PhD Graduates

160 PhD Graduates since 1994


1994 (1)  | 1995 (1)  | 1997 (1)  | 1998 (1)  | 2000 (2)  | 2001 (3)  |
2002 (4)  | 2003 (12)  | 2004 (13)  | 2005 (18)  | 2006 (14)  | 2007 (11)  |
2008 (9)  | 2009 (15)  | 2010 (15)  | 2011 (12)  | 2012 (10)  | 2013 (8)  |
2014 (10)  |

1994

Shen, HongHai (COAST)

Advisor: Dewan
PhD Thesis:
Link to Paper Access Control for Collaborative Environments

1995

Kumar, Sandeep (COAST)

Advisor: Spafford
PhD Thesis:
Link to Paper Classification and Detection of Computer Intrusions

1997

Schuba, Christoph (COAST)

Advisor: Spafford
PhD Thesis:
Link to Paper On the Modeling, Design, and Implementation of Firewall Technology

1998

Krsul, Ivan (COAST)

Advisor: Spafford
PhD Thesis:
Link to Paper PhD Thesis: Computer Vulnerability Analysis

2000

2001

Du, Kevin (Wenliang)

Advisor: Atallah
PhD Thesis:
Link to Paper A study of several specific secure two-party computation problems

Zamboni, Diego

Advisor: Spafford
PhD Thesis:
Link to Paper Using internal sensors for computer intrusion detection

2002

Koyuturk, Mehmet

Advisor: Grama
PhD Thesis:
Link to Paper Comparative analysis of biological networks

Zhang, Chaogui

Advisor: Wagstaff
PhD Thesis:
Link to Paper An Extension of the Dickman Function and its Application

2003

Chang, Hoi

Advisor: Atallah
PhD Thesis:
Confidential

Gupta, Mukul

Advisor: Chaturvedi/Mehta
PhD Thesis:
Link to Paper Essays in information security

Hempelmann, Christian

Advisor: Raskin
PhD Thesis:
Link to Paper Paronomasic puns: Target recoverability towards automatic generation

Ma, Lingfeng

Advisor: Meunier
PhD Thesis:
Search tools for Internet2

Park, Jung-Min (Jerry)

Advisor: Chong Siegel
PhD Thesis:
Link to Paper Efficient primitives for ensuring security in e-commerce transactions

Shin, Dong

Advisor: Chong Siegel
PhD Thesis:
Link to Paper Multicriteria routing for guaranteed performance communications

2004

Dove Smoak, Natalie

Advisor: Rogers
PhD Thesis:
Link to Paper Emotion reassociation as a prejudice reduction mechanism

Gower, Jason

Advisor: Wagstaff
PhD Thesis:
Link to Paper Square form factorization

Hammad, Moustafa

Advisor: Elmagarmid
PhD Thesis:
Link to Paper Query processing in stream database systems

Hefeeda, Mohamed

Advisor: Bhargava
PhD Thesis:
Link to Paper A framework for cost-effective peer-to-peer content distribution

Lu, Yi

Advisor: Bhargava
PhD Thesis:
Link to Paper Adaptive and heterogeneous mobile wireless networks

Ma, Di

Advisor: Palsberg
PhD Thesis:
Link to Paper Bounding the Stack Size of Interrupt-driven Programs

Palacz, Krzysztof

Advisor: Hosking/Vitek
PhD Thesis:
Link to Paper Crusoe: Towards a multicomputer execution environment for Java

Sion, Radu

Advisor: Atallah
PhD Thesis:
Link to Paper Rights assessment for discrete digital data

Vaidya, Jaideep

Advisor: Atallah/Clifton
PhD Thesis:
Link to Paper Privacy preserving data mining over vertically partitioned data

2005

Buchholz, Florian

Advisor: Spaf
PhD Thesis:
Link to Paper Pervasive binding of labels to system processes

Carbunar, Bogdan

Advisor: Nita Rotaru
PhD Thesis:
Link to Paper Coverage problems in wireless sensor and RFID systems

Early, Jim

Advisor: Brodley/Spafford
PhD Thesis:
Link to Paper Behavioral feature extraction for network anomaly detection

