Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )



Similar documents
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

SURENDRA SARNIKAR. 820 N Washington Ave, EH7 sarnikar@acm.org Madison, SD Phone:

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC

Bob Boothe. Education. Research Interests. Teaching Experience

Curriculum Vitae of. Vicky G. Papadopoulou

CURRICULUM VITAE. Suneel Udpa. B.S., Physics, Bombay University, 1980, graduation with first class.

William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs

Gerald Roth. Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN

CURRICULUM VITAE Herbert L. Dershem

9700 South Cass Avenue, Lemont, IL URL: fulin

John Noll, Ph.D. Research Associate, ATRIUM Laboratory, Marshall School of Business, University of Southern California,

Wayne State University Phone: Woodward Avenue, Suite

Curriculum Vitae JEFF LOUCKS

Jerry Cha-Jan Chang, Ph.D.

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

Kaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu

Graduate Student Orientation

New-Age Master s Programme

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Yunchuan (Frank) Liu

G. Bradley Bennett, CPA, Ph.D.

Yong Lu, Ph.D. Phone: (570)

June Zhang (Zhong-Ju Zhang)

Prairie View A&M University Computer Science Department 招 生 简 介

CURRICULUM VITAE. Dr. Mark H. Liu

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Computer Hacking Forensic Investigator v8

XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS

Mathematics Discrete Mathematics (F06-S07), Finite Mathematics (F00-S01, S07), Intermediate Algebra

CURRICULUM VITAE. Igor V. Maslov Sasazuka, Shibuya-ku Phone: +81 (80) Web:

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids

VITA CURRICULUM VITAE. Mark Pullin 116 Beechwood Victoria, TX Phone: Fax: Internet:

Aurore José Kamssu. 08/ : Assistant Professor of Business Information Systems, Tennessee State University

Michelle Govan & Anand Philip Network & Security Engineering

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Resume of Hanan H. Elazhary

DEBZANI DEB Department of Computer Science Winston-Salem State University Winston-Salem, NC 27110

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia KOZANI, GREECE

Education. Professional Experience. CHENG C. LIU, Ph.D., Associate Professor Curriculum Vitae

JINGQUAN LI, PH.D. Education

Ali Ebnenasir. Department of Computer Science, Michigan Technological University.

Cyber Security at NSU

Brian Alan Snyder, Ph. D.

Game Theory Based Load Balanced Job Allocation in Distributed Systems

Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

NSF Workshop on Big Data Security and Privacy

, MPhil. in Accounting. Faculty of Commerce, Cairo University, Egypt.

How To Teach Computer Science

ENERGY-EFFICIENT TASK SCHEDULING ALGORITHMS FOR CLOUD DATA CENTERS

Tian (Lori) Tang Assistant Professor of Finance University of Louisville

Graduate Student Orientation

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*

VITA MICHAEL W. FAULKENDER. R.H. Smith School of Business Office: (301)

Huseyin Polat s Curriculum Vitae

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

Clinical Nurse Leader Examination, Dominican University, 2012

RUI SUN, Ph.D. RESEARCH INTERESTS: Fiscal Federalism State and Local Government Finance Nonprofit finance Economic Development

Erik Jonsson School of Engineering and Computer Science

Curriculum Vitae Michael M. Zavlanos

Department of Computer Science: Graduate Catalog Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András

Jennifer L. Davidson

Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Stephanie A. Blanda 020 McAllister Building University Park, PA Webpage:

Curriculum Vitae Timothy R. Colburn Associate Professor Department of Computer Science University of Minnesota, Duluth Duluth, MN 55812

Efficient Data Replication Scheme based on Hadoop Distributed File System

Bellevue University Cybersecurity Programs & Courses

CURRICULUM VITAE OF DAN D. V. BHANDERI

Cisco Network Specialist CCNA

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

Europass Curriculum Vitae

Data Mining and Knowledge Discovery, Text Mining, Information Retrieval, Ontology, Bioinformatics, Parallel and Distributed Computing.

Marsha B. Keune June 2015

ELLEN E. ENGEL. Education Stanford University, Graduate School of Business, Ph.D. - Accounting, 1997.

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990

Elizabeth A. Arnold. Academic Experience. Education

CURRICULUM VITAE FERNANDO LUÍS TODO-BOM FERREIRA DA COSTA

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

CURRICULUM VITAE. Li Chen

INNOVATION. Campus Box 154 P.O. Box Denver, CO Website:

Curriculum Vitae. John M. Zelle, Ph.D.

