CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
Purdue University
Center for Education and Research in Information Assurance and Security

Faculty & Research Staff

Aeronautical Engineering


  • Lorraine Kisselburgh F
    communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in STEM careers; digital identities


  • Josh Boyd
    teaches classes in and chairs the area of Public Affairs and Issue Management, and he studies corporate rhetoric
  • Hyunyi Cho
  • Sorin Matei
    Collaborative implications of location aware technologies, On-line social interaction and communities.
  • Howard Sypher

Computer and Information Science (IUPUI)

  • Xukai Zou
    Communication networks and security, Applied cryptography, Security and reliability for Grid Computing, Wireless network security

Computer and Information Technology

  • Melissa Dark F
    post-secondary education, curriculum development, faculty development, training, information security
  • Eric Dietz
    Homeland Security, Intelligence and Decision Making IT, Risk Management with Critical Infrastructure
  • Tom Hacker
    High Performance Computer, Grid Computing, Operating Systems, and Distributed Systems
  • Raymond Hansen
    Network Engineering, Network Security, Network Forensics
  • Ioannis Papapanagiotou
    Cloud Computing, Software Defined Networks, Data Redundancy Elimination, Network Data Analytics, Internet of Things, Performance Analysis & Simulations, Intellectual Property Law
  • Phillip Rawles
    network systems administration, enterprise network management, and network application architectures
  • Marc Rogers F
    Psychological Profiling, Applied Cyber-forensics, Cyber-terrorism
  • Kathryn Seigfried-Spellar
  • John Springer
  • Julia Taylor F
    Natural Language Understanding, Knowledge Discovery and Representation, Computational Recognition of Salient Information in Texts, Uncertainty Management
  • Baijian "Justin" Yang
    Information Security, End system security, network security, security policies; mobile computing, distributed computing.

Computer and Information Technology (IUPUI)

  • Connie Justice
    Network security, Security design, Risk Assessment
  • Feng Li
    Network Security, Trust issues in networks, Fault-tolerance

Computer Graphics Technology

Computer Information Technology and Graphics (Calumet)

  • Ricardo Calix
    machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
  • Manghui "Michael" Tu
    Information Assurance, Digital Forensics, Distributed Computing, Sustainable Computing

Computer Sciences

  • Daniel Aliaga
  • Walid Aref
    developing database technologies for emerging applications, e.g., privacy preservation, spatial, multimedia, genomics, and sensor-based databases.
  • Mike Atallah F
    information security (in particular, software security, secure protocols, and watermarking).
  • Elisa Bertino F
    information security, privacy, trust negotiation
  • Bharat Bhargava F
    theoretical and experimental studies in distributed systems
  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Chris Clifton F
    data mining, data security, database support for text, and heterogeneous databases
  • Ahmed Elmagarmid
    applications of database technology to telemedicine, digital government, and electric power management
  • Patrick Eugster
    languages, system support, and algorithms for secure and reliable programming in distributed setttings
  • Sonia Fahmy
    network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
  • Dan Goldwasser
  • Ananth Grama
    parallel and distributed computing architectures, algorithms, and applications
  • Antony Hosking
    programming languages and database systems, focusing on the integration of language and database functionality for efficient data management.
  • Aniket Kate
  • Ninghui Li F
    computer security and applied cryptography
  • Lorenzo Martino
    Service-oriented architectures, software as a service
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Cristina Nita-Rotaru F
    Secure Group Communication, Security in Ad Hoc Wireless Networks, Secure Overlay Networks, Access Control and Authentication for Groups, Secure and Scalable Distributed Systems.
  • Kihong Park
    scalable QoS provisioning in IP internets, self-similar and multimedia traffic control, and network security and fault-tolerance. His research is supported by grants from both government and industry, including NSF, DARPA, and CERIAS
  • Mathias Payer
    Research interests: system security, exploitation, SFI, and virtualization.
  • Sunil Prabhakar
    issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
  • Srivatsan Ravi
  • Luo Si
    information retrieval, machine learning, text mining, speech and multimedia processing, data mining and privacy preservation, federated search (distributed information retrieval), probabilistic models for information filtering, and text/data mining for life science
  • Gene Spafford F
    Executive Director, CERIAS. Security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
  • Wojciech Szpankowski
    analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
  • Samuel Wagstaff F
    cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
  • Dongyan Xu F
    Virtualization and security, Cloud computing, Malware defense, Cyberinfrastructure, Distributed Systems
  • Xiangyu Zhang
    software provenance, malware defense

Electrical and Computer Engineering

  • Saurabh Bagchi F
    network security, intrusion tolerance, covert channels
  • Edward Delp F
    Digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
  • David Ebert
    Visual analytics, Visualization, Homeland Security
  • Arif Ghafoor F
    parallel and distributed computing, and multimedia information systems
  • Robert Givan
    machine planning, machine learning, knowledge representation, stochastic modeling, and automated reasoning
  • David Love
  • Vijay Raghunathan
    wireless and ad hoc networks, sensor networks, intrusion detection, reliability
  • Sanjay Rao
    Peer-to-peer System Design, Cloud systems, Security issues in system migration
  • Jeffrey Siskind
  • T.N. Vijaykumar
    computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.

Engineering Technology


Industrial Engineering

  • Barrett Caldwell
    Situational awareness, privacy, critical infrastructure protection, human factors
  • Shimon Nof
    computer-supported integration and collaboration of distributed work


  • Pascal Meunier
    Vulnerability analysis, virtualization, automated computer security management, intrusion detection, secure testbeds, formal methods


  • Victor Raskin F
    Computational linguistics, Ontological Semantics, Meaning-based search, Steganography


  • Bradley Alge
    Human/Technology Interaction, Employer/Employee Rights, Strategic human resources, Individuals as Self-Regulators
  • Alok Chaturvedi
    artificial intelligence applications in manufacturing, machine learning, and stereoscopic and immersive visualization of business data
  • Roy Dejoie
  • Karthik Kannan F
    Economics of Information Security, Vulnerability and Breach Disclosure, Policy Development


Nuclear Engineering


Political Science

Psychological Sciences


  • James Anderson F
    Use of Information technology in health care, E-Healthcare, AIDS/STD Prevention


  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Bowei Xi

Technology Leadership & Innovation

  • Stephen Elliott F
    Biometrics, Signature Verification, Mobile Computing, Electronic and Mobile Commerce Logistics and Supply Chain Management
  • Mihaela Vorvoreanu
    Socio-cultural impacts of new and emerging communication technologies; Social media; Web 2.0