People Working in System & Network Security [PDF]

Aug 19, 2010 - I personally like program analysis; that's why I listed many PL & SE -oriented security people. Also,

1 downloads 21 Views 100KB Size

Recommend Stories


[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Download Network Security Assessment
Goodbyes are only for those who love with their eyes. Because for those who love with heart and soul

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Network Security
Happiness doesn't result from what we get, but from what we give. Ben Carson

Network Security
I want to sing like the birds sing, not worrying about who hears or what they think. Rumi

Network & Security
Don't count the days, make the days count. Muhammad Ali

Working with Young People
Why complain about yesterday, when you can make a better tomorrow by making the most of today? Anon

waterlat network working papers
We must be willing to let go of the life we have planned, so as to have the life that is waiting for

Idea Transcript


People Working in System & Network Security Zhiqiang Lin $Id: people.t2t, v1.0, last updated Thu Aug 19 23:34:18 2010 Exp $

Note: I create this pape for my purpose of quickly catching on what those active core people are working at. It is not an entire collection of all the system & network security researchers, but just those who has already graduated and works on the problem I am intersted in. So those who are still PhD students are not listed. I personally like program analysis; that's why I listed many PL & SE -oriented security people. Also, if it happens for me to forget listing someone, please let me know and I will be happy to add him/her. For the crypto researcher list, please refer to the page maintained by Bruno Crispo and David Wagner

Name

Homepage

Research Interests

Martin Abadi

http://www.soe.ucsc.edu/~abadi/

Security, specification and verification, programming languages ...

Kostas G. Anagnostakis

http://s3g.i2r.a-star.edu.sg/~kostas/

Malware defense, distributed systems, networking and computational markets ...

Ross Anderson http://www.cl.cam.ac.uk/~rja14/

Economics of information security, p2p system, robustness of cryptographic protocols ...

William Arbaugh http://www.cs.umd.edu/~waa/

Information systems security and privacy, security management ...

Giuseppe Ateniese

http://www.cs.jhu.edu/~ateniese/

Applied cryptography and network security

Vijay Atluri

http://cimic.rutgers.edu/~atluri/

Information Security, Privacy, Databases, Workflow Management,Spatial Databases ...

John Aycock

http://pages.cpsc.ucalgary.ca/~aycock/

Computer security, worms, virus, trjoans, future threats and defenses ...

Michael Backes http://www.infsec.cs.uni-sb.de/~backes/

Information security and cryptography ...

Lucas Ballard

http://www.cs.jhu.edu/~lucas/

Security in biometrics and VoIP, and web security ...

Michael Bailey

http://www.eecs.umich.edu/~mibailey/

Security and availability of complex distributed systems ...

Paul Barford

http://pages.cs.wisc.edu/~pb/

Network security, intrustion detection, network measurement and evaluation...

Adam Barth

http://www.adambarth.com/

Browser security, and privacy

Lujo Bauer

http://www.ece.cmu.edu/~lbauer/

Computer security, proof-carrying authorization, distributed access control ...

Steven M. Bellovin

http://www.cs.columbia.edu/~smb/

Networks, security, and especially why the two don't get along ...

Emery Berger

http://prisms.cs.umass.edu/emery/

Automatic error detection, toleration, and correction ...

Konstantin Beznosov

http://konstantin.beznosov.net/professional/main/main.html

System & network security, security usability, access control ...

Dan Boneh

http://crypto.stanford.edu/~dabo/

Applied cryptography, and network security ...

Nikita Borisov

http://www.hatswitch.org/~nikita/

Computer security and privacy, especially as applied to large-scale distributed systems...

Herbert Bos

http://www.cs.vu.nl/~herbertb/

System and network security, intrusion detection and signature generation ...

