Phone: La Jolla, CA Website:
|
|
- Marcus Lyons
- 5 years ago
- Views:
Transcription
1 Damon Liwanu McCoy CSE Gillman Dr. Phone: La Jolla, CA Website: Education Ph.D. in Computer Science, University of Colorado, Boulder December 2009 Thesis Topic: Quantifying and Improving Wireless Privacy Co-Advisors: Douglas Sicker and Dirk Grunwald M.S. in Computer Science, University of Colorado, Boulder December 2006 B.S. in Computer Science, University of Colorado, Boulder May 1999 Research Interests network security, low latency anonymous networks, cyber-physical systems security, applied cryptography, e-crime, wireless security and privacy, distributed systems security. Publications Summary: 3 in tier 1 security conferences (2 USENIX Security, 1 IEEE Oakland) 2 in tier 1 systems conferences (2 ACM Mobisys) 4 in other systems/privacy conferences (PETS, Globecom) 1 in tier 1 security workshop (WPES) 1 in tier 1 systems workshop (HotNets) 4 in other systems/security workshops (WIFS, WIDA,...) Journal Publications Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan. Wifi-Reports: Improving Wireless Network Selection with Collaboration. In IEEE Transactions On Mobile Computing, Vol Conference Publications Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker. Practical Defenses for Evil Twin Attacks in To appear at IEEE Globecom Communications and Information Security Symposium Miami, FL, December [35.8% acceptance rate] Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage. Re: CAPTCHAs Understanding CAPTCHA Solving from an Economic Context. In Proceedings of the USENIX Security Symposium, 2010 Washington, D.C. [16% acceptance rate] Page 1
2 Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Experimental Security Analysis of a Modern Automobile. In Proceedings of the IEEE Symposium and Security and Privacy (Oakland), 2010, Oakland, CA. [12% acceptance rate] Kevin Bauer, Damon McCoy, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker. The Directional Attack on Wireless Localization - or - How to Spoof your Location with a Tin Can. In Proceedings of the IEEE Globecom 2009 Communications and Information Security Symposium (GLOBECOM), 2009, Honolulu, HI. [34.8% acceptance rate] Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker. Physical Layer Attacks on Unlinkability in Wireless LANs. In Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS), 2009, Seattle, WA. [29% acceptance rate] Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Damon McCoy, Srinivasan Seshan. Wifi-Reports: Improving Wireless Network Selection with Collaboration. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2009, Krakòw, Poland. [20% acceptance rate] Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS), 2008, Leuven, Belgium. [26% acceptance rate] Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayoshi Kohno, Srinivasan Seshan, and David Wetherall. Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2008, Breckenridge, CO. Best Paper Award. [18% acceptance rate] Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, Douglas Sicker. Passive Data Link Layer Wireless Device Driver Fingerprinting. In Proceedings of the 15th USENIX Security Symposium (Security), 2006 Vancouver, BC, Canada. [13% acceptance rate] Workshop Publications Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker. BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic. In proceedings of the 1st IEEE Workshop on Information Forensics and Security (WIFS), 2009 London, United Kingdom. [30% acceptance rate] Kevin Bauer, Harold Gonzales, and Damon McCoy. Mitigating Evil Twin Attacks in In Proceedings of 1st IEEE International Workshop on Information and Data Assurance (WIDA), 2009, Austin, TX. [32% acceptance rate] Kevin Bauer, Damon McCoy, Douglas Sicker, and Dirk Grunwald BitBlender: Light-Weight Anonymity for BitTorrent. In Proceedings of the Workshop on Applications of Private and Anonymous Communications Istanbul (Alpaca), 2008, Turkey. Jeffrey Pang, Ben Greenstein, Damon McCoy, Srinivasan Seshan, and David Wetherall. Tryst: The Case for Confidential Service Discovery. In ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), 2007, Atlanta, GA. [18% acceptance rate] Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Low-Resource Routing Attacks Against Tor. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), 2007, Alexandria, VA. [19% acceptance rate for full papers] Damon McCoy, Douglas Sicker, Dirk Grunwald. A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. In IEEE SECON Workshop on Software Defined Radios (SDR), 2007, San Diego, CA. Selected Talks Page 2
