Students
Current Doctoral Students
Farnaz Asrari has joined us to address security and environmental impacts.
Anesu Chaora brings a mastery of organizational, compliance, and technical perspectives of security.
Ambarish Gurjar leverages temporal graphs to generate risk profiles.
Xinyao Ma is focusing on combining sensing and AI for detecting and defeating fraud.
Dalya Manatova is using data science to quantify the dynamics of online trust with a particular focus on ecrime.
Working with Viktor Zhang on design of authentication. He is primarily in HCI/d.
Working with William Smeal, a Fulbright Scholar in Bulgaria and expert in Cyrillic languages and culture, on phishing resilience.
Alumni
Laura Calloway
is examining information exfiltration on personal health devices using mixed methods to identify human factors which lead to data exfiltration and the design interventions to address these factors.
Alumni Jacob Abbott brings his experience in start-ups and compliance to data analytics on the oft-ignored issues of environmental impact, accessibility, and security.
Peter Caven uses behavioral economics and HCI to evaluate organizational and individual security behaviors with a focus on securing the software and CPS supply chains.
Shakthidhar
Gopavaram evaluated human risk taking combining behavorial economics and full stack development to examine expressed and revealed preferences.
Ko Dokmai is building privacy into the infrastructure.
DongInn Kim built proof that trustworthy AI does not require massive data exfiltration for secruity modeling purposes.
Jayati Dev full stack privacy engineer and human factors expert.
Vafa Andalibi has made pioneering contributions to the
emerging standards for securing the IoT, particularly MUD and SBoM.
Tim Kelley combined
human experimentation with large scale modeling. His implemented
complex systems models that integrate human behaviors as critical
variables. His research
combined brain science with network science, and included designing innovative tools for mouse-tracking and eye tracking.
Behnood
Momenzadeh focused on evaluating cryptocurrency as a human, macroeconomic, and financial instrument.
Sanchari
Das completed her dissertation on usable privacy and security with a particular focus on MFA. Her background is in computer science, particularly
networks.
Gary Deckard has bridged two divides: military and academic, computer
science and education. His dissertation examined the factors that lead to individual and collective success in a series of exercises and in classroom
practice.
Pablo Moriano develops innovative models and methods for large-scale networks that can help in the understanding of the dynamical evolution of empirical network data. A direct application of this approach is in the field of anomaly detection in routing data. These research efforts are multi-disciplinary and encompass contributions from computer science, statistics, and physics.
Kevin Benton is
focused on the dynamics of network security in both SDN and BGP. In the past, in his
internships at the Cambrigde University Computer Security
Laboratory and now at SpaceX, his focus was on SDN. His work
reminds us that engineers are humans too.
Zheng Dong was a pioneer in using machine learning in the service of computer security.
His dissertation applied machine learning to the detection of phishing sites (using certificate analysis), rogues certificates, and banking certificates.
He finished his masters thesis in spring 2010 on the topic of the marginal return for adding an individual into a social network for the purposes of recommendations or discovery, which was prescient in its design focus of minimizing risk of data compilations.
He works at Microsoft Redmond.
Vaibhav Garg on ecrime, risk communication, and usable security. His work brought perceived risk methods to the study of on-line risk,
as well as pioneering applications of crime science to online crime.
Debin Liu on risk-based access control and usable security. His work included a mastery of quantitative tools combined with economic theories of security; such as applying contract theory to access control.
Camilo Veicco on Tor. His redesign of TCP in Tor reduced delay, jitter, and prevented timing attacks.
J Duncan on user-centered design, with a focus on ethical design of security experiments. He is a lecturer at IU.
Warigia Bowman on ICT for development with an interdisciplinary dissertation
on Internet diffusion in East Africa. She is a professor of law.
Allan Friedman on security and privacy. By combining game theory and social network modeling he was able to examine how information flowed across the combination of social and computing networks.
His work pioneered the use of crowd-sourcing and peer production for diffusion of information sharing for community security and privacy (beyond open source communities).
As the Director of Cybersecurity Initiatives at National Telecommunications and Information Administration and now in CISA at DHS, ask him about SBOM.