David Brumley

http://www.ece.cmu.edu/~dbrumley/

Software security, network security, and applied cryptography

Roy Campbell

www.cs.uiuc.edu/~rhc

Security, distributed operating systems and ubiquitous computing

Miguel Castro

http://research.microsoft.com/en-us/um/people/mcastro/

Software security, network security, and distributed systems

Philip Chan

http://www.cs.fit.edu/~pkc/

Adaptive systems, machine learning methods for computer security, web personalization ...

Hao Chen

http://www.cs.ucdavis.edu/~hchen/

Web security, cellular network security, software security, and malware defense ...

Peter M. Chen

http://www.eecs.umich.edu/~pmchen/

Virtual machine systems, speculative execution in OS & DS, fault-tolerant computing

Shuo Chen

http://research.microsoft.com/en-us/um/people/shuochen/

Systems security, software security, browser security, formal verification, program analysis

Yan Chen

http://www.cs.northwestern.edu/~ychen/

Computer networking and large-scale distributed systems, network measurement, diagnosis ...

Tzi-cker Chiueh http://www.ecsl.cs.sunysb.edu/~chiueh/

System & network security, malware defense ...

Stephen Chong http://www.cs.cornell.edu/w8/~schong/

Expressive and Enforceable Information Security Policies ...

Mihai Christodorescu

http://pages.cs.wisc.edu/~mihai/

Computer security, malware analysis, program verification, and software engineeringe ...

Evan Cooke

http://www.eecs.umich.edu/~emcooke/

Network security and distributed systems, malware analysis (defense) ...

Manuel Costa

http://research.microsoft.com/en-us/people/manuelc/

Scalable and reliable systems and networks ...

Crispin Cowan

http://crispincowan.com/

System & network security, survivability ...

Jedidiah R. Crandall

http://www.cs.unm.edu/~crandall/

VM systems, software security, and malware defense ...

Weidong Cui

http://research.microsoft.com/en-us/um/people/wdcui/

Systema & network security, malware analysis

Marc Dacier

http://www.eurecom.fr/people/dacier.en.htm

Attack attribution, underground economy, trustworthy infrastructure, cloud computing ...

George Danezis http://research.microsoft.com/en-us/um/people/gdane/

Computer security and privacy, traffic analysis, statistical inference, & P2P security ...

Anupam Datta

Information security and privacy, Security Analysis of Network Protocols ...

http://www.andrew.cmu.edu/user/danupam/

Saumya Debray http://www.cs.arizona.edu/people/debray/

Software security, binary rewriting and link-time code optimization, code compression

Rachna Dhamija http://people.deas.harvard.edu/~rachna/

Security Usability, Authentication, Anti-phishing, Privacy, Security, ...

Sven Dietrich

http://home.adelphi.edu/~spock/

Computer security, applied cryptography, anonymity, privacy ...

George Dinolt

http://faculty.nps.edu/gwdinolt/

Security policies, secure systems architectures and design ...

Wenliang (Kevin) http://www.cis.syr.edu/~wedu/ Du

Security in wireless Ad hoc and sensor networks, distributed computing and grid Computing ...

Dawson Engler

Software security, program analysis, bug finding...

http://www.stanford.edu/~engler/

Ulfar Erlingsson http://www.ru.is/faculty/ulfar/

Dependable, distributed software systems ...

David Evans

http://www.cs.virginia.edu/~evans/

System security, software engineering, programming languages, cryptography, networking ...

Nick Feamster

http://www.cc.gatech.edu/~feamster/

Networked computer systems: network operations, architecture, protocol design ...

Edward W. Felten

http://www.cs.princeton.edu/~felten/

Computer security and privacy, and technology policy ...

Jeff Foster

http://www.cs.umd.edu/~jfoster/

Programming languages, software engineering, program analysis ...

Cedric Fournet

http://research.microsoft.com/en-us/um/people/fournet/

Concurrent programming, distributed systems, and security ...

Michael Franz

http://www.ics.uci.edu/~franz/

Security and efficiency aspects of mobile-code systems and on VM technology ...

