Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu Phone: 219-989-2634(Office) RESEARCH INTERESTS Information Security: Design systems with strong security requirements, system vulnerabilities and threat modeling, analyze system dependability and security assurance for secure data storage systems, design secure and efficient computing protocols, and develop efficient and secure access protocols and polices. Digital Forensics: Internet and distributed system vulnerabilities, attack incident modeling, identification, automatic tracking and reconstruction. Network Security: Design computer network systems with proper security protection. Vulnerabilities and vulnerability analysis on network systems and mobile computing paradigm. Cloud/Distributed Computing: External and internal attack incident identification/tracking/ reconstruction for cloud environment. Cloud System resilience and service resilience modeling and design, Design secure and efficient grid computing platforms and data storage systems, develop data protocols and algorithms on metadata management and resource allocation to improve system interoperability, availability, security, and performance for the data grid. EDUCATION Wuhan University, Environmental Science, BS, 1996, University of Texas at Dallas, Computer Science, MS, 2001. University of Texas at Dallas, Computer Science, PhD, 2006. SELECTED PUBLICATION Journal M. Tu and I. Yen. A distributed replica placement algorithm for correlated data. The Journal of SuperComputing, Vol. 68, Issue 1, page 245-273. 2014. M. Tu and D. Xu. Resilience as a new system engineering for cloud computing. Journal of Communications. Vol. 8, No. 4. 2013 M. Tu, H. Ma, I. Yen, F. Bastani, and D. Xu. Availability, security, access performance an load balance in P2P data grid. Journal of Grid Computing. Vol. 11, No. 1, 2013.
Conference M. Tu, D. Xu, E. Butler, and A. Schwartz. Locating and identifying forensic evidence for attacks against online business information systems by using honeynet. Journal of Digital Forensics, Security, and Law. Vol. 7, Issue 4, 2012. M. Tu, S. Wira, and D. Xu. On the development of digital forensics curriculum. Journal of Digital Forensics, Security, and Law. Vol. 7, Issue 3, 2012. D. Xu, M. Tu, M. Sanford, L. Thomas, D. Woodraska. Automated security testing with formal threat models. IEEE Transactions on Dependable and Secure Computing. Vol 9, No. 4. 2012. M. Tu, P. Li, I. Yen, B. Thuraisingham, L. Khan. Secure data objects storage in data grids. IEEE Transactions on Dependable and Secure Computing. Vol. 7, No.1. 2010. M. Tu, D. Wang, P. Li, and N. Tadayon. Allocation of partitioned data by using a neural network based approach. Journal of NeuroComputing. Vol.72, No.4-6, 2009. P. Li, M. Tu, I. Yen. Preference update for E-Commerce applications: model, language, and processing. Journal of Electronic Commerce Research. Vol. 7, No. 1. 2007. M. Tu, P. Li, I. Yen, F. Bastani. Replica placement algorithms for mobile transaction systems. IEEE Transactions on Knowledge and Data Engineering. Vol. 18, No. 7. 2006. M. Gupta, M. Tu, L. Khan, F. Bastani, I-Yen, A study of the model and algorithms for handling location dependent continuous queries. Journal of Knowledge and Information Systems, Springer. Vol. 8, No.4. 2005. P. Li, Z. Xia, M. Tu, I. Yen. M 3 -update: a new update model for E-Commerce and web-based applications. International Journal of Computers and Their Application. Vol. 12, No. 3. September 2005. D. Xu, W. Xu and M. Tu. Automated Generation of Integration Test Sequences from Logical Contracts. In Proceedings of the 6 th IEEE International Workshop on Software Test Automation, in conjunction with IEEE International Computer Software and Applications Conference, (COMPSAC 14). July, 2014. M.Tu, S. Xue, K. Grskovich, M. Gorgiz. Security incident tracking in virtualized Linux environment. In Proceedings of the ASEE 2014 Annual Conference CIT Section, Indianapolis, IN. June 15-18. 2014. M. Tu and K. Spoa-Harty. Data loss prevention management in healthcare enterprise environments, In Proceedings of the ASEE 2014 Annual Conference CIT Section, Indianapolis, IN. June 15-18. 2014. M. Tu, L. Xiao, D. Xu. Maximizing the availability of replicated services in widely distributed systems. In Proceedings of IEEE International Conference on Software Security and Reliability, Washington DC, June, 2013. M. Tu and D. Xu. System resilience modeling and enhancement for the cloud. In Proceedings of IEEE International Conference on Computing, Networking, and Communications. San Diego, USA. Jan. 2013. M. Tu, D. Xu, Z. Xia. Securing epidemic based update protocol for P2P systems. In Proceedings of the IASTED PDCS 2011. Best Paper Award. December. 2011. M. Tu, D. Xu, Z. Xia, and J, Fu. Reach avaialbility of replicated services. In Proceedings of the 35 th IEEE International Computer Software and Application Conference. July 2011.