CURRICULUM VITA. JULIA A. SMITH, Ph.D. Associate Professor Division of Special Education Undergraduate and Graduate Faculty Appointed 1985

How To Secure Cloud Computing

STEPHEN DAVIES 302 Chestnut Lane Fredericksburg, VA Home (540) Office (540) FAX (540)

Preventing and Detecting Plagiarism in Programming Course

2010 Master of Science Computer Science Department, University of Massachusetts Amherst

Jason A. Duan (Jun Duan)

Fig. 1 WfMC Workflow reference Model

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

Eligibility to Serve as a Principal Investigator for Research Involving Human Subjects

Wooje Cho Ph.D. Candidate

Educational Requirement Analysis for Information Security Professionals in Korea

Transcription:

Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu Phone: 219-989-2634(Office) RESEARCH INTERESTS Information Security: Design systems with strong security requirements, system vulnerabilities and threat modeling, analyze system dependability and security assurance for secure data storage systems, design secure and efficient computing protocols, and develop efficient and secure access protocols and polices. Digital Forensics: Internet and distributed system vulnerabilities, attack incident modeling, identification, automatic tracking and reconstruction. Network Security: Design computer network systems with proper security protection. Vulnerabilities and vulnerability analysis on network systems and mobile computing paradigm. Cloud/Distributed Computing: External and internal attack incident identification/tracking/ reconstruction for cloud environment. Cloud System resilience and service resilience modeling and design, Design secure and efficient grid computing platforms and data storage systems, develop data protocols and algorithms on metadata management and resource allocation to improve system interoperability, availability, security, and performance for the data grid. EDUCATION Wuhan University, Environmental Science, BS, 1996, University of Texas at Dallas, Computer Science, MS, 2001. University of Texas at Dallas, Computer Science, PhD, 2006. SELECTED PUBLICATION Journal M. Tu and I. Yen. A distributed replica placement algorithm for correlated data. The Journal of SuperComputing, Vol. 68, Issue 1, page 245-273. 2014. M. Tu and D. Xu. Resilience as a new system engineering for cloud computing. Journal of Communications. Vol. 8, No. 4. 2013 M. Tu, H. Ma, I. Yen, F. Bastani, and D. Xu. Availability, security, access performance an load balance in P2P data grid. Journal of Grid Computing. Vol. 11, No. 1, 2013.

Conference M. Tu, D. Xu, E. Butler, and A. Schwartz. Locating and identifying forensic evidence for attacks against online business information systems by using honeynet. Journal of Digital Forensics, Security, and Law. Vol. 7, Issue 4, 2012. M. Tu, S. Wira, and D. Xu. On the development of digital forensics curriculum. Journal of Digital Forensics, Security, and Law. Vol. 7, Issue 3, 2012. D. Xu, M. Tu, M. Sanford, L. Thomas, D. Woodraska. Automated security testing with formal threat models. IEEE Transactions on Dependable and Secure Computing. Vol 9, No. 4. 2012. M. Tu, P. Li, I. Yen, B. Thuraisingham, L. Khan. Secure data objects storage in data grids. IEEE Transactions on Dependable and Secure Computing. Vol. 7, No.1. 2010. M. Tu, D. Wang, P. Li, and N. Tadayon. Allocation of partitioned data by using a neural network based approach. Journal of NeuroComputing. Vol.72, No.4-6, 2009. P. Li, M. Tu, I. Yen. Preference update for E-Commerce applications: model, language, and processing. Journal of Electronic Commerce Research. Vol. 7, No. 1. 2007. M. Tu, P. Li, I. Yen, F. Bastani. Replica placement algorithms for mobile transaction systems. IEEE Transactions on Knowledge and Data Engineering. Vol. 18, No. 7. 2006. M. Gupta, M. Tu, L. Khan, F. Bastani, I-Yen, A study of the model and algorithms for handling location dependent continuous queries. Journal of Knowledge and Information Systems, Springer. Vol. 8, No.4. 2005. P. Li, Z. Xia, M. Tu, I. Yen. M 3 -update: a new update model for E-Commerce and web-based applications. International Journal of Computers and Their Application. Vol. 12, No. 3. September 2005. D. Xu, W. Xu and M. Tu. Automated Generation of Integration Test Sequences from Logical Contracts. In Proceedings of the 6 th IEEE International Workshop on Software Test Automation, in conjunction with IEEE International Computer Software and Applications Conference, (COMPSAC 14). July, 2014. M.Tu, S. Xue, K. Grskovich, M. Gorgiz. Security incident tracking in virtualized Linux environment. In Proceedings of the ASEE 2014 Annual Conference CIT Section, Indianapolis, IN. June 15-18. 2014. M. Tu and K. Spoa-Harty. Data loss prevention management in healthcare enterprise environments, In Proceedings of the ASEE 2014 Annual Conference CIT Section, Indianapolis, IN. June 15-18. 2014. M. Tu, L. Xiao, D. Xu. Maximizing the availability of replicated services in widely distributed systems. In Proceedings of IEEE International Conference on Software Security and Reliability, Washington DC, June, 2013. M. Tu and D. Xu. System resilience modeling and enhancement for the cloud. In Proceedings of IEEE International Conference on Computing, Networking, and Communications. San Diego, USA. Jan. 2013. M. Tu, D. Xu, Z. Xia. Securing epidemic based update protocol for P2P systems. In Proceedings of the IASTED PDCS 2011. Best Paper Award. December. 2011. M. Tu, D. Xu, Z. Xia, and J, Fu. Reach avaialbility of replicated services. In Proceedings of the 35 th IEEE International Computer Software and Application Conference. July 2011.