3 On the Optimal Path Length for Tor. In Hot Privacy Enhancing Technologies Symposium (HotPETS). Berlin, Germany Never Limit Yourself. Cove High School Graduation, Illinois Quantifying and Improving Wireless Privacy. In ACM MobiSys PhD Forum, Krakòw, Poland Performing Traffic Analysis on a Wireless Identified-Free Link Layer. In Tapia Celebration of Diversity in Computing, Portland, OR Using Wireless Physical Layer Information to Construct Implicit Identifiers. In Hot Privacy Enhancing Technologies Symposium (HotPETS). Leuven, Belgium Anonymity for BitTorrent. ToorCon, San Diego, CA Zulu a Command Line Wireless Frame Generator. DefCon, Las Vegas, NV Passive Data Link Layer Wireless Device Driver Fingerprinting. USENIX Security, Vancouver, BC, Canada A Recommendation for the Use of i within Sandia National Laboratories enterprise wireless network. Sandia National Laboratories 2005 Selected Articles and Reports Jamie Van Randwyk, et al.. Intrusion Detection and Monitoring for Wireless Networks. Sandia National Laboratories Technical Report SAND , 2005 Marc Miller, Jamie Van Randwyk, Damon McCoy, Mark Lodato. A Recommendation for the Use of i within Sandia National Laboratories enterprise wireless network. White paper, Sandia National Laboratories, 2005 Thesis Damon McCoy. Quantifying and Improving Wireless Privacy. Ph.D. dissertation, University of Colorado at Boulder, December 2009 Damon McCoy. Anonymity Analysis of Freenet. M.S. thesis, University of Colorado at Boulder, December 2006 Employment History Post-Doc, University of California at San Diego, Jan Present Staff, University of California at San Diego, Sept-Dec 2009 Research Intern, University of Washington/Intel Research, Summer 2007 Graduate Research Assistant, University of Colorado, Boulder, Aug May 2008 Research Intern, Sandia National Labs, Summers 2004 and 2005 Network Security Consultant, IBM, July August 2000 Research Intern, AT&T Research, Summer 1998 Research Intern, Lucent Bell Labs, Summer 1997 Page 3
4 Teaching Assistant, Washington Summer Scholars (high school honors and diversity program), Department of Computer Science and Engineering, University of Washington, (Instructor: Prof. Yoshi Kohno) July 2007 Workshop Leader and Tutor, computer science and math courses, Minority Engineering Program, University of Colorado at Boulder, Fall Spring 2006 Teaching Assistant, Networking (CSCI 4273/5273) Dept. of Computer Science, University of Colorado at Boulder, (Instructor: Prof. Rick Han) Fall 2004 Teaching Assistant, Data Structures (CSCI 2270) Dept. of Computer Science, University of Colorado at Boulder, (Instructor: Dr. Karl Winklmann) Fall 2003 and Spring 2004 Instructor, Introduction to Computer Science, Minority Engineering Program Summer Bridge Program, University of Colorado at Boulder, Summer 1996 Awards Fellowship: CRA/NFS Computing Innovation Fellow 2009,2010 Best Paper Award: MobiSys, 2008 Best Presentation Award: PhD Forum on Mobile Systems, Applications, and Services, 2009 Post Awards: Tapia, 2008 (Third place), MGEMSA, 2007 (First Place) Travel Awards: Privacy Enhancing Technologies Symposium (2007,2008,2009 Sponsored by Microsoft), ACM Richard Tapia Celebration of Diversity in Computing Conference 2009, Coalition to Diversify Computing (CDC) Travel Grant for ACM MobiSys 2009, American Indian Science & Engineering Society (AISES) National Conference 2009 (Sponsored by Google) Professional Activities General Co-Chair ACM MobiSys PhD Forums Workshop (2010) Program Committees Privacy Enhancing Technologies Symposium (PETS 2011) External Reviews Page 4
5 Journals: IEEE Transactions on Parallel and Distributed Systems (2010) Conferences: USENIX Security (2007, 2008), IEEE Security and Privacy (2007, 2008), ACM MobiCom (2008), ACM CCS (2008), ACM Mobisys (2009), NDSS (2010), Privacy Enhancing Technologies Symposium (PETS 2010), IEEE InfoCom (2011) Workshops: ACM Workshop on Wireless Security (2006), Workshop on Mobile Computing Systems and Applications (HotMobile 2008) Member ACM, American Indian Science & Engineering Society (AISES), Cherokee Nation, IEEE, USENIX Page 5
Computer Security and the Internet of Things
Computer Security and the Internet of Things Tadayoshi Kohno Computer Science & Engineering University of Washington At USENIX Enigma, January 2016 The Internet of Things Door Locks Thermostats Furnaces
More informationResearch Staff, International Computer Science Institute
Damon Liwanu McCoy New York University Department of Computer Science and Engineering +1 720-810-3076 mccoy@nyu.edu http:// www. damonmccoy. com/ Research Interests My primary research interests are in
More informationSome example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington
Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead
More informationExperimental Security Analysis of a Modern Automobile
Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper
More informationSecurity Analysis of modern Automobile
Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces
More informationUser Fingerprinting
A Report on 802.11 User Fingerprinting - Authors - Jeffrey Pang, Carnegie Mellon Univ Ben Greenstein, Intel Corp (Seattle) Ramakrishna Gummadi, Univ of So Cal Srinivasan Seshan, Carnegie Mellon Univ David
More informationModern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego
Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,
More informationDr. Ahmed K. Sadek 2. Experience
Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and
More informationWireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.
Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education
More informationRanveer Chandra. Computer Networks, Mobile Computing, Distributed Systems, Sensor Networks, Pervasive Computing
4110 Upson Hall Department of Computer Science http://www.cs.cornell.edu/people/ranveer Ranveer Chandra Phone: (607) 592-2274 (cell) (607) 255-9196 (office) Fax : (607) 255-4428 E-mail: ranveer@cs.cornell.edu
More informationBrian F. Cooper. Distributed systems, digital libraries, and database systems
Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305
More informationCE Advanced Network Security Anonymity II
CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationAutomotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes Clinton Young Iowa State University Department of Electrical and Computer Engineering cwyoung@iastate.edu
More informationJohn Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)
Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005
More informationImani Palmer ipalmer2.web.engr.illinois.edu
Imani Palmer ipalmer2@illinois.edu ipalmer2.web.engr.illinois.edu 240.676.7741 Research Interest Education Cyber Security, System Security, Real-Time Streaming Engines, Data Analysis University of Illinois
More informationJun Li, Ph.D. School of Computing and Information Sciences Phone:
Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/
More informationPhD coursework at Fox College of Business, Temple University, Philadelphia, PA Concentration: Information Systems (GPA: 3.9/4.
Rui Z. Sundrup Doctoral Candidate Department of Operations, Business Analytics and Information Systems Carl H. Lindner College of Business University of Cincinnati, Cincinnati, OH 45221 2925 Campus Green
More informationTEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor
TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University
More informationWest Bengal University of Technology Bachelor of Computer Science and Engineering
Susmit Shannigrahi Colorado State University Computer Science Department 1100 Center Avenue Mall, Fort Collins, CO, 80521 Phone: (+1) 740.346.9028 susmit@colostate.edu https://susm.it Education Colorado
More informationMatthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University
Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Office: BA 320A E-mail (Work): msopha@asu.edu W. P. Carey School of Business Phone
More informationJoe Michael Kniss December 2005
Joe Michael Kniss December 2005 Research Interests 50 S. Central Campus Dr. MEB 3490 Salt Lake City, UT, 84112 jmk@sci.utah.edu Phone: 801-898-7977 http://www.cs.utah.edu/ jmk I am currently conducting
More informationJ. Haadi Jafarian CV June J. Haadi Jafarian
J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina
More informationTor Experimentation Tools
Tor Experimentation Tools Fatemeh Shirazi TU Darmstadt / KU Leuven Darmstadt, Germany fshirazi@cdc.informatik.tu-darmstadt.de Matthias Göhring TU Darmstadt Darmstadt, Germany de.m.goehring@ieee.org Claudia
More informationToward Improving Path Selection in Tor
Toward Improving Path Selection in Tor Fallon Chen Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 203-00 Email: ftchen@cs.ucsd.edu Joseph Pasquale Department
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationNorth Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering
Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in
More informationDr. Spencer Sevilla Postdoctoral Researcher, University of Washington
Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University
More information2 Approaches to worldwide web information retrieval
The WEBFIND tool for finding scientific papers over the worldwide web. Alvaro E. Monge and Charles P. Elkan Department of Computer Science and Engineering University of California, San Diego La Jolla,
More informationAuthors. Passive Data Link Layer Wireless Device Driver Fingerprinting. Agenda OVERVIEW. Problems. Device Drivers
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting Presenter: Tyler Sidell April 2, 2008 Authors Jason Franklin, Carnegie Mellon Damon McCoy, University of Colorado Paria Tabriz, University
More informationEDUCATION RESEARCH EXPERIENCE
PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationPh.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms
April 29, 2009 Esther Ezra phone (919) 660-6578 Levine Science Research Center D340 fax (919) 660-6502 Department of Computer Science, Duke University http://www.math.tau.ac.il/~estere Durham NC 27708
More informationAmir Aminzadeh Gohari
Amir Aminzadeh Gohari Contact Information Computer Eng. Phone: (707) 953-2647 E-mail: amirazg@ece.ucsb.edu Santa Barbara, CA 93106 USA Web: http://ece.ucsb.edu/ amirazg Education Sept. 2007 June 2011 Ph.D.,
More informationSameer Agarwal. Indian Institute of Technology M.Sc. in Mathematics and Scientific Computing.
