Curriculum Vitae Carol S. Taylor Computer Science Department Work phone: 509 359 6908 Eastern Washington University Fax: 509 359 2215 Cheney, WA 99004 ctaylor4214@comcast.net EDUCATION Degrees Ph. D., Computer Science, 2004, University of Idaho, Techniques for the Survivability of Critical Computer Systems. Advisor: Dr. Jim Alves Foss. Master of Science, Computer Science, 2001, University of Idaho, NATE Network Analysis of Anomalous Traffic Events, A Low cost Approach Bachelor of Science, Computer Science, 1985, Colorado State University. EXPERIENCE Teaching and Research Appointments Associate Professor, Eastern Washington University, Computer Science Department, 2006 present. Post Doctoral Fellow, University of Idaho, Computer Science Department, 2004 present. Conducted and supervised students in research related to high assurance, distributed, realtime, embedded architecture. Taught computer forensics and network security classes. Instructor, Computer Science Department, University of Idaho, 2003 2004. Taught upper division Database and Software Engineering courses plus lower division computer concepts course. Advised undergraduate students. Research Assistant, University of Idaho, Computer Science Department, 2001 2004. Conducted research in intrusion detection, formal methods, system survivability and secure system assessment. Supervised students doing research. Teaching Assistant, Computer Science Department, University of Idaho, 1999 2000. Taught C++ programming and Data Structures. Research Assistant, University of Idaho, Computer Science Department, 1999 2001. Designed and conducted experiments in intrusion detection. Conducted experiments in software metrics for software engineering improvements including dynamic and static measurement of software.
Faculty, Western Nebraska Community College, 1993 1998. an adjunct and regular faculty member, taught upper division Visual Basic, Systems Analysis and Design. Also taught C++ programming. As Non Academic Employment Programmer Analyst: USDA Soil Conservation Service, 1993 1994. Designed, programmed, implemented and supported a state wide INFORMIX database computer system. Programmer Analyst: USDA Forest Service, Ft. Collins, CO 1990 1992. Designed and programmed an Input Output modeling package. Systems Analyst: SM Systems and Research Corp., 1988 1989. Team designed and coded a document exchange system, ported Oracle based main frame system to PC environment, provided technical support for government agencies. System Administrator: Natural Res. Ecology Lab., CSU, Ft. Collins, 1985 1988. Provided programmer support to research scientists, wrote in house software, supported networked computer systems. Consulting Consultant, Conjungi Corporation, Seattle, Washington. May 2004. Completed a security assessment of an urban water utility including substations and company computer resources. Consultant, Objective Interface Systems, Herndon, VA, March 2006 present. Developing security training modules for MLS, MILS and general security courses. TEACHING ACCOMPLISHMENTS Areas of Specialization Information Assurance (Computer and Network Security) and Software Engineering Courses Taught Lower Division: CSCD330 Network Programming, 2006 2009 CS101 Introduction to Computer Science, 2003 2004 CS213 Data Structures, 2000 Upper Division CSCD396 General Computer Security CSCD433 Advanced Networking, 2007 2009 CS360 Data Base Concepts, 2004 2005 CS381 Software Engineering, 2004 CSCD434 Network Security, 2007 2009 CS447 Computer Forensics, 2005, 2007 2
