In the August 2015 PCAST (President’s Council of Advisors on Science and Technology) report, the working group and PCAST members chose to examine closely eight specific areas that are critical to the future of Information Technology—cybersecurity being listed first. Part of the Institute of Computing and Cybersystems, the Center for Cybersecurity has two main goals. The first goal is to research in the highly critical areas of information security and biometrics, privacy protection, trusted software engineering, security in mobile computing and wireless communications. The second goal is to advance the practice and public awareness of cybersecurity through various education and outreach activities.
Peruse a selection of publications from the Center for Cybersecurity below. Visit the ICC homepage for more information about the Institute and its Centers.
Works from 2018
MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities, Ling Jiang, Kristijan Mirkovski, Jeffrey D. Wall, Christian Wagner, and Paul Benjamin Lowry
Michigan hand outcomes questionnaire for the evaluation of patients with mucopolysaccharidosis, Marcos A Matos, Ingrid C F Barboza, Marina V A R Ferraz, and Guy Hembroff
Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.
A novel kinect-based algorithm for inferring the position of the lower body joints using human gait pattern, Sagda Elmahi Kabashi Osman, Guy Hembroff, and Marcos A Matos
RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta
The organization man and the innovator: Theoretical archetypes to inform behavioral information security research, Jeffrey D. Wall and Rahul Singh
Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang
Internet Protocol Cameras with No Password Protection: An Empirical Investigation, Haitao Xu, Fengyuan Xu, and Bo Chen
Towards efficient detection of sybil attacks in location-based social networks, Zhiwei Xu, Bo Chen, Xuying Meng, and Limin Liu
Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, and Bo Chen
Works from 2017
A virtual machine placement algorithm with energy-efficiency in cloud computing, Yu Cai
Cybersecurity should be taught top-down and case-driven, Yu Cai and Todd O. Arney
User-friendly deniable storage for mobile devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang
Remote data integrity checking with server-side repair, Bo Chen and Reza Curtmola
Parameter selection and performance comparison of particle swarm optimization in sensor networks localization, Huanqing Cui, Minglei Shu, Min Song, and Yinglong Wang
Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, and et. al.
Delay efficient disconnected RSU placement algorithm for VANET safety applications, Ali Jalooli, Min Song, and Xiaohuan Xu
Disruption Aware Routing and link Scheduling for cognitive radio networks, Peng Jiang, ChunSheng Xin, and Min Song
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, and Peng Liu
Cyber-physical risk management for PV photovoltaic plants, Alexander Miranda and Steven Goldsmith
Contextualized meaning extraction: A meta-algorithm for big data text mining with pragmatics, Jeffrey D. Wall and R. Singh
UNIXvisual: A visualization tool for teaching UNIX Permissions, Man Wang, Jean Mayo, Ching-Kuang Shene, Steven Carr, and Chaoli Wang
Submissions from 2016
Active snort rules and the needs for computing resources: Computing resources needed to activate different numbers of snort rules, Chad A. Arney and Xinli Wang
Bridging the technology gap in health care: Developing a model to better help those who help others, Guy Hembroff and Marcos A Matos
AESvisual: A visualization tool for the AES cipher, Jun Ma, Jun Tao, Jean Mayo, Ching-Kuang Shene, Melissa Karanen, and Chaoli Wang
Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks, Xiaohua Xu and Min Song