Elfeky, Mohamed

Advisor: Elmagarid/Houstis/Verikos
PhD Thesis:
Link to Paper Online periodicity mining

Fern, Alan

Advisor: Givan
PhD Thesis:
Link to Paper Learning models and formulas of a temporal event logic

Frikken, Keith

Advisor: Atallah
PhD Thesis:
Link to Paper Secure and private online collaboration

Gwadera, Robert

Advisor: Szpankowski/Atallah
PhD Thesis:
Link to Paper Reliable identification of significant sets of episodes in event sequences

Ioannidis, Ioannis

Advisor: Grama
PhD Thesis:
Link to Paper Algorithms and data structures for IP lookups

Kulkarni, Sunil

Advisor: Mazumdar Coyle Rosenberg
PhD Thesis:
Link to Paper Scheduling and MAC protocols for wireless networks

Lin, Eugene

Advisor: Delp
PhD Thesis:
Link to Paper Video and image watermark synchronization

Wang, Weichao

Advisor: Bhargava
PhD Thesis:
Link to Paper Securing wireless network topology and routing

2006

Bhatti, Rafae

Advisor: Ghafoor/Bertino/Li
PhD Thesis:
Link to Paper A policy engineering framework for federated access management

Cabuk, Serdar

Advisor: Spafford/Brodley
PhD Thesis:
Link to Paper Network covert channels: Design, analysis, detection, and elimination

Carrier, Brian

Advisor: Spafford
PhD Thesis:
Link to Paper A hypothesis-based approach to digital forensic investigations

Fei, Long

Advisor: Brodley/Shields
PhD Thesis:
Link to Paper Practical runtime identification of program errors

Gopalakrishna, Rajeev

Advisor: Spafford
PhD Thesis:
Link to Paper Improving software assurance using lightweight static analysis

Grothoff, Christian

Advisor: Vitek/Atallah
PhD Thesis:
Link to Paper Expressive type systems for object-oriented languages

Koglin, Yunhua

Advisor: Bertino
PhD Thesis:
Link to Paper Security mechanisms for content distribution networks

Li, Jiangtao

Advisor: Atallah/Li
PhD Thesis:
Link to Paper Privacy enhanced automated trust negotiation

Triezenberg, Katrina

Advisor: Raskin
PhD Thesis:
Link to Paper The ontology of emotion

Webster, Nate

Advisor: Weiner
PhD Thesis:
Link to Paper Reconfigurable direct space-to-time pulse shaping

2007

Blanton , Marina

Advisor: Atallah
PhD Thesis:
Link to Paper Key management in hierarchical access control systems

Jankovic (Pusara) , Maja

Advisor: Spafford/Brodley
PhD Thesis:
Link to Paper An examination of user behavior for user re-authentication

Shehab, Mohamed

Advisor: Ghafoor/Bertino
PhD Thesis:
Link to Paper Secure collaboration in mediator-free environments

Spantzel [Bhargav], Abhilasha

Advisor: Bertino/Spafford
PhD Thesis:
Link to Paper Protocols and systems for privacy preserving protection of digital identity

Speirs, William

Advisor: Wagstaff
PhD Thesis:
Link to Paper Dynamic cryptographic hash functions

Topkara [Karahan], Mercan

Advisor: Atallah/Nita-Rotaru
PhD Thesis:
Link to Paper New designs for improving the efficiency and resilience of natural language watermarking

2008

Nergiz, Mehmet Ercan

Advisor: Clifton/Bertino
PhD Thesis:
Link to Paper Anonymization-based privacy protection

Samuel, Arjmand Micheal

Advisor: Ghafoor
PhD Thesis:
Specification, Composition, and Applications of Spatio-Temporal Role Based Access Control Model

2009

Dong, Jing

Advisor: Nita-Rotaru
PhD Thesis:
Link to Paper Secure and robust communication in wireless mesh networks

Eyre, William

Advisor: Raskin/Boyd
PhD Thesis:
Link to Paper Privacy, surveillance and the Real ID Act

Khanna, Nitin

Advisor: Delp
PhD Thesis:
Link to Paper Forensic characterization of image capture devices

