- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Privacy, Security, and Data Protection
- IoT and Edge/Fog Computing
- Green IT and Sustainability
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Advanced Data Storage Technologies
- Distributed and Parallel Computing Systems
- Innovative Human-Technology Interaction
- Chaos control and synchronization
- Information and Cyber Security
- Scientific Computing and Data Management
- Smart Cities and Technologies
- Industrial Gas Emission Control
- Opportunistic and Delay-Tolerant Networks
- Cybercrime and Law Enforcement Studies
- Advanced Combustion Engine Technologies
- Spam and Phishing Detection
- Misinformation and Its Impacts
- Anomaly Detection Techniques and Applications
- Catalytic Processes in Materials Science
- Mobile Crowdsensing and Crowdsourcing
Indiana University Bloomington
2005-2023
Indiana University
2006-2022
Yonsei University
2002
Studies of privacy perception in the Internet Things (IoT) include in-laboratory evaluations as well investigations purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations eight households to evaluate installation concerns early adoption devices our participants' homes. The specific contributions work are insights into perceptions challenges networked smart home management devices. focus was on about deployed an ecosystem influencing...
In this paper, we leverage the limited functionality of IoT devices and homophily a single home network to identify control plane attacks. We illustrate use privacy-preserving data analysis in machine learning evaluate leptokurtic distributions routes from device an individual specific geographic location. Previously, route hijacking has been approached as large-scale systems problem, requiring service providers take action. Route information edge traditionally considered inactionable,...
The OSCAR [14] cluster installation toolkit was created by the Open Cluster Group (OCG) for one particular type of High Performance Computing (HPC) cluster. is currently widely used toolkits; it boasts hundreds thousands downloads and active mailing lists. has expanded its area with several sub-projects targeting other types HPC clusters. Each these projects share a core set code, including Database access API, ODA (OSCAR API). abstraction layer, consisting database schema corresponding...
The OSCAR (T. Naughton et al., 2002) cluster installation toolkit started life as the result of an ad-hoc working group attempting to bundle a set "best practices" for building clusters into single software solution. Although mainly developed "skunk works" projects in each participating institutions, has gained large following, boasting hundreds thousands downloads and active mailing lists. original was aimed at one particular type high performance computing (HPC) cluster. Since then,...
Today, Internet of Things (IoT) devices, web browsers, phones, and even cars may be fingerprinted for tracking, their connections routed through or to malicious entities. When IoT devices interact with a remote service, the integrity authentication that service is not guaranteed. other edge could subject man-in-the-middle (MiTM) attacks, attempting connect services. It also straight-forward use phishing pharming convince user accept connection potentially unfamiliar device. These risks...
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT devices through network micro-segmentation. In practice, this is implemented using per-device access control that defined by the manufacturer. This embedded in a "MUD-File", which transferred user's during onboarding process, and may contain from one hundreds of rules. Validating these rules for each device can be challenge, particularly when are interacting. response, MUD-Visualizer simplify validation...
In the last decade integration of Internet Things (IoT) ecosystems has increased exponentially, and it is necessary that our understanding human behavior when interacting with multiple smart devices in an IoT ecosystem keep pace.To better understand users' perceptions use in-home over time, we implemented homes participants so could both test previous findings about individual identify differences arise content a home devices.Specifically, recruited eight from separate households who...
Manufacturer Usage Description (MUD) is an Internet Engineering Task Force (IETF) standard designed to protect IoT devices and networks by creating out-of-the-box access control list for device. %The protocol defines a conceptually straightforward method implement isolation-based defensive mechanism based on the rules that are introduced manufacturer of However, in practice, each device defined its MUD-File may contain possibly hundreds rules. As result, reading validating these files...