In support of its goals, the Center members have engaged in acquiring grants funding, authoring book chapters, as well as publishing journal and conference papers.
Schuster, D. (2016-2021). PI. CAREER: Understanding the Cognitive Processes of Computer Network Defense. Funded by National Science Foundation Early Career Development Program. Award: $516,000.
Park, Y. (2016). PI. SDN/NFV Security. Funded by Arista Networks, Inc. Award: $100,000.
Park, Y. (2016). PI. Software-Defined Storage. Funded by Nexenta Systems, Inc. Award: $50,000.
Park, Y. (2016). PI. Data Privacy Protection in Internet of Things. Funded by GKeS Inc. Award: $50,000.
Chen, H. (2015-2016). Co-PI. Big Data Applications in Hospitality and Tourism Industries. Funded by Beijing Yanchang Petrochemical Product Co. Award: $50,000.
Meldal, S. (2005-2016). Science and Technology Center Team for Research in Ubiquitous Secure Technology (TRUST), National Science Foundation. Award: $963,746.
Book Authoring and Journal Publications
Choi, S., Chowdhary, A., Datta, R., & Park, Y. (2018). P4Guard: Designing P4 Based Firewall. IEEE Military Communications.
Austin, T., Kudo, N., & Yamauchi, T. (2018). Access control mechanism to mitigate Cordova plugin attacks in hybrid applications. Journal of Information Processing.
Austin, T., Di Troia, F., Nagarajan, P., & Stamp, M. (2018). Autocorrelation Analysis of Financial Botnet Traffic. ForSE: International Workshop on FORmal methods for Security Engineering, 2018.
Chang, S.Y., Vijayakumar Kengalahalli, N., & Park, Y. (2018). Distributed Security Network Functions against Botnet Attacks in Software-defined Networks. IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
Hu, H., Li, H., Park, Y., & Yuan, X. (2018). Enhancing Security Education Through Designing SDN Security Labs in CloudLab. Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE, 2018).
Janardhan, S., Park, Y., & Vijayakumar Kengalahalli, N. (2018). Implementing Lightweight Intrusion Detection Systems Based on Network Function Virtualization. 22nd Colloquium for Information System Security Education (CISSE).
Saldamli, G. (2018). Post-Quantum Cryptography on IoT: Merkle’s Tree Authentication. Proceedings of the 2018 International Conference on Wireless Networks (ICWN’18).
Saldamli, G. (2018). Analysis of McEliece Cryptosystem on Raspberry II 3. Proceedings of the 2018 International Conference on Security & Management (SAM’18).
Moh, M. (2018). Machine learning techniques for security of Internet of Things (IoT) and fog computing systems. Proceedings of the IEEE International Conference on High Performance Computing and Simulation.