Shang, Ning

Advisor: Wagstaff
PhD Thesis:
Link to Paper Low genus algebraic curves in cryptography

Singh, Sarvjeet

Advisor: Prabhakar, Nita Rotaru
PhD Thesis:
Link to Paper Database support for uncertain data

Wang, Qihua

Advisor: Li
PhD Thesis:
Link to Paper Access control policy management

Zhang, Yu

Advisor: Bhargava
PhD Thesis:
Link to Paper Analysis of port scanning attacks

2010

Idika, Nwokedi

Advisor: Mathur, Aditya
PhD Thesis:
Link to Paper Characterizing and aggregating attack graph-based security metric

Kamra, Ashish

Advisor: Bertino
PhD Thesis:
Link to Paper Mechanisms for database intrusion detection and response

Khreishah, Abdallah Ali

Advisor: Ness Shroff
PhD Thesis:
Link to Paper Analysis and design of intersession network coding in communication networks

Kundu, Ashish

Advisor: Bertino
PhD Thesis:
Link to Paper Data in the cloud: Authentication without leaking

Li, Tiancheng

Advisor: Li
PhD Thesis:
Link to Paper Privacy preservation in data publishing and sharing

Molloy, Ian

Advisor: Li, N.
PhD Thesis:
Link to Paper Automatic migration to role based access control

Murugesan, Mummorthy

Advisor: Clifton
PhD Thesis:
Link to Paper Privacy through deniable search

Ni, Qun

Advisor: Bertino
PhD Thesis:
Link to Paper Privacy-aware role based access control

Panta, Rajesh

Advisor: Bagchi
PhD Thesis:
Link to Paper Remote reprogramming of wireless sensor networks

Rao, Prathima

Advisor: Bertino
PhD Thesis:
Link to Paper Exam: An environment for XACML policy analysis and management

Sellke, Sarah

Advisor: Bagchi
PhD Thesis:
Link to Paper Analytical characterization of internet security attacks

2011

Kirkpatrick, Michael

Advisor: Bertino
PhD Thesis:
Link to Paper Trusted enforcement of contextual access control

Lee, Wonjun

Advisor: Bertino
PhD Thesis:
Link to Paper Accountability for grid computing systems

Lin, Zhiqiang

Advisor: Xu
PhD Thesis:
Link to Paper Reverse engineering of data structures from binary

Nahm, Sangil

Advisor: Wagstaff
PhD Thesis:
Link to Paper Several problems in number theory

Qi, Yinian

Advisor: Prabhakar
PhD Thesis:
Link to Paper Efficient query processing for uncertain data

Rhee, Junghwan

Advisor: Xu
PhD Thesis:
Link to Paper Data-centric approaches to kernel malware defense

Thomas, Jacques

Advisor: Vitek
PhD Thesis:
Link to Paper Accommodative mandatory access control

2012

Eldardiry, Hoda

Advisor: Bertino
PhD Thesis:
Link to Paper Ensemble Classification Techniques for Relational Domains

Kallapalayam Radha, Jayaram

Advisor: Mathur, Aditya
PhD Thesis:
Link to Paper Engineering Efficient Event-Based Distribution Systems

Nabeel Mohamed, Yoosuf

Advisor: Bertino, Eugster
PhD Thesis:
Link to Paper Privacy Preserving Access Control on Third-Party Data Management Systems

Sun, Xin

Advisor: Rao, Sanjay
PhD Thesis:
Link to Paper A systematic approach for migrating enterprise networks

2013

Angin, Pelin

Advisor: Bhargava

Sundaram, Vinaitheerthan

Advisor: Eugster
PhD Thesis:
Link to Paper Lightweight tracing for wireless sensor networks diagnostics

2014

Arshad, Fahad

Advisor: Bagchi

Fernando, Ruchith

Fry, Donald

Advisor: DeLaurentis

Gates, Chris

Advisor: Ninghui Li

Gupta, Aditi

Advisor: Bertino

Lee, Jaewoo

Advisor: Clifton

Lee, Hyojeong

Advisor: Killian

Moreno, Sebastian

Advisor: Jennifer Neville

Potharaju, Rahul

Advisor: Nita-Rotaru

Wang, Shumiao

Advisor: Atallah