Sameer Agarwal 4759 NE 178 th Street Lake Forest Park, WA 98155 (858) 204-7585 sandwichmaker@gmail.com Education University of California, San Diego 2000 2006 Ph.D. in Computer Science and Engineering.
More informationRESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS
RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL 33314 Office: (954) 262-2068 Fax: (954) 262-3915 Email: lwei@nova.edu
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationNo Plan Survives Contact
No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego
More informationCAN Bus Risk Analysis Revisit
CAN Bus Risk Analysis Revisit Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes To cite this version: Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes. CAN Bus Risk Analysis Revisit. David
More informationHAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)
HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)
More informationCOMPUTER FUNDAMENTAL COMPUTER FUNDAMENTAL. page 1 / 5
page 1 / 5 page 2 / 5 computer fundamental pdf In computer vision, the fundamental matrix is a 3 3 matrix which relates corresponding points in stereo images.in epipolar geometry, with homogeneous image
More informationOn the Origins of a Thesis
STM 2008 On the Origins of a Thesis Steven J. Murdoch 1 University of Cambridge Computer Laboratory Cambridge, United Kingdom Abstract A PhD thesis typically reads as an idealised narrative: how would
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationRobert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA
Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business
More information2007 Doctor of Philosophy(Ph.D.) in Computer Science University of California, San Diego (UCSD)
ALPER T. MIZRAK VMware, Inc. 3401 Hillview Ave Palo Alto, CA 94304 Phone: 1 (650) 427-2492 amizrak@vmware.com http://cseweb.ucsd.edu/ amizrak www.linkedin.com/in/alpermizrak Cell: 1 (858) 337-3791 alpermizrak@gmail.com
More informationJOYCE JIYOUNG WHANG EDUCATION
JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data
More informationINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationAmy Babay April 2018
Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More information3715 McClintock Ave, GER 240, Los Angeles, CA 90089
Meisam Razaviyayn Contact Information razaviya@usc.edu 3715 McClintock Ave, GER 240, Los Angeles, CA 90089 Homepage Google scholar profile Research Interests Appointments Design and study of efficient
More informationMichael Paul Neff Curriculum Vitae
Michael Paul Neff Curriculum Vitae ACADEMIC HISTORY... Assistant Professor (tenure track), University of California, Davis, 2006-. Cross-appointed to the Department of Computer Science and the Program
More informationPractical Defenses for Evil Twin Attacks in
Practical Defenses for Evil Twin Attacks in 82. Harold Gonzales,KevinBauer, Janne Lindqvist,DamonMcCoy, Douglas Sicker University of Colorado Carnegie Mellon University University of California San Diego
More informationUniversity of Tartu. Research Seminar in Cryptography. Car Security. Supervisor: Dominique Unruh. Author: Tiina Turban
University of Tartu Research Seminar in Cryptography Car Security Author: Tiina Turban Supervisor: Dominique Unruh December 16, 2013 1 Introduction Cars these days are becoming more and more computerized.