Michael J. Freedman

http://www.cs.princeton.edu/~mfreed/

Distributed systems, security, networking, and applied cryptography ...

Kevin Fu

http://www.cs.umass.edu/~kevinfu/

Security and privacy for pervasive computation ...

Vinod Ganapathy

http://www.cs.rutgers.edu/~vinodg/

Computer security and reliability,software engineering, program analysis, OS ...

Tal Garfinkel

http://www.stanford.edu/~talg/

VM systems, computer security, networks ...

Virgil D. Gligor

http://www.ece.cmu.edu/~virgil/

Network and distributed systems security, applied cryptography ...

Jonathon Giffin

http://www.cc.gatech.edu/~giffin

System and software security, intrusion detection, program analysis, virtualization ...

Patrice Godefroid

https://research.microsoft.com/en-us/um/people/pg/

Program specification, analysis, testing and verification, model checking

Steven D. Gribble

http://www.cs.washington.edu/homes/gribble/

OS, DS, scalable Internet services, systems security, malware defense

Debin Gao

http://www.sis.smu.edu.sg/faculty/infosys/debingao.asp

System & Network security, intrusion detection ...

Carrie Gates

http://flame.cs.dal.ca/~gates/

Network security and traffic analysis, network situational awareness ...

Ian Goldberg

http://www.cs.uwaterloo.ca/~iang/

Security and privacy, creating security and privacy technologies for Internet transactions...

Philippe Golle

http://crypto.stanford.edu/~pgolle/

Network security, privacy ...

Guofei Gu

http://faculty.cs.tamu.edu/guofei/

System & Network security, malware detection, defense, and analysis, Web security ...

Yong Guan

http://home.eng.iastate.edu/~guan/

Computer and network forensics, wireless and sensor network security, privacy-enhancing ...

Fanglu Guo

http://www.ecsl.cs.sunysb.edu/~fanglu/

System & network security, wireless network, network performance and dependability ...

Peter Gutmann

http://www.cs.auckland.ac.nz/~pgut001/

Design and analysis of security techniques and systems ...

J. Alex Halderman

http://www.cse.umich.edu/~jhalderm/

Software security, data privacy, electronic voting, digital rights management, cybercrime ...

Michael Hicks

http://www.cs.umd.edu/~mwh/

Software reliability and security ...

Thorsten Holz

http://honeyblog.org/

Malware collection (honeypot), analysis, detection, prevention ...

Yih-Chun Hu

http://users.crhc.illinois.edu/yihchun/

Security and systems -- secure systems and mobile communications ...

Cynthia Irvine

http://faculty.nps.edu/irvine/

High assurance systems and multilevel security...

Angelos Keromytis

http://www1.cs.columbia.edu/~angelos/

Computer security, cryptography, and networking

Emre Kiciman

http://research.microsoft.com/en-us/people/emrek/

Large-scale systems (mostly Internet services) reliability and operations ...

Yongdae Kim

http://www-users.cs.umn.edu/~kyd/

Practical security mechanisms in file systems, p2p systems, sensor and ad-hoc network ...

Engin Kirda

http://www.iseclab.org/people/ek/

Software and network security, web vulnerability detection and prevention, binary analysis...

Negar Kiyavash http://users.crhc.illinois.edu/kiyavash/

Timing Channels, Digital Fingerprinting, Biometrics and Cryptography ...

Christian Kreibich

http://www.icir.org/christian/

Network architecture, distributed systems, and network security ...

Shriram Krishnamurthi

http://www.cs.brown.edu/~sk/

Computer-aided verification, computer security, and software engineering ...

Christopher Kruegel

http://www.cs.ucsb.edu/~chris/

Computer & network security, malware analysis, web security, and vulnerability analysis...

Peng Liu

http://ist.psu.edu/s2/pliu/

Survivable systems, systems & network Security, privacy ...

Collin Jackson

http://www.collinjackson.com/

Securing the Web Platform, Security for Mashups, Privacy in the Browser ...

