PhD Alumni: 53
Graduation Year 2024: 2
-
-
Raveen Wijewickrama
Computer Science, July 2024
Advisor: Murtuza Jadliwala
Friend or Foe? Evaluating Motion Sensor-based Information Side-Channels and Covert Communication Channels on Modern Wearable Devices -
Richard Alvarez
Info Systems and Cyber Security, July 2024
Advisor: Raymond Choo, Nicole Beebe
Cheating behavior online and blockchain accountability
-
Graduation Year 2023: 3
-
-
Beatriz A. Galarza
Interdisciplinary Learning and Teaching, Aug 2023
Advisor: Guadalupe Carmona
Epistemic Network Analysis to Study Gender Equity in Cyber Security: Women’s Contributions to Computational Thinking in Model-Eliciting -
David Rodriguez
Electrical Engineering, Aug 2023
Advisor: Ram Krishnan
Toward Security and Privacy Enhanced Deep Neural Networks -
Mohd Amjad Sabra
Computer Science, May 2023
Advisor: Murtuza Jadliwala
Addressing Privacy Challenges in Modern Audio-Video Communication Systems and Applications
-
Graduation Year 2022: 9
-
-
Randy Klepetko
Electrical and Computer Engineering, Dec 2022
Advisor: Ram Krishnan
CNN Analysis on Security Data: Deriving Natural Order in a Nonnatural World -
Patricia Akello
Info Systems and Cyber Security, Aug 2022
Advisor: Raymond Choo
Understanding Security Threats in Cloud-Based Shadow It Work-from-Home Applications Using the General Strain Theory Lens -
Kavita Kumari
Computer Science, Aug 2022
Advisor: Murtuza Jadliwala
When and How to Protect? Modeling Repeated Interactions with Computing Services Under Uncertainty -
Mohammad Nur Nobi
Computer Science, Aug 2022
Advisors: Ram Krishnan, Ravi Sandhu
Towards Machine Learning Based Access Control -
Mir M. A. Pritom
Computer Science, Aug 2022
Advisors: Ravi Sandhu, Shouhuai Xu
Defending against Malicious Websites: Themed Threats, Detection, and Law-Enforcement -
Eric Ficke
Computer Science, May 2022
Advisors: Ravi Sandhu, Shouhuai Xu
Reconstructing Alert Trees for Cyber Triage -
Rui Hu
Electrical and Computer Engineering, May 2022
Advisors: Yanmin Gong
Breaking the Privacy Paradox: Pushing AI to the Edge with Provable Guarantees -
Rodney Rodriguez
Computer Science, May 2022
Advisor: Xiaoyin Wang
Static File Path Analysis for Reliable Resource Locating -
Mehrnoosh Shakarami
Computer Science, May 2022
Advisor: Ravi Sandhu
Operation and Administration of Access Control in IoT Environments
-
Graduation Year 2021: 5
-
-
Safwa Ameer
Computer Science, August 2021
Advisor: Ravi Sandhu
User-to-Device Access Control Models for Cloud-Enabled IoT with Smart Home Case Study -
Shuvra Chakraborty
Computer Science, December 2021
Advisors: Ravi Sandhu, Ram Krishnan
Feasibility Analysis of Access Control Policy Mining -
Huashan Chen
Computer Science, December 2021
Advisors: Ravi Sandhu, Shouhuai Xu
A Framework for Quantifying Security Effectiveness of Cyber Defenses -
Sherifdeen Lawal
Electrical and Computer Engineering, December 2021
Advisor: Ram Krishnan
Policy Review in Attribute-Based Access Control -
Xueling Zhang
Computer Science, 2021
Advisors: Jianwei Niu, Xiaoyin Wang
Reducing False Negatives in Taint Analysis via Hybrid Source Inference
-
Graduation Year 2020: 6
-
-
Abdullah Al-Alaj
Computer Science, August 2020
Role Based Access Control for Software Defined Networking: Formal Models and Implementation
Advisors: Ravi Sandhu, Ram Krishnan -
Foyzul Hassan
Computer Science, May 2020
Tackling Build Failures in Continuous Integrations
Advisor: Xiaoyin Wang -
John Heaps
Computer Science, August 2020
Code Element Vector Representations Through the Application of Natural Language Processing Techniques for Automation of Software Privacy Analysis
Advisors: Jianwei Niu, Xiaoyin Wang -
Naiwei Liu
Computer Science, December 2020
Cache-Based Attack and Defense on ARM Platform
Advisors: Ravi Sandhu, Meng Yu -
Samir Talegaon
Electrical and Computer Engineering, December 2020
Advisor: Ram Krishnan
Role Based Access Control Models for Android -
Xue Qin
Computer Science, May 2020
Understanding User Interface for Intelligent Software Analysis and Exploration
Advisor: Xiaoyin Wang
-
Graduation Year 2019: 3
-
-
Richard Garcia-Lebron
Computer Science, August 2019
