Fraunhofer

More information

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS SACHIN MALVIYA Student, Department of Information Technology, Medicaps Institute of Science & Technology, INDORE (M.P.)

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS

XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present

More information

How To Become A Cybersecurity Consultant

How To Become A Cybersecurity Consultant Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Publications of Ugo Fiore

Publications of Ugo Fiore Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal

More information

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the

More information

Nicholas J. Kelling, Ph.D.

Nicholas J. Kelling, Ph.D. Nicholas J. Kelling, Ph.D. Curriculum Vitae EDUCATION Assistant Professor of Psychology University of South Florida College of Arts and Sciences 4202 East Fowler Ave. Tampa, FL 33620 e-mail: [email protected]

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

Curriculum Vitae JOON-YEOUL OH

Curriculum Vitae JOON-YEOUL OH Curriculum Vitae JOON-YEOUL OH Department of Mechanical and Industrial Engineering Texas A&M University - Kingsville Kingsville, Texas 78363-8203 (361) 593-3941, [email protected] EDUCATION Ph.D. Industrial

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Quantification of Security and Survivability

Quantification of Security and Survivability Quantification of Security and Survivability ITI Workshop on Dependability and Security Urbana, Illinois Kishor Trivedi Department of Electrical and Computer Engineering Duke University Durham, NC 27708-0291

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

Comprehensive Advanced Threat Defense

Comprehensive Advanced Threat Defense 1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,

More information

Mike Perkins, Ph.D. [email protected]

Mike Perkins, Ph.D. perk@cardinalpeak.com Mike Perkins, Ph.D. [email protected] Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Botnets: The Advanced Malware Threat in Kenya's Cyberspace Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Security A to Z the most important terms

Security A to Z the most important terms Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from

More information

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008)

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008) Georges EL-HOWAYEK Valparaiso University Electrical and Computer Engineering Building, Room 223 Valparaiso, IN 46383, USA [email protected] http://www.unm.edu/~ghowayek/ RESEARCH INTERESTS Communication

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona

Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration California State Polytechnic University, Pomona

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Special Issue on Advances of Utility and Cloud Computing Technologies and Services

Special Issue on Advances of Utility and Cloud Computing Technologies and Services Special Issue on Advances of Utility and Cloud Computing Technologies and Services Aims Computing is rapidly moving towards a model where it is provided as services that are delivered in a manner similar

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

How To Protect Your Mobile From Attack From A Signalling Storm

How To Protect Your Mobile From Attack From A Signalling Storm ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology

Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:

More information

Automata Designs for Data Encryption with AES using the Micron Automata Processor

Automata Designs for Data Encryption with AES using the Micron Automata Processor IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.7, July 2015 1 Automata Designs for Data Encryption with AES using the Micron Automata Processor Angkul Kongmunvattana School

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

011100000110111101101111011 about

011100000110111101101111011 about COMPUTER SCIENCE 0 0 0 00 000 00 00

More information

Cyberspace Security Econometrics System (CSES) Portfolio. Robert K. Abercrombie Organized by FY Updated October 20, 2014

Cyberspace Security Econometrics System (CSES) Portfolio. Robert K. Abercrombie Organized by FY Updated October 20, 2014 Cyberspace Security Econometrics System (CSES) Portfolio Robert K. Abercrombie Organized by FY Updated October 20, 2014 4 Patents (Issued or Pending) 6 ORNL Intellectual Property Invention Disclosures

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012

Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012 EDUCATION Ph.D. Computer Engineering University of Southern California 1999 MS Computer Engineering University of Southern California 1994 B.S. Electrical Engineering Tehran University 1988 AWARDS & FELLOWSHIPS

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information