Graduate CSCD500 Graduate Colloquium, 2008 2009. CSCD555 Research Methods for Graduate Students, 2009. CSCD 533 Graduate Level Advanced Networking CSCD534 Graduate Level Network Security Students Advised Advised 10 15 students per semester Since 2003 Honors and Awards Outstanding Faculty Teaching Award, University of Idaho, 2000 by Student Disability Services and Office of the Dean of Students Alumni Award for Excellence, University of Idaho, 2001 Award of excellence for maintaining an outstanding academic record while performing service to school and community Best Poster Award, University of Idaho, Engineering Expo, 2001 Received the Best Poster Award and a cash award of $300 SCHOLARSHIP Grants and Fellowships Received CREU: Collaborative Research Experience for Undergraduates incomputer Science and Engineering $14,500 from the Committee on the Status of Women in Computing Research PI: C. Taylor, 09/01 2009 06/01/2010, Awarded. SigCSE Special Projects $5,000 from Special Interest Group in Computer Science Education Co pi's: C. Taylor, T. Alexander, University of Memphis, 01/01/2009 /01/01/2010, Awarded Scholarship for Service $825,000, funded by National Science Foundation. Co PI's: P. Oman, J. Alves Foss, C. Taylor, 09/01/06 08/01/10, Awarded. Using Honeynets for Attacker Forensic Evidence $3000, funded by Microsoft Corporation. PI: C. Taylor, Summer 2006, Awarded. IDS Technologies Research Fellowship $3000 per semester, funded by NASA. PI: C. Taylor, 01/01/03 05/15/03, Awarded. IDS Presentation Travel Grant $1250, funded by NASA. PI: C. Taylor, January 2003, Awarded. 3
Publications Journals Alves Foss, J., S. Harrison, P. Oman, C. Taylor., The MILS Architecture for High Assurance Microsystems, International Journal of Embedded Systems, April 2005. Hanebutte, N., C. Taylor, and R. R. Dumke, Techniques for Successful Application of Factor Analysis in Software Measurement, Empirical Software Engineering, March 2003, Vol. 8, No. 1, p.43 57. Endicott Popovsky, B., Frincke, D., and Taylor, C. (2007), A Theoretical Framework for Organizational Network Forensic Readiness, The Journal of Computers, Issue 3. Other Referred Journals/Magazines Vanfleet, W. M., B. Beckwith, B. Calloni, J.A. Luke, C. Taylor and G. Uchenick, MILS: Architecture for High Assurance Embedded Computing, Crosstalk, Vol. 18, No. 8, August 2005. Refereed Conference Proceedings Bishop, M. and C. Taylor, A Critical Analysis of the Centers of Academic Excellence Program, Proceedings of the 13 th Colloquium for Information Systems Security Education, June 1 3, 2009, Seattle, WA. Taylor, C. and R. Shumba, A Security Course for non Majors, ACEIS 2009, Second Annual Conference on Education in Information Security, Feb. 18 20, 2009, Ames, Iowa. Taylor, C., B.E. Endicott Popovsky, and D.A. Frincke, Specifying Digital Forensics: Formalizing Forensics Policies, in Proceedings of the Annual Meeting of the Institute for Operations Research and Management Science (INFORMS) Conference 2007, 4 7 November 2007, Seattle, WA, pp. TBD. Taylor, C., Endicott Popovsky, B., and Frincke, D., Specifying Digital Forensics: A Forensics Policy Approach, in Proceedings of the 7 th Digital Forensic Research Workshop, Pittsburgh, PA, 13 15 August 2007. Gates, C., C. Taylor, and M. Bishop, Dependable Security: Testing Network Intrusion Detection Systems, in Proceedings of HotDep 07, Third Workshop on Hot Topics in System Dependability, June 26, 2007, Edinburgh, United Kingdom. M. Rounds, N. Pendegraft, and C. Taylor, A Human Centric Approach to Simulation of IS Security Dynamics, 18th IRMA International Conference May 19 23, 2007, Vancouver, British Columbia, Canada. 4
Taylor, C., A. Phillips, and B. Endicott Popovsky, Forensics Education: Assessment and Measures of Excellence, Systematic Approaches to Digital Forensics Engineering, April 10 12, 2007, Seattle, WA. Gates, C. and C. Taylor, Dorothy Denning was wrong! A provocative discussion of anomaly detection, submitted to New Security Paradigms Workshop, September 19 22, Dagstuhl, Germany, 2006. Shumba, R., J. Walden, S. Ludi, C. Taylor, A. Ju An Wang, Teaching the Secure Development Lifecycle: Challenges and Experiences, CISSE 2006, June 6 8 th, 2006, Baltimore, MD, 2006. Taylor, C., J. Alves Foss and V. Freeman, An Academic Perspective on the CNSS Standards: A Survey, CISSE 2006, June 6 8 th, 2006, Baltimore, MD. Taylor, C., R. Shumba, and