Trent Jaeger

http://www.cse.psu.edu/~tjaeger/

VM systems, Linux security, source code analysis ...

Farnam Jahanian

http://www.eecs.umich.edu/~farnam/

Distributed computing, network security, and network protocols & architecture...

Sushil Jajodia

http://csis.gmu.edu/faculty/jajodia.html

Information systems security, survivability and information warfare, watermarking ...

Somesh Jha

http://pages.cs.wisc.edu/~jha/

Computer security, software engineering, program analysis ...

Xuxian Jiang

http://www.csc.ncsu.edu/faculty/jiang/

Virtual machines (VMs) and OS security, malware analysis

Markus Jakobsson

http://www.informatics.indiana.edu/markus/

Netwrok security, phishing and countermeasures, click-fraud, cryptography ...

Rob Johnson

http://www.cs.sunysb.edu/~rob/

Software security, system and network security, cryptography s...

Anthony D. Joseph

http://bnrg.cs.berkeley.edu/~adj/

Internet security, mobile/distributed computing, and wireless communications ...

Jaeyeon Jung

http://www2.seattle.intel-research.net/~jjung/

Intrusion detecion, network forensic analysis ...

Sam King

http://www.cs.uiuc.edu/homes/kingst/Home.html

VMs, OS & user level application code security ...

Tadayoshi Kohno

http://www.cs.washington.edu/homes/yoshi/

Computer security, privacy, and applied cryptography ...

Arun Lakhotia

http://www.cacs.louisiana.edu/~arun/

Program analysis, program visualization and understanding, software evolution/protection ...

Adam J. Lee

http://www.cs.pitt.edu/~adamlee/

Protocol design and optimization, privacypreserving policy evaluation ...

http://www.cc.gatech.edu/~wenke/

Systems and network security, applied cryptography, network management, and data mining

Wenke Lee

Brian Neil Levine http://prisms.cs.umass.edu/brian/

Mobile networks, security, and the Internet ...

Ninghui Li

http://www.cs.purdue.edu/homes/ninghui/

Cmputer security, access control, privacy, applied cryptography ...

Zhuowei Li

http://zhuowei.net/default.aspx

Malware/spyware analysis, defense and containment, Intrusion detection ...

Zhenkai Liang

http://www.comp.nus.edu.sg/~liangzk/

Software security, program analysis

David Lie

http://www.eecg.toronto.edu/~lie/

OS, computer architecture, formal verification and networking ...

Ulf Lindqvist

http://www.csl.sri.com/people/lindqvist/

Computer misuse analysis, modeling, categorization, and automatic real-time detection ...

Alex X. Liu

http://www.cse.msu.edu/~alexliu/

Networking and security, distributed computing, dependable and high-assurance systems ...

Benjamin Livshits

http://research.microsoft.com/en-us/um/people/livshits/

Software security, bug finding, vulnerability analysis ....

Michael E. Locasto

http://www.cpsc.ucalgary.ca/~locasto/

System Security, with a focus on automatic, correct, and efficient defense mechanism ...

Javier Lopez

http://www.cis.upenn.edu/~stevez/

Network security, security Services and cryptographic protocols for network applications ...

Jonathan M. McCune

http://www.ece.cmu.edu/~jmmccune/

Trusted Computing, Operating system and virtualization security, ...

Sergio Maffeis

http://www.doc.ic.ac.uk/~maffeis/

Web application security, JavaScript, security protocols, types, ...

Mohammad Mannan

http://people.scs.carleton.ca/~mmannan/

Authentication and passwords, malicious software, software security, identity fraud ...

Lorenzo Martignoni

http://martignlo.greyhats.it/

Malware analysis and detection, Vulnerability analysis, VM, Computer forensics ...

Roy A. Maxion

http://www2.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/

Fault/intrusion detection, attacker/defender testbed, reliable hardware/software ...