E. Butler and M. Tu. Forensic Readiness through augmented attack graphs. In Proceedings of 2011 Mid West Instruction and Computing Symposium (MICS 11), April 2011. Z. Xia, W. Zhang, M. Tu, I. Yen. Kernel-based approaches for collaborative filtering. In Proceedings of IEEE 9 th International Conference on Machine Learning and Applications. 2010. J. Fu, W. Hao, M. Tu, B. Ma. Virtual service in cloud computing. In Proceedings of the IEEE 6 th World Congress on Service (Service-1), Sept. 2010. M. Tu, Z. Xia, E. Lu, and N. Tadayon. A scalable update protocol for P2P data grids. In proceedings of 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 08). July, 2008. N. Tadayon, R. Tadayon, and M. Tu. Recruiting students to computer science program via online games. In proceedings of 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FEC 08). July, 2008. Z. Xia, M. Tu, H. Qi, and W. Zhang. Data integration for recommendation systems. In Proceedings of IEEE 7 th International Conference on Machine Learning and Applications. 2008. M. Tu, L. Xiao, H. Ma, I. Yen, and F. Bastani. Data placement in secure and dependent P2P data grids. In proceedings of IEEE 10 th International Symposium on High Assurance System Engineering, November 2007. M. Tu, Z. Xia, E. Lu, and N. Tadayon. A secure and scalable update protocol for P2P data grids. In proceedings of IEEE 10 th International Symposium on High Assurance System Engineering, November 2007. M. Tu, D. Wang, Y. Zhang, I. Yen. Correlated data placement in widely distributed systems. In proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications. June 2007. M. Tu, P. Li, D. Wang. Allocation of partitioned data by using a neural network based approach. In proceedings of International Conference on Security and Management. 2007. Y. Dong, Z. Xia, and M.Tu. Selecting optimal parameters in support vector machines. In proceedings of IEEE 6 th International Conference on Machine Learning and Applications. 2007. Q. Ma, L. Xiao, I. Yen, M. Tu, F. Bastani. An adaptive multiparty protocol for secure data protection. In Proceedings of 11 th IEEE International Conference on Parallel and Distributed Systems. (ICPADS 05). Fukuoka City, Japan. 2005. M. Tu, P. Li, I. Yen, F. Bastani. On the optimal placement of secure data objects over Internet. In proceedings of 19 th IEEE International Parallel and Distributed Processing Symposium (IPDPS 05). Denver, Colorado, USA. 2005. M. Tu, P. Li, I. Yen. Transaction based dynamic partial replication in mobile environments. In proceedings of 18 th IEEE International Parallel and Distributed Processing Symposium (IPDPS 04). Santa Fe, New Mexico, USA. 2004. Q. Ma, W. Hao, W. Li, M. Tu, I. Yen. PeAgent - a mobile agent System to support secure Internet and web applications. In proceedings of 27 th IEEE International Computer Software and Applications Conference (COMPSAC 03). Dallas, Texas, 2003. Submitted Paper D. Xu, W. Xu and M. Tu. Automated Software Integration Testing with Logical Contracts. Submitted to IEEE Transactions on Reliability. Submitted in August 2014.

M. Tu and S. Xue. A preliminary study on the comparison of security incident tracking in virtualized and physical Linux environments. In preparation to be submitted to Journal of Digital Forensics, Security, and Law. December, 2014. M. Tu and P. Kharen. A preliminary study on the comparison of security incident tracking in virtualized and physical Windows environments. In preparation to be submitted to Journal of Digital Forensics, Security, and Law. August, 2014. M. Tu and D. Xu. A secure and scalable two level update consistency control protocol for Peer-to- Peer systems. Submitted to Journal of Grid Computing. April, 2014 M. Tu and K. Spoa-Harty. Data Loss Prevention Management and Control: Inside Activity Monitoring, Identification, and Tracking in Healthcare Enterprise Environments. Submitted to Journal of Digital Forensics, Security, and Law. April, 2014. FUNDING PI-Southern Utah University Faculty Development Grant, 2007 and 2008, $12,000 Co-PI, NSF MRI Program MRI: Acquisition of an Online Banking System for Information Assurance Research, $400,000, CNS1123220. September 2011-August 2013. Senior personnel, NSF REU Site: REU Site: Information Assurance and Security, NSF, $328,427, CNS1004843, 5/01/2010-4/30/2013. Senior personnel, NSF RET Site: Information Assurance and Security, NSF, $500,000, 6/01/2012-5/31/2015. DSU Faculty Research Initiative, $4,000, 2010, 2011. DSU Graduate Student Research Initiative, $2,000.00, 2012. DSU Faculty Online Curriculum Development, $1,500, INFA721, Digital Forensics. DSU Faculty Online Curriculum Development, $2,500, INFS756, Cloud Computing & Network Services. Purdue University Calumet Undergraduate Research Initiative, $600, Sept. 2012, March 2013 Purdue University Calumet Grant Development Phase I, $2,500, Jan. 2013. PRF Faculty Summer Research Grant, $8,000, May-July. 2013. Purdue University Calumet Faculty Summer Research Grant, $3,000, May 2014. PENDING PROPOSALS PI, NSF CAREER Sustain the unexpected from theory to design, $659,440, Submitted in July, 2014. STUDENT RESEARCH EXPERIENCE Thesis committee chair of 2 master students (Raj Nepala, 2012, Samsuddin Wira, 2009 ) Thesis committee chair of 1 doctoral student (Jason Nikolai, DSU ) NSF REU Undergraduate Research Program, 2010, 2011, 2012. DSU Graduate Student Research Initiative, 2012. Purdue University Calumet Undergraduate Research, Fall 2012-, Fall 2013- Purdue University Calumet, Master Thesis advisor, 2014- CERTIFICATION & PROFESSIONAL TRAINING Sun Certified Java Programmer, Sun, 01/2001

Information Assurance Program Certificate, offered jointly by University of Texas at Dallas, National Security Agency, and The Committee on National Security Systems. 02/2006 Computer Hacking Forensics Investigator (CHFI) Certificate, EC-Council, 03/2007 Certified Ethical Hacking (CEH), EC-Council, 12/2008 Certified Network Penetration Tester (CPT), IACRB, 02/2009 Certified AccessData Computer Examiner (ACE), 09/2012 PROFESSIONAL SERVICES/MEMBERSHIP Reviewer for Journal of High Speed Networks, Journal of Knowledge and Information Systems, Journal of Super Computing, Journal of Parallel and Distributed Computing, Journal of Systems and Software,International Journal of Software Engineering and Knowledge Engineering, Journal of Digital Forensics, Security, and Law, IEEE International Computer Software and Applications Conference (COMPSAC 03), IEEE Hawaii International Conference on System Sciences (HICSS 04), IEEE Eighth International Symposium on High Assurance Systems Engineering (HASE 07), IEEE International Symposium on Autonomous Decentralized Systems (ISAD09), 4 th IEEE International Conferences on Secure software Integration and Reliability Improvement(SSIRI 10), 16 th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 11), International Journal of Knowledge Based Systems, Journal of Digital Forensics, Security, and Law, IEEE Transactions on Parallel and Distributed Systems. Organization Committee (Financial Chair) of 10th IEEE International Symposium on High Assurance Systems Engineering, Dallas, Texas, November 14-16. (HASE 07), 2007; Organization Committee (Fast Abstract Chair) of the 16 th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 11), Security Session Chair of PDCS2011. Program committee: IEEE International Symposium on Autonomous Decentralized Systems (ISAD09), Athens, Greece, March 2009. 4th IEEE International Conference on Secure Software Integration and Reliability Improvement, 2010. (SSIRI 10), 3 rd IEEE International Workshop on Computer Forensics and Software Engineering,2011. Editor: WebPub Journal of Scientific Research, Research, National Cyber Security Institute Journal IEEE member InfraGard Member ASEE Member National Cyber Security Institute Fellow