J. Walden, Computer Security Education: Past, Present and Future, Seventh Workshop on Education in Computer Security (WECS7), Jan. 4 6, 2006, Monterey, Calif., 2006. Conrad, J. R., P. Oman, and C. Taylor, Managing Uncertainty in Security Risk Model Forecasts with RAPSA/MC, in IFIP 11.1 and IFIP 11.5 Working Conference, Fairfax, VA, 2006. Taylor, C., Diversity for Computer Defense, Panel at New Security Paradigms Workshop, Sept. 20 23, 2005, Lake Arrowhead, CA. Taylor, C. and J. Alves Foss, The Need for Information Assurance Curriculum Standards, CISSE Conference, June 6 9, 2005, Atlanta, GA. Alves Foss, J. and C. Taylor, An Analysis of the GWV Security Policy, ACL2 Workshop, Nov. 18 19 th, 2004, Austin TX. Alves Foss, J., C. Taylor, P. Oman, A Multi layered Approach to Security in High Assurance System Development, Hawaii International Conference on System Sciences, January 5 8 th, 2004. Taylor, C., P. Oman and A. Krings, Assessing Power Substation Network Security and Survivability: A work in Progress Report, Security and Management, June 23 26, 2003. Taylor, C. and J. Alves Foss, Attack Recognition for System Survivability: A Low level Approach, Hawaii International Conference. on System Sciences, January 6 9 th, 2003. 5
Taylor, C., A. Krings and J. Alves Foss, "Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening", ACM Workshop on Scientific Aspects of Cyber Terrorism, November 21, Wash DC, 2002. Taylor, C. and J. Alves Foss, An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events, New Security Paradigms Workshop, September 23 26, 2002, Virginia Beach, VA. Taylor, C., Krings, A., Harrison, W.S., Hanebutte, N., Merging Survivability System Analysis and Probability Risk Analysis for Security Assessment, in Supplement of Dependable Systems and Networks, June 23 26, 2002, Bethesda, MD. Taylor, C., A. Krings, W. S. Harrison, N. Hanebutte, and M. McQueen, Considering Attack Complexity: Layered Intrusion Tolerance, Presented at Intrusion Tolerant Workshop, Dependable Systems and Networks, June 23 26, 2002, Bethesda, MD. Taylor, C. and Alves Foss, J., Merging Safety and Assurance: The Process of Dual Certification for Software, In Proc. Software Technology Conference), April 29 May 1, 2002, Salt Lake City, UT. Taylor, C. and J. Alves Foss, NATE Network Analysis of Anomalous Traffic Events: A Low cost Approach, Proc. New Security Paradigms Workshop, September 11 13, 2001, Cloudcroft, NM. Krings, A., W. S. Harrison, N. Hanebutte, C. Taylor and M. McQueen, "A Two Layer Approach to Survivability of Networked Computing Systems", Proc. International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, (SSGRR'2001), L'Aquila, August 2001. Taylor, C., Harrison, W., Krings, A., Hanebutte, N. and McQueen, M. "Low Level Network Attack Recognition: A Signature Based Approach", 13th International Conference on Parallel and Distributed Computing and Systems, August 21 24, 2001, Anaheim, CA. Krings, A., W.S. Harrison, N. Hanebutte, C. Taylor, M. McQueen, and S. Matthews, "An Agent Supported Bottom Up Approach to Computer and Network Survivability", Supplement of the 2001 International Conference on Dependable Systems and Networks, July 1 4, 2001, Goteborg, Sweden. Krings, A., Harrison, W.S., Hanebutte, N., Taylor, C., and M. McQueen, Attack Recognition Based on Kernel Attack Signatures, International Symposium on Information Systems and Engineering,, June 25 28, 2001, Las Vegas, NV. 6