David Mazieres http://www.scs.stanford.edu/~dm/

Computer system and security

David Molnar

http://www.dmolnar.com/

Cryptography, privacy, and computer security

Z. Morley Mao

http://www.eecs.umich.edu/~zmao/

Network security/forensics, network systems/applications, and network management

Patrick McDaniel http://www.patrickmcdaniel.org/

Systems & network security, language-based security ...

John C. Mitchelll http://theory.stanford.edu/people/jcm/

Access control, network protocols, privacy, software systems, and web security ...

George Mohay

Computer security, intrusion detection, computer forensics ...

http://sky.fit.qut.edu.au/~mohayg/

Fabian Monrose http://www.cs.unc.edu/~fabian/

Malware classification and modeling, traffic analysis, applied crypto and privacy ...

Greg Morrisett

http://www.eecs.harvard.edu/~greg/

Applications of programming language technology for building secure and reliable systems. ...

Andrew Myers

http://www.cs.cornell.edu/andru/

Computer security, programming languages, and distributed and persistent objects ...

George Necula

http://www.cs.berkeley.edu/~necula/

Security in distributed systems, programming language theory, design and implementation ...

Peng Ning

http://discovery.csc.ncsu.edu/

Software and systems security, and security in Ad-hoc & WSN ...

Paul C. Van Oorschot

http://www.scs.carleton.ca/~paulv/

Authentication, network security, software security, applied cryptography ...

Bryan Parno

http://www.ece.cmu.edu/~bparno/

Network and host-based security, applied cryptography ...

Vern Paxson

http://www.icir.org/vern/

System & Network Security, malware defense ...

Marco Pistoia

http://www.research.ibm.com/people/p/pistoia/

Mobile-code security, component software, and static program analysis of OO ...

Adrian Perrig

http://www.ece.cmu.edu/~adrian/

Networking and systems security, security for mobile computing and sensor networks ...

Radha Poovendran

http://www.ee.washington.edu/research/nsl/faculty/radha/

Security of critical networks and network components ...

Phillip Porras

http://www.csl.sri.com/people/porras/

Intrusion detection, high assurance computing, security evaluation, network management ...

Atul Prakash

http://www.eecs.umich.edu/~aprakash/

Security and privacy, cyber-physical systems ...

Neils Provos

http://www.citi.umich.edu/u/provos/

Web-Based Malware, distributed DoS, intrusion detection & prevention ...

Feng Qin

http://www.cse.ohio-state.edu/~qin/

Software dependability, operating systems, and security ...

Moheeb Rajab

http://www.cs.jhu.edu/~moheeb/

networking and network security ...

Michael Reiter

http://www.cs.unc.edu/~reiter/

System & network security, distributed system, applied crypto ...

William Robertson

http://wilrobertson.com/

Web security, anomaly detection, malware analysis, and electronic voting ...

Cristina NitaRotaru

http://homes.cerias.purdue.edu/~crisn/

DS, network protocols and applications, security in wireless ad hoc network ...

Avi Rubin

http://www.avirubin.com/

Systems and networking security, with special attention to computer privacy ...

Hassen Saidi

http://www.csl.sri.com/users/saidi/

Intrusion detection, and static analysis, computer-aided verification, logic ...

Reiner Sailer

http://www.research.ibm.com/people/s/sailer/

Security services for virtualized environments, security analysis, malware prevention ...

Pierangela Samarati

http://www.dti.unimi.it/samarati/

Data security, information system security, access control policies, models and systems ...

Ravi Sandhu

http://profsandhu.com/

Information security, privacy, authorization models, protocols and mechanisms ...

Stefan Savage

http://www-cse.ucsd.edu/~savage/

System & networking (esp availability, security, and occasionally performance) ...

Stuart Schechter http://research.microsoft.com/en-us/people/stus/

Computer security ...

R. Sekar

Intrusion detection, software security, and OS enhancements ...

http://seclab.cs.sunysb.edu/sekar/

Hovav Shacham http://www.cs.ucsd.edu/~hovav/

Applied cryptography, systems security, and tech policy ...