E. Butler and M. Tu. Forensic Readiness through augmented attack graphs. In Proceedings of 2011 Mid West Instruction and Computing Symposium (MICS 11), April 2011. Z. Xia, W. Zhang, M. Tu, I. Yen. Kernel-based approaches for collaborative filtering. In Proceedings of IEEE 9 th International Conference on Machine Learning and Applications. 2010. J. Fu, W. Hao, M. Tu, B. Ma. Virtual service in cloud computing. In Proceedings of the IEEE 6 th World Congress on Service (Service-1), Sept. 2010. M. Tu, Z. Xia, E. Lu, and N. Tadayon. A scalable update protocol for P2P data grids. In proceedings of 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 08). July, 2008. N. Tadayon, R. Tadayon, and M. Tu. Recruiting students to computer science program via online games. In proceedings of 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FEC 08). July, 2008. Z. Xia, M. Tu, H. Qi, and W. Zhang. Data integration for recommendation systems. In Proceedings of IEEE 7 th International Conference on Machine Learning and Applications. 2008. M. Tu, L. Xiao, H. Ma, I. Yen, and F. Bastani. Data placement in secure and dependent P2P data grids. In proceedings of IEEE 10 th International Symposium on High Assurance System Engineering, November 2007. M. Tu, Z. Xia, E. Lu, and N. Tadayon. A secure and scalable update protocol for P2P data grids. In proceedings of IEEE 10 th International Symposium on High Assurance System Engineering, November 2007. M. Tu, D. Wang, Y. Zhang, I. Yen. Correlated data placement in widely distributed systems. In proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications. June 2007. M. Tu, P. Li, D. Wang. Allocation of partitioned data by using a neural network based approach. In proceedings of International Conference on Security and Management. 2007. Y. Dong, Z. Xia, and M.Tu. Selecting optimal parameters in support vector machines. In proceedings of IEEE 6 th International Conference on Machine Learning and Applications. 2007. Q. Ma, L. Xiao, I. Yen, M. Tu, F. Bastani. An adaptive multiparty protocol for secure data protection. In Proceedings of 11 th IEEE International Conference on Parallel and Distributed Systems. (ICPADS 05). Fukuoka City, Japan. 2005. M. Tu, P. Li, I. Yen, F. Bastani. On the optimal placement of secure data objects over Internet. In proceedings of 19 th IEEE International Parallel and Distributed Processing Symposium (IPDPS 05). Denver, Colorado, USA. 2005. M. Tu, P. Li, I. Yen. Transaction based dynamic partial replication in mobile environments. In proceedings of 18 th IEEE International Parallel and Distributed Processing Symposium (IPDPS 04). Santa Fe, New Mexico, USA. 2004. Q. Ma, W. Hao, W. Li, M. Tu, I. Yen. PeAgent - a mobile agent System to support secure Internet and web applications. In proceedings of 27 th IEEE International Computer Software and Applications Conference (COMPSAC 03). Dallas, Texas, 2003. Submitted Paper D. Xu, W. Xu and M. Tu. Automated Software Integration Testing with Logical Contracts. Submitted to IEEE Transactions on Reliability. Submitted in August 2014.
M. Tu and S. Xue. A preliminary study on the comparison of security incident tracking in virtualized and physical Linux environments. In preparation to be submitted to Journal of Digital Forensics, Security, and Law. December, 2014. M. Tu and P. Kharen. A preliminary study on the comparison of security incident tracking in virtualized and physical Windows environments. In preparation to be submitted to Journal of Digital Forensics, Security, and Law. August, 2014. M. Tu and D. Xu. A secure and scalable two level update consistency control protocol for Peer-to- Peer systems. Submitted to Journal of Grid Computing. April, 2014 M. Tu and K. Spoa-Harty. Data Loss Prevention Management and Control: Inside Activity Monitoring, Identification, and Tracking in Healthcare Enterprise Environments. Submitted to Journal of Digital Forensics, Security, and Law. April, 2014. FUNDING PI-Southern Utah University Faculty Development Grant, 2007 and 2008, $12,000 Co-PI, NSF MRI Program MRI: Acquisition of an Online Banking System for Information Assurance Research, $400,000, CNS1123220. September 2011-August 2013. Senior personnel, NSF REU Site: REU Site: Information Assurance and Security, NSF, $328,427, CNS1004843, 5/01/2010-4/30/2013. Senior personnel, NSF RET Site: Information Assurance and Security, NSF, $500,000, 6/01/2012-5/31/2015. DSU Faculty Research Initiative, $4,000, 2010, 2011. DSU Graduate Student Research Initiative, $2,000.00, 2012. DSU Faculty Online Curriculum Development, $1,500, INFA721, Digital Forensics. DSU Faculty Online Curriculum Development, $2,500, INFS756, Cloud Computing & Network Services. Purdue University Calumet Undergraduate Research Initiative, $600, Sept. 2012, March 2013 Purdue University Calumet Grant Development Phase I, $2,500, Jan. 2013. PRF Faculty Summer Research Grant, $8,000, May-July. 2013. Purdue University Calumet Faculty Summer Research Grant, $3,000, May 2014. PENDING PROPOSALS PI, NSF CAREER Sustain the unexpected from theory to design, $659,440, Submitted in July, 2014. STUDENT RESEARCH EXPERIENCE Thesis committee chair of 2 master students (Raj Nepala, 2012, Samsuddin Wira, 2009 ) Thesis committee chair of 1 doctoral student (Jason Nikolai, DSU ) NSF REU Undergraduate Research Program, 2010, 2011, 2012. DSU Graduate Student Research Initiative, 2012. Purdue University Calumet Undergraduate Research, Fall 2012-, Fall 2013- Purdue University Calumet, Master Thesis advisor, 2014- CERTIFICATION & PROFESSIONAL TRAINING Sun Certified Java Programmer, Sun, 01/2001
Information Assurance Program Certificate, offered jointly by University of Texas at Dallas, National Security Agency, and The Committee on National Security Systems. 02/2006 Computer Hacking Forensics Investigator (CHFI) Certificate, EC-Council, 03/2007 Certified Ethical Hacking (CEH), EC-Council, 12/2008 Certified Network Penetration Tester (CPT), IACRB, 02/2009 Certified AccessData Computer Examiner (ACE), 09/2012 PROFESSIONAL SERVICES/MEMBERSHIP Reviewer for Journal of High Speed Networks, Journal of Knowledge and Information Systems, Journal of Super Computing, Journal of Parallel and Distributed Computing, Journal of Systems and Software,International Journal of Software Engineering and Knowledge Engineering, Journal of Digital Forensics, Security, and Law, IEEE International Computer Software and Applications Conference (COMPSAC 03), IEEE Hawaii International Conference on System Sciences (HICSS 04), IEEE Eighth International Symposium on High Assurance Systems Engineering (HASE 07), IEEE International Symposium on Autonomous Decentralized Systems (ISAD09), 4 th IEEE International Conferences on Secure software Integration and Reliability Improvement(SSIRI 10), 16 th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 11), International Journal of Knowledge Based Systems, Journal of Digital Forensics, Security, and Law, IEEE Transactions on Parallel and Distributed Systems. Organization Committee (Financial Chair) of 10th IEEE International Symposium on High Assurance Systems Engineering, Dallas, Texas, November 14-16. (HASE 07), 2007; Organization Committee (Fast Abstract Chair) of the 16 th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 11), Security Session Chair of PDCS2011. Program committee: IEEE International Symposium on Autonomous Decentralized Systems (ISAD09), Athens, Greece, March 2009. 4th IEEE International Conference on Secure Software Integration and Reliability Improvement, 2010. (SSIRI 10), 3 rd IEEE International Workshop on Computer Forensics and Software Engineering,2011. Editor: WebPub Journal of Scientific Research, Research, National Cyber Security Institute Journal IEEE member InfraGard Member ASEE Member National Cyber Security Institute Fellow