Presentations and Other Scholarly Activities Taylor, C. and R. Shumbs, Special Session: Security Education: A Roadmap to the Future, Special Session, SigCSE Technical Symposium on Computer Science Education, Mar. 12 15, 2008, Portland, OR. Taylor, C., C. Gates, D. Frincke, B. Bace, R. Shumba, Outstanding Women in Computer Security: A Panel, a Panel at Grace Hopper Celebration of Women in Computing Oct. 17 20, 2007, Orlando, FL. Taylor, C., C. Gates, An Introduction to Intrusion Detection, a Tutorial at Grace Hopper Celebration of Women in Computing Oct. 17 20, 2007, Orlando, FL. Taylor, C. Invited Participant Workshop, DFWG, June 17 20, 2007, Louisville, KY. Taylor, C., K. Immamura, Can Lego Robotics Really Boost Interest in Computer Science?, Faculty Poster at SigCSE March 7 10, 2007, Covington, KY. Taylor, C. NSPW Panel Chaired, at the Applied Computer Security Annual Conference, December 11 15, 2006, Miami Beach, Florida. Taylor, C, MILS, Multiple Independent Levels of Security: A High Assurance Architecture, Presentation to the Naval Post Graduate School, May 11, 2006, Monterey, CA. Taylor, C. and J. Alves Foss, Common Criteria Certification at Multi EAL Levels: Can it be done?, Software Technology Conference, May 1 4, 2006, Salt Lake City, UT. Bhagyavati, L. Ghemri, C. Taylor, and M. Hamada, Experiences Involving Undergraduates in Research, Panel presented at, 14th International Conference on Telecommunication Systems Modeling and Analysis (ICTSM 2006), October 5 8, 2006, Reading, PA Taylor, C. Attended Invited Workshop, Software Assurance Common Body of Knowledge, Department of Homeland Security, August 17 18, Common Body of Knowledge, Aug. 17 18. The Department of Homeland Security (DHS) National Cyber Security Division (NCSD) Software Assurance (SwA) Program invites you to a strategic session on the Software Assurance Common Body of Knowledge (CBK). Taylor, C., "Integrating Secure Coding Into a Computer Science Curriculum", SIGCSE, March 1 5, 2006, Houston, TX, 2006. Taylor, C. and R. Shumba, "Computer Science Education: Past, Present and Future", SIGCSE, March 1 5, 2006, Houston, TX. Taylor, C. and J. Alves Foss, "MILS, Multiple Independent Levels of Security", Case Studies Track at Annual Computer Security Applications Conference, December 2 5, 2005, Tucson, AZ. 7
Taylor, C., S. Popovsky, and B. Endicott Popovsky, International Curriculum Design for Undergraduate Computer Science, Faculty Poster at SigCSE, February 23 27, 2005, St. Louis, MS. Taylor, C., Grimaldi, S., Alves Foss, J., Oman, P., The Deeply Embedded MILS Architecture: the Middle Layers Described, Systems and Software Technology Conference, April 19 22, 2004, Salt Lake City, UT. Alves Foss, J. and Taylor, C., A Security Architecture for Secure Middleware, Proc. Software Technology Conference, April 28 May 1, 2003, Salt Lake City, UT. Alves Foss, J., B. Rinker, and C. Taylor, Towards Common Criteria Certification for DO 178B Compliant Airborne Software Systems, Internal CSDS Report, January 2002. Academic and Professional Service External Committees and Panels Assistant Program Chair, New Security Paradigms Workshop, 2006. Program Chair, New Security Paradigms Workshop, 2007. Annual Computer Security Applications Conference, 2007. Reviewer Computing Consortium Conference, Eastern Region, 2009. Hawaii International Conference on System Sciences, Survivability track, 2003. Software Technology Conference, 2001 2005 Computing Consortium Conference, Northwest Region, 2005. New Security Paradigms Workshop, 2006, 2008. Special Interest Group Computer Science Education, SigCSE, 2005 2007. Data & Knowledge Engineering Journal 2006 Innovation and Technology in Computer Science Education, ITiCSE, 2007. Hawaii International Conference on System Sciences, High Assurance track, 2006. Computer Systems Research Program (CSR), NSF Grant Review Panel, 2005. IEEE Transactions on Dependable and Secure Computing, 2006. University Committees General Education Committee, 2008 2009 Executive Graduate Committee Undergraduate Curriculum Committee Other University Service Mentor for CS student in the Women Mentors program through the Women's Center, University of Idaho, 2005 2006. Assisted with CRA W CREU grant for undergraduate women, 2009 8
Professional and Scholarly Organizations Association of Computing Machinery (ACM) Institute of Electrical and Electronic Engineers (IEEE) American Association of University Women Information Systems Security Association (ISSA) 9