Umesh Shankar http://www.umeshshankar.com/

Browser security and privacy, intrusion detection, program analysis ...

Micah Sherr

Privacy, e-voting, OS security, network and protocol security, and NIDS ...

http://www.cs.georgetown.edu/~msherr/

Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/

Computer security and privacy, formal methods for analysis of secure systems ...

Stelios Sidiroglou

http://www1.cs.columbia.edu/~ss1759

OS, network and software security and software survivability ...

Radu Sion

http://www.cs.sunysb.edu/~sion/

Information assurance, applied cryptography and network security

Sean W. Smith

http://www.cs.dartmouth.edu/~sws/

System security, PKI, applied crypto ...

Anil Somayaji

http://www.scs.carleton.ca/~soma/

Computer security, OS, artificial life, and complex adaptive systems ...

Robin Sommer

http://www.icir.org/robin/

Network security, high-performance network intrusion detection in operational settings ...

Dawn Song

http://www.cs.berkeley.edu/~dawnsong/

Software security, network security, and applied cryptography ...

Eugene Spafford http://spaf.cerias.purdue.edu/

Information security, computer crime investigation and information ethics ...

Angelos Stavrou http://cs.gmu.edu/~astavrou/

Large systems security & survivability, secure P2p and overlay networking, privacy ...

Salvatore J. Stolfo

http://www1.cs.columbia.edu/~sal/

Intrusion detection system ...

Zhengdong Su

http://www.cs.ucdavis.edu/~su/

Programming languages, software engineering, and computer security ...

G. Edward Suh

http://www.csl.cornell.edu/~suh/

Computer Architecture, computer security, reliability ...

Paul Syverson

http://www.syverson.org/

Onion routing; Protocols, security, anonymity, and privacy in Ad-hoc & WSN ...

Peter Szor

http://www.peterszor.com/

Computer virus detection, and intrusion prevention...

Patrick Traynor http://www.cc.gatech.edu/~traynor/

Security in cellular networks

Gene Tsudik

http://www.ics.uci.edu/~gts/

Privacy, computer and network security, applied cryptography ...

Doug Tygar

http://www.cs.berkeley.edu/~tygar/

Privacy, computer security and electronic commerce

Shambhu J. Upadhyaya

http://www.cse.buffalo.edu/~shambhu

Information assurance, computer security, fault diagnosis, fault tolerant computing ...

Alfonso Valdes

http://www.csl.sri.com/users/valdes/

Probabilistic alert correlation, dependable intrusion tolerance ...

V.N. http://www.cs.uic.edu/~venkat/ Venkatakrishnan

Web & browser security, privacy and information flow policies ...

Giovanni Vigna

http://www.cs.ucsb.edu/~vigna/

Web Security, intrusion detection, vulnerability analysis, malware and badware analysis

Jan Vitek

http://www.cs.purdue.edu/homes/jv/

Programming languages, VM, program analysis and optimization, information security

Geoffrey M. Voelker

http://www-cse.ucsd.edu/~voelker/

Network and systems security ...

David Wagner

http://www.cs.berkeley.edu/~daw/

Systems & networks, applications of static and dynamic program analysis to computer security

Dan Wallach

http://www.cs.rice.edu/~dwallach/

Mobile code security, p2p networking security, wireless security, security in evoting systems

Michael Waidner http://www.zurich.ibm.com/~wmi/

Computer and network security, privacy ...

Cliff Wang

http://www.csc.ncsu.edu/directories/faculty_info.php? id=2324

Network security, Secure protocols and algorithms for sensor networks and wireless...

Haining Wang

http://www.cs.wm.edu/~hnw/

Network security, network QoS, computer Security, wireless and mobile computing ...

Helen J. Wang

http://research.microsoft.com/en-us/um/people/helenw/

System security, malware defense, web security, wireless location privacy ...

