Dighton Fiddner, “Decision Making Implications of Defining and Understanding Cyberspace.” Funded by the IBM Center for the Business of Government, June 16, 2013: Awarded a $20,000 grant.
William Oblitey, Rose Shumba, and Jennifer Gossett received funding in the amount of $231,000 (during academic year 2012–13) from the National Science Foundation CyberCorps: Scholarship for Service (SFS) award for their project, “The Cyber Catch Scholarship Program.” The total funding for this project over a five-year period is anticipated to be $1,148,531.
J. Rodger, G. Bhatt, P. Chaudhary, G. Kline, and W. McCloy, “The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study,” Journal of Intelligent Information Management, July, 2015.
D. Fiddner, “Cyberspace’s Strategic Domain’s
Implications for National Security,” Jagiellonian University
Conference 2015 Interdisciplinary Approaches To Security in the Changing World,
Krakow, Poland, June 18-20, 2015.
T. Fries, “Fuzzy Evolutionary Classification of TCP Packets
for Network Intrusion Detection,” Industrial Conference on Data Mining, New
York, NY, July 2013.
D. Fiddner, “Managing Cyberspace National
Security,” Peace Studies Society (PSS)-International Studies Association (ISA)
Joint Conference, Budapest, Hungary, June 27-29, 2013.
S. Ali and W. Farag, “How is Quantum Cryptography Used to Secure Financial Transactions?” in Proceedings of the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.
J. Gossett, “Cyberstalking” and “Cyberterrorism”
in the Encyclopedia of Criminal Justice Ethics. Thousand Oaks: Sage
D. Fiddner, “Strategy in the [Missile] Cyber Age,” British
International Studies Association (BISA) and the International Studies (ISA)
Joint International Conference in 2012, Edinburgh, UK, June 20-22, 2012.
J. Rodger, “Toward Reducing Failure Risk in an
Integrated Vehicle Health Maintenance System: A Fuzzy Multi-Sensor Data Fusion
Kalman Filter Approach for IVHMS” Expert Systems with Applications,” Elsevier
Vol. 39 (10), 9821-9836, 2012.
P. Pankaj, M. Hyde and J. A. Rodger, "P2P Business Applications: Future and Directions," Communications and Network, Vol. 4 No. 3, pp. 248-260, July, 2012.
Terrence P. Fries, “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,” Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.
Dominic Asamoah and William Oblitey, “The Use of Compression Methods for Data Security Assurance,” Proceedings of the 10th European Conference on Information Warfare and Security, pp. 6-11, Tallinn, Estonia, July 7-8, 2011.
Terrence P. Fries, “Evolutionary Optimization of a Fuzzy Rule-Based Network Intrusion Detection Systems,” North American Fuzzy Information Processing Society Annual Conference, Toronto, Canada, July 2010.
Azad Ali and Waleed Farag, “Introducing a Concentration in Information Assurance into a Computer Science Program,” in Journal of Issues in Information Systems, Volume X, No. 2, pp. 185-193, 2009.
Waleed Farag, “A Novel Design of Robust Video Steganographic System,” Proceedings of the International Workshop on Telecommunications, Sao Paulo, Brazil, pp. 98-102, Feb. 16-19, 2009.
David T. Smith, “Extracting, Streamlining, and Completing a Threat Assessment Methodology from Octave‑S®,” 5th Symposium on Risk Management and Cyber-Informatics (RMCI 2008) included as a Focus Symposium in the 12th World Multi-conference on Systemics, Cybernetics and Informatics (WMSCI 2008), Orlando FL, 2008.
W. Oblitey and D. T. Smith presented "The IUP Cyber Vigilance Project", Big Data and Cyber Security Workshop, West Virginia University, Morgantown, WV, December 15, 2015.
Waleed Farag presented "A Novel Approach to Involve Undergraduate Students in Multidisciplinary Research", 2015 Centers of Academic Excellence Community Meeting, California State University San Bernardino, San Diego, CA, November 2, 2015.
J. Gossett, M. Pollis, J. Coyne, S. Moser and K.
Stinedurf presented “Let’s Talk to Hackers: A Qualitative Study,” at ACJS Annual Meeting
- Academy of Criminal Justice Sciences in Orlando, FL, March 2015.
Waleed Farag presented “Lessons Learned from the
Long-term Offering of a Multidisciplinary IA Program” at the 2014 Centers of
Academic Excellence Community Meeting Sponsored by California State University
San Bernardino, Cyber Security Center and held in Columbia, Maryland on Monday
– November 4, 2014.
Kustim Wibowo presented “How to Protect Your Data Effectively from Mobile Access,” at the 37th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, October 23-24, 2014.
Sanwar Ali presented “How is Quantum Cryptography Used to Secure Financial Transactions?” at the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.
Kustim Wibowo presented “Security Issues in Private Use
Cloud Computing,” with Rasben Dantes, Ganesha Universty of Education, 36th NABET
(Northeastern Association of Business, Economics and Technology) Conference,
State College, PA, 17-18 October 2013.
Terrence Fries presented “Fuzzy Evolutionary Classification of TCP Packets for Network Intrusion Detection,” Industrial Conference on Data Mining, New York, NY, July 2013.
Kustim Wibowo presented “Cybersecurity Laws and Online Freedom Beyon SOPA and PIPA,” 35th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 25-26 October 2012.
Terrence Fries presented “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,” at the Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.
Dighton Fiddner presented “National Cyber Security Strategy against Malevolent Use of the Global Cyberspace,” at the 3rd World International Studies Committee (WISC) Conference: World Crisis? Revolution or Evolution in the International Community?, Porto, Portugal, August 2011.
Fiddner, D., Defining a Framework for Decision Making in Cyberspace, IBM Center for the Business of Government, 2015.
J. Glenn Brookshear and Dennis Brylow, with contributions by David T. Smith, Computer Science: An Overview, 12th Edition, Pearson, 2015.
Rodger, J. A. & George, J., “Mobile Speech and the Armed Services: Making a Case for Adding Siri-like features to VAMTA (Voice-Activated Medical Tracking Application).” In Amy Neuinstein and Judith Markowitz (Eds.), Mobile Speech and Natural Language Solutions. pp. 319-332, Springer, 2013.
J. Glenn Brookshear, with contributions by David T. Smith and Dennis Brylow, Computer Science: An Overview, 11th Edition, Addison Wesley, 2012.
George, James, Hall, Donald, and Rodger, James, Smart Data: Enterprise Performance Optimization Strategy, John Wiley & Sons, 2010.
Rodger, J. A. & George, J., “Hands Free: Adapting the Task-Technology-Fit Model and Smart Data to Validate End-User Acceptance of the Voice Activated Medical Tracking Application (VAMTA) in the United States Military.” In Amy Neustein, Ph.D. (Ed.), Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics. 101 Philip Drive, Norwell, MA 02061, pp. 275-303: Springer, 2010.
Phil Wagner, Surrounded by Crime: This I Know for the Internet Told Me So, Indiana University of Pennsylvania, May 2015.
Joshua Smallridge, Social Learning and Digital Piracy: Do Online Peers Matter?, Indiana University of Pennsylvania, May 2012.
Fraud, Waste, and Abuse Hotline
© 2007–17 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100