- Network Security and Intrusion Detection
- Mobile Ad Hoc Networks
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Access Control and Trust
- Wireless Networks and Protocols
- Scientific Computing and Data Management
- Digital Media Forensic Detection
- Vehicular Ad Hoc Networks (VANETs)
- Digital and Cyber Forensics
- Traffic control and management
- Software-Defined Networks and 5G
- Energy Harvesting in Wireless Networks
- Machine Learning in Healthcare
- Artificial Intelligence in Healthcare and Education
- Teaching and Learning Programming
- Context-Aware Activity Recognition Systems
- Spam and Phishing Detection
- Wireless Communication Security Techniques
- Opportunistic and Delay-Tolerant Networks
- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Target Tracking and Data Fusion in Sensor Networks
- Information and Cyber Security
Grand Valley State University
2017-2024
University of Central Florida
2017
East Tennessee State University
2014-2015
Ecpi University
2013
Western Michigan University
2003-2007
Dartmouth College
2007
The rapid advancements in artificial intelligence, particularly generative AI and large language models, have unlocked new possibilities for revolutionizing healthcare delivery. However, harnessing the full potential of these technologies requires effective prompt engineering—designing optimizing input prompts to guide systems toward generating clinically relevant accurate outputs. Despite importance engineering, medical education has yet fully incorporate comprehensive training on this...
We propose lightweight methods to detect anomaly intrusions in wireless sensor networks (WSNs). The main idea is reuse the already available system information that generated at various layers of a network stack. To best our knowledge, this first such approach for intrusion detection WSNs.
Zero Trust (ZT) is a conceptual and architectural framework for cybersecurity teams to design networks into secure micro-perimeters strengthen data security with dynamic context-aware policies by systematically integrating state-of-the-art technology, risk management, threat intelligence. Both theoretical analysis industrial practice have shown that ZT can ensure organizations are not victims of known attacks or fail discover breach long time. has recently gained momentum in industry defend...
We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like coverage, connectivity, data aggregation and specific communication patterns. The proposed complement each other when used concurrently. mutual guarding (MG) technique does not work nodes are completely covered by their neighbors or adversary has shorter transmission range than the nodes. It also protect near boundary. SRP...
We describe our experience with teaching computer security labs at two different universities. report on the hardware and software lab setups, summarize assignments, present challenges encountered, discuss lessons learned. agree emphasize viewpoint that must train students not just in "security hacking" but also a broad range of fundamental concepts challenges. Approached this way, significantly facilitate reinforce students' understanding networking,
The primary role of Intelligent Transportation Systems (ITS) system is to implement Advanced Driver Assistance Services (ADAS) such as pedestrian detection, fog detection and collisions avoidance. These services rely on detecting communicating the environment conditions heavy rain or snow with nearby vehicles improve driver's visibility. ITS systems DSRC communicate this information via a Vehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I) communications architectures. DSCR performance...
We study the scheduling problem for data collection from sensor nodes to sink node in wireless networks, also referred as convergecast problem. The general network topology has been proven be NP-hard. In this paper, we propose our heuristic algorithm (finding minimum time (FMSTC)) and evaluate performance by simulation. results of simulation showed that number slots reach decreased with an increase power. compared proposed optimal a linear topology. 2.27 times more than To best knowledge,...
Smart cities are racing to create a more connected Intelligent Transportation Systems (ITS) that rely on collecting data from every possible sensor such as smart utility meter or parking meter. The use of sensors resulted in generating lot information maps the city environment conditions real time points needed be shared and analyzed among nodes. One possibility, carry share collected data, is autonomous vehicles systems, which Dedicated Short Range Communications (DSRC) technology. For...
Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because ad-hoc resource constrained nature networks. In this paper we present scalable distributed security protocol, DSPS, for WSN that fits between the transport layers. DSPS satisfies essential requirements secure such as data confidentiality, authentication, integrity freshness. Basic building blocks our protocol are key...
We describe different approaches taken to teaching security labs at ECPI University (ECPI), of Maryland College (UMUC) and Western Michigan (WMU).These three are then compared in various perspectives such as the type educational institution offering them; lab platform, its accessibility performance; instructional support materials; software installation configuration effort; well cost implementation issues. believe that an academic designing building a would benefit from reviewing our...
As teaching professors we have noticed that hands-on activities for a digital forensics course fall into the following three categories: 1) assist students in learning how to use common tools; 2) help gain in-depth understanding of basic concepts and fundamental knowledge are presented class lectures; 3) promote development mindsets data analytical skills needed forensic investigator. Various formats employed develop these exercises different categories. The educational objectives student...
It has been widely admitted by researchers and educators that hands-on activities are a core component in digital forensics education to help students gain practical skills needed real-world forensic investigations. However, it is not clear existing works about what kinds of recommended be integrated into course how design develop them. In our teaching practice, for designed three categories: 1) assist learning use common tools; 2) in-depth understanding the basic concepts fundamental...
Our paper comprehensively examines ways to detect and handle unauthorized switches in Local Area Networks (LANs) within today's intricate interconnected network landscape. We demonstrate the utilization of PortFast BPDU guard configurations reinforce LAN security against devices potential complications arising from spanning tree protocol. These measures not only enhance performance but also function as robust protective mechanisms, safeguarding integrity infrastructure. Furthermore, this...
People have valid concerns about their privacy and the use of personal information by corporations. do not necessarily trust social media companies to protect right privacy. Social are under pressure provide greater levels security users. The current gold standard protocols for messaging system is Signal Protocol. protocol an open-source end-to-end encryption model. It uses AES-256, HMAC-SHA256 Curve25519 as its cryptographic primitives. This currently considered cryptographically sound...
There are many methods to detect rogue wireless access points, but the same case can not be said for rouge switches on a LAN network. Detecting these is key security of any organization. The introduction unmanaged network switch has potential cripple These types pose big risk because they usually plug and play devices prove difficult track. A becomes when it connected without proper authorization. Rogue huge threat reliability An attacker could use launch an attack or spy traffic...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI