Cybersecurity — ¹ú²úÂ鶹¾«Æ· Mon, 27 Mar 2023 18:41:39 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 Michel Benaroch /faculty-experts/michel-benaroch/ Tue, 28 Feb 2017 18:55:55 +0000 /?post_type=faculty-experts&p=115637 Professor Benaroch is Associate Dean for Research and Professor of Management Information Systems at the Whitman School of Management. Professor Benaroch’s research addresses issues concerning the economics of IT investment, IT investment risk, ontology-centered knowledge representation, and artificial intelligence applications in finance. He has published extensively in information systems and computer science journals, including MIS Quarterly,ÌýInformation Systems Research,ÌýJournal of MIS,ÌýIEEE Transaction on Software Engineering,ÌýInternational Journal of Accounting Information Systems, and International Journal of Human-Computer Interaction. He was ranked #26 (out of top-100 researchers worldwide) who published in top Information Systems journals (MISQ, ISR, JMIS,Ìý²¹²Ô»åÌýJAIS) during 1999-2011.

While at Whitman, Professor Benaroch has taught courses on customer relationship management analytics, management of information technology (IT), IT and Electronic Commerce, decision-support and data mining technologies, and database management. He has also taught at the Israeli Institute of Technology (Technion), New York University, and the University of Rochester.

]]>
Shiu-Kai Chin /faculty-experts/shiu-kai-chin/ Fri, 24 Feb 2017 15:51:41 +0000 /?post_type=faculty-experts&p=115146 Professor Chin’s research interests include computer/cyber security, systems assurance and formal verification.

Professor Chin’s research uses mathematical logic for the design and verification of trustworthy computer systems. Examples of computer systems that must be trustworthy are command and control systems, financial services, and distributed control of the power grid. His focus is on policy-based design and verification with an emphasis on using computer-assisted reasoning using higher-order logic theorem provers.

Shiu-Kai supports the Air Force’s research in trustworthy systems and hardware-based security. His work with JP Morgan Chase was used to reason about the security and integrity of credentials and entitlements in large-value commercial transactions.

]]>
Kevin Du /faculty-experts/kevin-du/ Thu, 08 Sep 2016 20:52:35 +0000 http://sunews.leibowitz.co/?post_type=faculty-experts&p=103936 Kevin Du is a  professor at the   at Syracuse University. He specializes in the field of security education.

His interests lie in security systems related to the internet and smartphones. he specializes in cyber-security and studies of operating systems including Apple and Android. His expertise lies in identifying problems in the design of applications and developing tools to detect them. Professor Du develops improved access control for mobile systems and also is able to comment on general mobile devices including Apple.

He has spoken at various conferences like Samsung Research America and  in Beijing. Additionally he has been a part of many es and has written an array of publications.

 

 

]]>
Vir V. Phoha /faculty-experts/vir-v-phoha/ Wed, 27 Jul 2016 23:44:28 +0000 http://sunews.leibowitz.co/?post_type=faculty-experts&p=102912 My focus is to do original research that cuts across conventional rigorously defined disciplines and unifies basic and common concepts across disciplines.  In particular, my research centers around security (malignant systems, active authentication, for example touch based authentication on mobile devices) and machine learning (decision trees, statistical, and evolutionary methods) with a focus on large time series data streams and static data sets, and computer networks (anomalies, optimization).  I am also using these methods to build field realizable defensive and offensive Cyber-based systems.

]]>