More informationNEC Labs America, Princeton, NJ
Jie XIONG School of Information Systems Singapore Management University Jie XIONG jxiong@smuedusg Office Phone: 6828 9094 Date of CV revision: Citizenship: Singaporean Education 2010-2015 PhD in Computer
More informationTRINABH GUPTA. Thesis advisor: Prof. Anirban Mahanti
TRINABH GUPTA g.trinabh@gmail.com http://cs.utexas.edu/users/trinabh 14820 NE 36th Street, Building 99, Redmond, WA 98052 RESEARCH INTERESTS Computer systems, security, and privacy EDUCATION 8/2011 8/2017
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationCollaboration on Cybersecurity program between California University and Shippensburg University
Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,
More informationJ I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213
J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412
More informationExtension theorems in vector spaces over finite fields Dr. Alex Iosevich. Journal reviewer for International Mathematics Research Notices.
Doowon Koh T (517) 353-6882 B koh@math.msu.edu Education Aug.2003 Dec.2008 Dissertation Dissertation Supervisor Mar.1998 Feb.2000 Thesis Advisor Mar.1991 Feb.1998 Feb.1993 Apr.1995 Ph.D in Mathematics,
More informationMonthly Meeting September 28, 2016
Monthly Meeting September 28, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationUniversity of Texas Administration Building Room Guadalupe Street Austin, TX Phone: (479)
Islam Akef Ebeid University of Texas Administration Building Room 5.556 http://www.i3akef.com School of Information https://www.linkedin.com/in/i3akef University of Texas at Austin islam.akef@gmail.com
More informationSANS Vendor Offerings Detail
SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking
More informationEmbedded Automotive Systems Security:
The 3 rd International Workshop on Safety and Security of Intelligent Vehicles (SSIV) June 26, 2017 Embedded Automotive Systems Security: A language-based Intrusion Detection Approach Mohamed Kaâniche
More informationIEEE Communications Society TECHNICAL COMMITTEE ON Communications Quality & Reliability
IEEE Communications Society TECHNICAL COMMITTEE ON Communications Quality & Reliability http://committees.comsoc.org/cqr/ Committee Meeting Hiromi Ueda, CQR Chair Tuesday, May 10, 2011 CQR 2011, Naples,
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationIEEE Data Storage Technical Committee Update. Bane Vasić Chair, IEEE Data Storage Technical Committee
1 IEEE Data Storage Technical Committee Update Bane Vasić Chair, IEEE Data Storage Technical Committee Agenda! Committee Mission! Updates on conference support from DSTC: Globecom 2014, Austin, Texas -
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationCALIFORNIA CYBERSECURITY TASK FORCE
CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationShining Light in Dark Places: Understanding the Tor Network
Shining Light in Dark Places: Understanding the Tor Network Damon McCoy 1,KevinBauer 1,DirkGrunwald 1, Tadayoshi Kohno 2, and Douglas Sicker 1 1 Department of Computer Science, University of Colorado,
More informationBITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC
BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker University of Colorado, Boulder, CO, USA {bauerk, mccoyd, grunwald, sicker}@colorado.edu
More information2016 CMU First Destination Outcomes
06 CMU First Destination Outcomes College of Engineering: Information Networking Master of Science Information Security Employed 3 5 Total Graduates Salaries* Average = $ 07,570 Median = $,500 Range =
More informationComputer Science and Engineering Ira A. Fulton Schools of Engineering
DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION
More informationAdversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov
Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives
More informationIEEE Data Storage Technical Committee Update. Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee
1 IEEE Data Storage Technical Committee Update Haitao (Tony) Xia Chair, IEEE Data Storage Technical Committee Agenda! Introduction / Tony Xia! Mailing List Migration / Brian Kurkoski! Conference Reports
More informationIndustrial Control Systems November 18, 2015
Industrial Control Systems November 18, 2015 ABOUT SANS - TRAINING SANS provides intensive, hands-on, immersion training Highest quality 70+ courses covering basic security skills to cutting edge topics
More informationThe NIH Big Data to Knowledge Initiative: Raising the Prominence of Data
The NIH Big Data to Knowledge Initiative: Raising the Prominence of Data Michael F. Huerta, Ph.D. Associate Director, National Library of Medicine Director, Office of Health Information Programs Development
More informationAnat Levin : Postdoctoral Associate, MIT CSAIL. Advisor: Prof William T. Freeman.
