Faculty
-
Alge, Bradley
-
Aliaga, Daniel
-
Anderson, James
F
-
Aref, Walid
-
Atallah, Mike
F
-
Bagchi, Saurabh
F
-
Bertino, Elisa
F
-
Bhargava, Bharat
F
-
Bond, Randy
-
Boyd, Josh
-
Caldwell, Barrett
-
Chaturvedi, Alok
-
Cho, Hyunyi
-
Cleveland, William
-
Clifton, Chris
F
-
Dark, Melissa
F
-
Dejoie, Roy
-
DeLaurentis, Dan
F
-
Delp, Edward
F
-
Dietz, Eric
-
Ebert, David
-
Elliott, Stephen
F
-
Elmagarmid, Ahmed
-
Eugster, Patrick
-
Evans, Jeffrey
-
Fahmy, Sonia
-
Farahmand, Fariborz
F
-
Ghafoor, Arif
F
-
Givan, Robert
-
Grama, Ananth
-
Hacker, Tom
-
Hosking, Antony
-
Hwang, Inseok
-
Justice, Connie
-
Kannan, Karthik
F
-
Killian, Charles
-
Kisselburgh, Lorraine
F
-
Kompella , Ramana Rao
-
Korb, J. Tim
-
Li, Feng
-
Li, Ninghui
F
-
Liles, Samuel
-
Love, David
-
Martino, Lorenzo
-
Matei, Sorin
-
Meunier, Pascal
-
Moh, Tzuong-Tsieng
-
Naimi, Linda
-
Neville, Jennifer
-
Nita-Rotaru, Cristina
F
-
Nof, Shimon
-
Pai, Vijay
-
Park, Kihong
-
Prabhakar, Sunil
-
Proctor, Robert
F
-
Raghunathan, Vijay
-
Rao, Sanjay
-
Raskin, Victor
F
-
Rawles, Phillip
-
(Rees) Ulmer, Jackie
F
-
Rogers, Marc
F
-
Salvo, Michael
-
Si, Luo
-
Siskind, Jeffrey
-
Spafford, Gene
F
-
Springer, John
-
Sypher, Howard
-
Szpankowski, Wojciech
-
Taylor, Julia
F
-
Tsoukalas, Lefteri
-
Vijaykumar, T.N.
-
Vitek, Jan
-
Vorvoreanu, Mihaela
-
Wagstaff, Samuel
F
-
Watson, Keith
-
Weldon, Laurel
-
Xi, Bowei
-
Xu, Dongyan
F
-
Yang, Baijian "Justin"
-
Yau, David
-
Zhang, Xiangyu
-
Zou, Xukai
-
Randy Bond
-
Fariborz Farahmand
F
Information security and privacy risks, risk perception, risk management
-
Gene Spafford
F
security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
-
Keith Watson
Network design, security architecture, secure programming techniques, security auditing
-
Josh Boyd
teaches classes in and chairs the area of Public Affairs and Issue Management, and he studies corporate rhetoric
-
Hyunyi Cho
-
Lorraine Kisselburgh
F
communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in STEM careers; digital identities
-
Sorin Matei
Collaborative implications of location aware technologies, On-line social interaction and communities.
-
Howard Sypher
-
Xukai Zou
Communication networks and security, Applied cryptography, Security and reliability for Grid Computing, Wireless network security
-
Melissa Dark
F
post-secondary education, curriculum development, faculty development, training, information security
-
Eric Dietz
Homeland Security, Intelligence and Decision Making IT, Risk Management with Critical Infrastructure
-
Tom Hacker
High Performance Computer, Grid Computing, Operating Systems, and Distributed Systems
-
Samuel Liles
-
Phillip Rawles
network systems administration, enterprise network management, and network application architectures
-
Marc Rogers
F
Psychological Profiling, Applied Cyber-forensics,
Cyber-terrorism
-
John Springer
-
Julia Taylor
F
Natural Language Understanding, Knowledge Discovery and Representation, Computational Recognition of Salient Information in Texts, Uncertainty Management
-
Baijian "Justin" Yang
Information Security, End system security, network security, security policies; mobile computing, distributed computing.
-
Connie Justice
Network security, Security design, Risk Assessment
-
Feng Li
Network Security, Trust issues in networks, Fault-tolerance
-
Mihaela Vorvoreanu
Socio-cultural impacts of new and emerging communication technologies; Social media; Web 2.0
-
Daniel Aliaga
-
Walid Aref
developing database technologies for emerging applications, e.g., privacy preservation, spatial, multimedia, genomics, and sensor-based databases.
-
Mike Atallah
F
information security (in particular, software security, secure protocols, and watermarking).
