In the August 2015 PCAST (President’s Council of Advisors on Science and Technology) report, the working group and PCAST members chose to examine closely eight specific areas that are critical to the future of Information Technology—cybersecurity being listed first. Part of the Institute of Computing and Cybersystems, the Center for Cybersecurity has two main goals. The first goal is to research in the highly critical areas of information security and biometrics, privacy protection, trusted software engineering, security in mobile computing and wireless communications. The second goal is to advance the practice and public awareness of cybersecurity through various education and outreach activities.

Peruse a selection of publications from the Center for Cybersecurity below. Visit the ICC homepage for more information about the Institute and its Centers.

Follow

Submissions from 2018

Link

Teaching directory services: Topics, challenges, and Experiences presented at Computing Technologies Applications-l, Yu Cai

Link

MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, and et. al.

Link

Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities, Ling Jiang, Kristijan Mirkovski, Jeffrey D. Wall, Christian Wagner, and Paul Benjamin Lowry

Link

Michigan hand outcomes questionnaire for the evaluation of patients with mucopolysaccharidosis, Marcos A Matos, Ingrid C F Barboza, Marina V A R Ferraz, and Guy Hembroff

Link

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, and et. al.

Link

A novel kinect-based algorithm for inferring the position of the lower body joints using human gait pattern, Sagda Elmahi Kabashi Osman, Guy Hembroff, and Marcos A Matos

Link

RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta

Link

The organization man and the innovator: Theoretical archetypes to inform behavioral information security research, Jeffrey D. Wall and Rahul Singh

Link

Towards Access Control for Network Coding-Based Named Data Networking, Danye Wu, Zhiwei Xu, Bo Chen, and Yujun Zhang

Link

Internet Protocol Cameras with No Password Protection: An Empirical Investigation, Haitao Xu, Fengyuan Xu, and Bo Chen

Link

Towards efficient detection of sybil attacks in location-based social networks, Zhiwei Xu, Bo Chen, Xuying Meng, and Limin Liu

PDF

Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, and Bo Chen

Submissions from 2017

Link

A virtual machine placement algorithm with energy-efficiency in cloud computing, Yu Cai

Link

Cybersecurity should be taught top-down and case-driven, Yu Cai and Todd O. Arney

Link

User-friendly deniable storage for mobile devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, and Zhan Wang

Link

Remote data integrity checking with server-side repair, Bo Chen and Reza Curtmola

PDF

Parameter selection and performance comparison of particle swarm optimization in sensor networks localization, Huanqing Cui, Minglei Shu, Min Song, and Yinglong Wang

Link

Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, and et. al.

Link

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, and Peng Liu

Link

Cyber-physical risk management for PV photovoltaic plants, Alexander Miranda and Steven Goldsmith

Link

Contextualized meaning extraction: A meta-algorithm for big data text mining with pragmatics, Jeffrey D. Wall and R. Singh

Submissions from 2016

PDF

Active snort rules and the needs for computing resources: Computing resources needed to activate different numbers of snort rules, Chad A. Arney and Xinli Wang

PDF

Improving patient safety, health data accuracy, and remote self-management of health through the establishment of a biometric-based global UHID, Guy Hembroff

PDF

Bridging the technology gap in health care: Developing a model to better help those who help others, Guy Hembroff and Marcos A Matos

Link

AESvisual: A visualization tool for the AES cipher, Jun Ma, Jun Tao, Jean Mayo, Ching-Kuang Shene, Melissa Karanen, and Chaoli Wang