Anat Levin MIT CSAIL The Stata Center 32-D466 32 Vassar Street, Cambridge MA 02139 Email: alevin@csail.mit.edu URL: http://people.csail.mit.edu/alevin Phone: 617-253-7245 Education: 2007-2008: Postdoctoral
More informationCornell University, Ithaca, NY Master of Engineering in Electrical Engineering 1987
Charles Ivan Cook Contact information available upon request. OBJECTIVE Colorado University, Boulder, CO Adjunct Faculty Teaching Position Teach graduate level introductory class in telecom systems consisting
More informationCurriculum Vitae. April 5, 2018
Curriculum Vitae April 5, 2018 Michael A. Sevilla mikesevilla3@gmail.com website: users.soe.ucsc.edu/~msevilla 127 Storey St., Santa Cruz, CA 95060 code: github.com/michaelsevilla mobile: (858) 449-3086
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationEducation. Professional Experience. Awards and Honors
Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854
More informationChris Vegter University of Northern Colorado Monfort College of Business (970)
Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration
More informationDr. Zheng Chang. Personal. Education and Qualifications. Professional Experience
Dr. Zheng Chang Assistant Professor (Tutkijatohtori, Docent) Faculty of Information Technology University of Jyväkylä P.O.Box 35(Agora), 40014 Jyväkylä, Finland Phone: +358 408054143 Email: zheng.chang@jyu.fi
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationDOWNLOAD OR READ : US CELLULAR ANSWER WIRELESS PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : US CELLULAR ANSWER WIRELESS PDF EBOOK EPUB MOBI Page 1 Page 2 us cellular answer wireless us cellular answer wireless pdf us cellular answer wireless BIOS Security. In 2011 the National
More informationAnh Le. URL:
Anh Le Contact Information Interests Education Email: anh.le@uci.edu URL: http://odysseas.calit2.uci.edu/anh My interests are in the areas of networking and security. I am particularly interested in mobile
More informationTuncay Tekle Curriculum Vitæ
Tuncay Tekle Curriculum Vitæ tuncay@cs.stonybrook.edu http://www.cs.stonybrook.edu/~tuncay/ Interests High-level programming languages and efficient implementations. Algorithm design and generation of
More informationAbhishek Chakraborty
Abhishek Chakraborty Institute Post Doctoral Fellow Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036, India Phone: +91-859-286-2863/+91-943-498-6672 Email:
More informationHelping States Advance Energy Efficiency in Public Buildings: Lead-by-Example Workshop
Helping States Advance Energy Efficiency in Public Buildings: Lead-by-Example Workshop March 19-20, 2018 Sue Gander National Governors Association Center for Best Practices About the National Governors
More informationInternet Privacy. Markus Klein, Joshua Juen University of Illinois Fall 2011
Internet Privacy Markus Klein, Joshua Juen University of Illinois Fall 2011 I have nothing to hide!...they accept the premise that privacy is about hiding a wrong. It's not." Rather, privacy is most ohen
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationThesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel
Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/
More informationNew Project Proposal Status Report Final Report
Title: Models and Software Tools for Managing Network Complexity Date: May 16, 2018 Researcher Name(s): Xin Sun University: Ball State University Long Term Goal(s) New Project Proposal Status Report Final
More informationRF Cloak: Securing RFID Cards Without Modifying them
RF Cloak: Securing RFID Cards Without Modifying them Haitham Hassanieh Jue Wang, Dina Katabi, Tadayoshi Kohno RFIDs Are Used in Sensitive Applications Access Control Credit Cards Passports Pharmaceutical
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationMohamed Ibrahim Ahmed
Mohamed Ibrahim Ahmed Contact Information Education 194 Davidson Road, Nichols Apartments 52 Nationality: Egyptian Piscataway, NJ, USA Mobile: +18486663004 E-mail: mibrahim@winlab.rutgers.edu Webpage:
More informationGreg T. Harber Faculty Vita (September 1, August 31, 2013)
Greg T. Harber Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Instructor Qualification Status: Other Tenure Status: Non-Tenure Track EDUCATION MS, 1994. Institution:
More informationIU Alumni Association Membership Statistics
IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Jun-2018 Annual 11,213 8,754 Auto-Renewal 733 1,614 Life 44,597 45,355 June 30 - Fiscal Year 2018 Year To Date vs. Fiscal
More information