-
Elisa Bertino
F
information security, privacy, trust negotiation
-
Bharat Bhargava
F
theoretical and experimental studies in distributed systems
-
William Cleveland
Statistics, Data Visualization, Machine Learning,
Massive Datasets, Computer Networking, Cybersecurity
-
Chris Clifton
F
data mining, data security, database support for text, and heterogeneous databases
-
Ahmed Elmagarmid
applications of database technology to telemedicine, digital government, and electric power management
-
Patrick Eugster
languages, system support, and algorithms for secure and reliable programming in distributed setttings
-
Sonia Fahmy
network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
-
Ananth Grama
parallel and distributed computing architectures, algorithms, and applications
-
Antony Hosking
programming languages and database systems, focusing on the integration of language and database functionality for efficient data management.
-
Charles Killian
distributed systems, network security
-
Ramana Rao Kompella
-
J. Tim Korb
-
Ninghui Li
F
computer security and applied cryptography
-
Lorenzo Martino
Service-oriented architectures, software as a service
-
Jennifer Neville
Data mining and machine learning for relational data, fraud detection, social networks
-
Cristina Nita-Rotaru
F
Secure Group Communication, Security in Ad Hoc Wireless Networks, Secure Overlay Networks, Access Control and Authentication for Groups, Secure and Scalable Distributed Systems.
-
Kihong Park
scalable QoS provisioning in IP internets, self-similar and multimedia traffic control, and network security and fault-tolerance. His research is supported by grants from both government and industry, including NSF, DARPA, and CERIAS
-
Sunil Prabhakar
issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
-
Luo Si
information retrieval, machine learning, text mining, speech and multimedia processing, data mining and privacy preservation, federated
search (distributed information retrieval), probabilistic models for information filtering, and text/data mining for life science
-
Gene Spafford
F
security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
-
Wojciech Szpankowski
analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
-
Jan Vitek
Programming Languages, Runtime Systems, Real time programming, Java
-
Samuel Wagstaff
F
cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
-
Dongyan Xu
F
Virtualization and security, Cloud computing, Malware defense, Cyberinfrastructure, Distributed Systems
-
David Yau
network and operating system architectures and algorithms for quality of service (QoS) provisioning
-
Xiangyu Zhang
software provenance, malware defense
-
Saurabh Bagchi
F
network security, intrusion tolerance, covert channels
-
Edward Delp
F
Digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
-
David Ebert
Visual analytics, Visualization, Homeland Security
-
Arif Ghafoor
F
parallel and distributed computing, and multimedia information systems
-
Robert Givan
machine planning, machine learning, knowledge representation, stochastic modeling, and automated reasoning
-
David Love
-
Vijay Pai
Computer architecture, network software, intrusion detection, access control, assurance
-
Vijay Raghunathan
wireless and ad hoc networks, sensor networks, intrusion detection, reliability
-
Sanjay Rao
Peer-to-peer System Design, Cloud systems, Security issues in system migration
-
Jeffrey Siskind
-
T.N. Vijaykumar
computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.
-
Barrett Caldwell
Situational awareness, privacy, critical infrastructure protection, human factors
-
Shimon Nof
computer-supported integration and collaboration of distributed work
-
Pascal Meunier
Vulnerability analysis, virtualization, automated computer security management, intrusion detection, secure testbeds, formal methods
-
Victor Raskin
F
Computational linguistics, Ontological Semantics, Meaning-based search, Steganography
-
Bradley Alge
Human/Technology Interaction, Employer/Employee Rights, Strategic human resources, Individuals as Self-Regulators
-
Alok Chaturvedi
artificial intelligence applications in manufacturing, machine learning, and stereoscopic and immersive visualization of business data
-
Roy Dejoie
-
Karthik Kannan
F
Economics of Information Security, Vulnerability and Breach Disclosure, Policy Development
-
Jackie (Rees) Ulmer
F
Information Security Policy, Risk Assessment, Artificial Intelligence, Genetic Algorithms, Data Mining, Machine Learning.
-
James Anderson
F
Use of Information technology in health care, E-Healthcare, AIDS/STD Prevention
-
William Cleveland
Statistics, Data Visualization, Machine Learning,
Massive Datasets, Computer Networking, Cybersecurity
-
Jennifer Neville
Data mining and machine learning for relational data, fraud detection, social networks
-
Bowei Xi
-
Stephen Elliott
F
Biometrics, Signature Verification, Mobile Computing, Electronic and Mobile Commerce Logistics and Supply Chain Management
-
Linda Naimi
Ethics, Law
-
Mihaela Vorvoreanu
Socio-cultural impacts of new and emerging communication technologies; Social media; Web 2.0