Jia Wang

http://www.research.att.com/~jiawang/

Internet routing, network measurement and management, and network security ...

Lingyu Wang

http://users.encs.concordia.ca/~wang/

Data privacy, vulnerability analysis, intrusion detection, security metrics ...

Ke Wang

http://www1.cs.columbia.edu/~kewang/

Intrusion detection, user behavior modeling, spam blocking ...

Xinyuan (Frank) http://ise.gmu.edu/~xwangc/ Wang

Network-based intrusion source tracing, botnet, VoIP security, information hiding ...

XiaoFeng Wang http://www.informatics.indiana.edu/xw7/

Automatic program Analysis, DoS containment, incentive engineering

Yi-Min Wang

https://research.microsoft.com/en-us/um/people/ymwang/ Cybersecurity & systems management ...

Brent Waters

http://userweb.cs.utexas.edu/~bwaters/

Network security and applied cryptography ...

Nicholas C Weaver

http://www.icsi.berkeley.edu/~nweaver/

Network and systems security ...

Westley Weimer http://www.cs.virginia.edu/~weimer/

Software quality, program analysis, designing languages and language features ...

Tara Whalen

http://sites.google.com/site/tjwhalen/

Usable security, computer and network security, human-computer interaction, privacy ...

William H. Winsborough

http://www.cs.utsa.edu/~winsboro/

Computer security and privacy in distributed systems and networks ...

Rebecca N. Wright

http://www.cs.rutgers.edu/~rebecca.wright/

Computer and communications security ...

S. Felix Wu

http://www.cs.ucdavis.edu/~wu/

Vulnerability analysis, IPSec/VPN policy management, routing protocol security ...

Yinglian Xie

http://research.microsoft.com/en-us/people/yxie/

Network security, privacy, distributed systems, and networking ...

Dongyan Xu

http://www.cs.purdue.edu/homes/dxu/

Virtualization in system security, and distributed computing

Jun Xu

http://research.google.com/pubs/author857.html

System and network security, software security ...

Shouhuai Xu

http://www.cs.utsa.edu/~shxu/

Provably survivable/trustworthy systems ...

Junfeng Yang

http://www.cs.columbia.edu/~junfeng/

OS, software error detection, security, and storage systems ...

Danfeng (Daphne) Yao

http://www.cs.rutgers.edu/~danfeng/

Computer and information security and applied cryptography ...

Vinod Yegneswaran

http://www.csl.sri.com/people/yegneswaran/

System & network security, malware defense ...

Heng Yin

http://lcs.syr.edu/faculty/yin/

Binary analysis, malware detection ...

Haifeng Yu

http://www.comp.nus.edu.sg/~yuhf/

Distributed Systems Security, Distributed Algorithms, Distributed Systems Availability ...

Ting Yu

http://www4.ncsu.edu/~tyu/

Trust management and privacy preservation in open systems, and database management systems...

Nickolai Zeldovich

http://people.csail.mit.edu/nickolai/

System and Network Security, software security, information flow ...

Steve Zdancewic

http://www.cis.upenn.edu/~stevez/

Language-based security, access control and authorization logic ...

Xiangyu Zhang

http://www.cs.purdue.edu/homes/xyzhang/

Software debugging, program analysis, dynamic slicing ...

Xiaolan (Catherine) Zhang

http://www.google.com/search?q=Catherine+Zhang

Secure software technology ...

Sheng Zhong

http://www.cse.buffalo.edu/~szhong/

Wireless networks, data privacy and applied cryptography, theory and algorithms ...

Yuanyuan Zhou http://www.cs.uiuc.edu/homes/yyzhou/

Computer architecture, OS, software reliability, software debugging ...

Sencun Zhu

http://www.cse.psu.edu/~szhu/

Network and systems security, and security in Ad-hoc & WSN ...

Cliff C. Zou

http://www.cs.ucf.edu/~czou/

Computer and network security, network modeling and performance evaluation ...

HOME SOURCE

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.