A Framework for Characterizing Cyber Attack Reconnaissance Behaviors
Advisors: Shouhuai Xu -
Jin Han
Computer Science, December 2019
Enhancing Security in Clouds through Virtual Machine Placement
Advisors: Ravi Sandhu, Meng Yu -
Mitra Bokaei Hosseini
Computer Science, May 2019
Information Retrieval and Semantic Inference from Natural Language Privacy Policies
Advisors: Jianwei Niu
-
Graduation Year 2018: 4
-
-
Mahmoud Abdelsalam
Computer Science, December 2018
Online Malware Detection in Cloud Auto-Scaling Systems using Performance Metrics
Advisor: Ravi Sandhu -
Asma Alshehri
Computer Science, March 2018
Access Control Models for Cloud-Enabled Internet of Things
Advisor: Ravi Sandhu -
Smriti Bhatt
Computer Science, August 2018
Attribute-based Access and Communication Control Models for Cloud and Cloud-enabled Internet of Things
Advisor: Ravi Sandhu -
Maanak Gupta
Computer Science, December 2018
Secure Cloud Assisted Smart Cars and Big Data: Access Control Models and Implementation
Advisor: Ravi Sandhu
-
Graduation Year 2017: 5
-
-
Tahmina Ahmed
Computer Science, December 2017
Expressive power, safety and cloud implementation of attribute and relationship based access control models ...
Advisor: Ravi Sandhu -
Prosunjit Biswas
Computer Science, May 2017
Enumerated authorization policy ABAC models: expressive power and enforcement
Advisors: Ravi Sandhu, Ram Krishnan -
Jiwan Ninglekhu
Electrical and Computer Engineering, December 2017
Attribute-based administration of role-based access control ...
Advisor: Ram Krishnan -
Marcus Pendleton
Computer Science, December 2017
System call anomaly detection in multi-threaded programs ...
Advisors: Shouhuai Xu -
Rocky Slavin
Computer Science, August 2017
Applying semantic analysis for the alignment of natural language privacy policies with application code
Advisor: Jianwei Niu
-
Graduation Year 2016: 3
-
-
Navid Pustchi
Computer Science, May 2016
Authorization federation in multi-tenant multi-cloud IaaS
Advisors: Ravi Sandhu, Ram Krishnan -
Moustafa Saleh
Computer Science, May 2016
Detection and classification of obfuscated malware
Advisor: Shouhuai Xu -
Yun Zhang
Computer Science, December 2016
Secure information and resource sharing in cloud IaaS
Advisor: Ravi Sandhu
-
Graduation Year 2015: 1
-
-
Khalid Zaman Bijon
Computer Science, May 2015
Constraints for attribute based access control with application in cloud IaaS
Advisors: Ravi Sandhu, Ram Krishnan
-
Graduation Year 2014: 7
-
-
Yuan Cheng
Computer Science, May 2014
Access control for online social networks using relationship type patterns
Advisors: Ravi Sandhu, Jae Park -
Xin Jin
Computer Science, May 2014
Attribute-based access control models and implementation in cloud infrastructure as a service
Advisors: Ravi Sandhu, Ram Krishnan -
Dang Nguyen
Computer Science, August 2014
Provenance-based access control models
Advisors: Ravi Sandhu, Jae Park -
Bo Tang
Computer Science, August 2014
Multi-tenant access control for cloud services
Advisor: Ravi Sandhu -
Li Xu
Computer Science, August 2014
Detecting and characterizing malicious websites
Advisor: Shouhuai Xu -
Zhenxin Zhan
Computer Science, May 2014
A statistical framework for analyzing cyber attacks
Advisor: Shouhuai Xu -
Qingji Zheng
Computer Science, May 2014
Verifiable delegated computation on outsourced data
Advisor: Shouhuai Xu
-
Graduation Year 2013: 3
-
-
Omar Haider Chowdhury
Computer Science, August 2013
Formally ensuring the permissibility of obligations in security and privacy policies
Advisor: Jianwei Niu -
Andreas Robert Gampe
Computer Science, December 2013
A framework for composing security-typed languages
Advisor: Jeffery von Ronne -
Hui "Catherine" Shen
Computer Science, May 2013
A formal framework for analyzing sequence diagram
Advisor: Jianwei Niu
-
Graduation Year 2012: 0
Graduation Year 2011: 1
-
-
Murillo Pontual
Computer Science, December 2011
Practical user obligation systems that affect and depend on authorizations
Advisor: Jianwei Niu
-
Graduation Year 2010: 1
-
-
Timothy Paul Parker
Computer Science, December 2010
Protecting cryptographic keys and functions from malware attacks
Advisor: Shouhuai Xu
-