Faculty by Expertise

Algorithms

Algorithms for computer science and complexity theory, logic in computer science, optimization, systems and database principles.

Attribution

Methods for producing standardized and transparent attribution that overcomes concerns about credibility and helps hold actors accountable for malicious activity.

Cloud Security

Threats and security controls possible at each level of abstraction; cloud management services for trustworthy, secure, and resilient operations

Communication Systems

Communications networks for voice, data, video and command-and-control purposes, and the components that form an integrated whole

Computer Engineering, Architecture & Design

Design methodology, including circuitry, processor design, shared and distributed memory, parallelism, multiprocessors, multiple CPU systems and more.

Cyber-Physical Systems

Engineered systems that are built from, and depend upon, the seamless integration of embedded computers and networks that monitor or control a physical process.

Data Mining & Analytics

Discovery of patterns in large data sets, involving methods that support machine learning, statistics, and optimized database systems.

Data Security & Privacy

Data storage, processing, and transfer; practical approaches to secure management of personal or sensitive information in transit and at rest

Defense / National Security

Technologies that secure, defend, and respond to threats within our country’s public or proprietary information, distribution, and network systems.

Encryption

Conversion of electronic data or information into a code which cannot be easily understood by anyone except the intended, authorized parties.

Healthcare Security

The integrity of electronic health data to improve or predict health outcomes and prevent unauthorized access to patient data

Incident Management

Effective deterrence and response to security-related incidents affecting individual users or an organization

Internet Infrastructure & Operating Systems

Physical hardware, transmission media, and software used to interconnect computers and reliably transmit data on the internet.

IT Economics

Costs and benefits surrounding IT asset management, including business models, network economics, management and diffusion of IT products, and product pricing.

Large-Scale or Distributed Systems

Optimization and evolution of loosely coupled, interconnected processors designed to power an application or service.

Machine Learning

Securing data and processes that allow computers to act or predict without being explicitly programmed, such as the integrity of artificial intelligence (AI) that automates search results or predictive outcomes.

Mobile & Wireless Communications

Secure transmission of data, voice and video via a computer or any other wireless enabled device without a fixed physical link.

Modeling & Simulation

Physical, mathematical, or logical representations of a system in order to understand its behavior before implementing the system in the real world.

Network Security

Technologies and best practices to protect system infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure.

Policy

Recommendations and the evaluation of agreements, laws, and cultural norms that guard data in transit and at rest.

Programming Languages & Correctness

Vocabulary and grammatical rules used to instruct a computer or computing device to perform specific tasks, testing and evaluating the capability of a program or system to meet its required results.

Risk Management

Technical solutions to mitigate cyber risks for organizations, management of such technical solutions, countermeasures, policies and procedures to deter cyberattack.

Software & Applications

Security of, and creation, of application programs that perform a group of coordinated functions, tasks, or activities for the benefit of the user

Systems Security

Processes and methodologies involved with keeping information confidential and available, including the access controls that prevent unauthorized access or leakage.

Threat Intelligence

Evidence-based knowledge about existing or emerging cyberthreats that can be used to inform decisions regarding an organizational response.

Trust

Competence of a machine or sensor to act dependably, securely and reliably within a specified context using cryptography, digital signatures, and electronic certificates as well as the identity management of non-human (machine) participants that interact with a device.