Skip to Content - Skip to Navigation

Grants

Dighton Fiddner, “Decision making Implications of Defining & Understanding Cyberspace”. Funded by IBM Center for the Business of Government, June 16, 2013: Awarded a $20,000 grant.

  • This grant was awarded in order to find some answers to the practical implications of accurately defining cyberspace and the consequences of such definition on how decision makers can manage risks and respond to Threats in Today’s Security Environment. 

William Oblitey, Rose Shumba, and Jennifer Gossett received a funding award in the amount of $231,000 (during academic year 2012–13) from the National Science Foundation CyberCorps: Scholarship for Service (SFS) award for their project, “The Cyber Catch Scholarship Program”.  The total funding for this project over a five-year period is anticipated to be $1,148,531.

  • This program provides qualified students with a scholarship to become a federal information assurance professional and address the growing need for protecting the government’s critical information infrastructures. The scholarship program supports one or two years of stipends, tuition, and allowances for undergraduate Information Assurance majors or minors at Indiana University of Pennsylvania.

Publications

Terrence P. Fries, “Fuzzy Evolutionary Classification of TCP Packets for Network Intrusion Detection” Industrial Conference on Data Mining, New York, NY, July 2013.

S. Ali and W. Farag, “How is Quantum Cryptography Used to Secure Financial Transactions?” in Proceedings of the Second International Conference on e-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.

P. Pankaj, M. Hyde and J. A. Rodger, "P2P Business Applications: Future and Directions," Communications and Network, Vol. 4 No. 3, pp. 248-260, July, 2012. 

Terrence P. Fries, “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,” Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.

Dominic Asamoah and William Oblitey, "The Use of Compression Methods for Data Security Assurance”, Proceedings of the 10th European Conference on Information Warfare and Security, pp. 6-11, Tallinn, Estonia, July 7-8, 2011.

Terrence P. Fries, “Evolutionary Optimization of a Fuzzy Rule-Based Network Intrusion Detection Systems,” North American Fuzzy Information Processing Society Annual Conference, Toronto, Canada, July 2010.

Azad Ali and Waleed Farag, “Introducing a Concentration in Information Assurance into a Computer Science Program,” in Journal of Issues in Information Systems, Volume X, No. 2, pp. 185-193, 2009.

Waleed Farag, “A Novel Design of Robust Video Steganographic System,” Proceedings of the International Workshop on Telecommunications, Sao Paulo, Brazil, pp. 98-102, Feb. 16-19, 2009.

David T. Smith, "Extracting, Streamlining, and Completing a Threat Assessment Methodology from Octave‑S®", 5th Symposium on Risk Management and Cyber-Informatics (RMCI 2008) included as a Focus Symposium in the 12th World Multi-conference on Systemics, Cybernetics and Informatics (WMSCI 2008), Orlando FL, 2008.

Presentations

Terrence Fries presented “Fuzzy Evolutionary Classification of TCP Packets for Network Intrusion Detection” Industrial Conference on Data Mining, New York, NY, July 2013.

Sanwar Ali presented “How is Quantum Cryptography Used to Secure Financial Transactions?” at the Second International Conference on e-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.

Kustim Wibowo presented “Security Issues in Private Use Cloud Computing” with Rasben Dantes, Ganesha Universty of Education, 36th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 17-18 October 2013.

Kustim Wibowo presented “Cybersecurity Laws and Online Freedom Beyon SOPA and PIPA”, 35th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 25-26 October 2012.

Terrence Fries presented “Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System,”  at the Conference on Systematics, Cybernetics and Informatics, Orlando, FL, July 2011.

Dighton Fiddner presented “National Cyber Security Strategy against Malevolent Use of the Global Cyberspace,” at 3rd World International Studies Committee (WISC) Conference: World Crisis? Revolution or Evolution in the International Community?, Porto, Portugal, August 2011.

Waleed Farag presented “Designing a Prototype Digital Video Steganographic System,” at the Eighth Annual Conference of Academy of Business and Information Technology (ABIT), Pittsburgh, May 1-3, p. 9, 2008.

Sanwar Ali presented “E-Mail Security and the Security Products,” in the Eighth Annual Conference of Academy of Business and Information Technology (ABIT), Pittsburgh, May 1-3, p. 2, 2008.

Waleed Farag presented “What Do You Need to Know about Multimedia Security?" in Proceedings of PACISE Conference, Kutztown, PA, April 4-5, p. 95, 2008.

Books and Book Chapters

Fiddner, D., Defining a Framework for Decision Making in Cyberspace, IBM Center for the Business of Government, 2015.

  • This research report presents a new contemporary characterization of Cyberspace which takes into account security and risk management with the purpose of enabling prompt and intelligent decision making. This research is one outcome of a multi-year, research project which involves several researchers from IUP, Carnegie Mellon University, University of Pittsburgh, Naval War College, RAND Corporation, and other security-based institutions.

J. Glenn Brookshear and Dennis Brylow, with contributions by David T. Smith, Computer Science: An Overview, 12th Edition, Pearson, 2015.

  • This book provides a breath first introduction to Computer Science. Included are chapters on Networking, Database Systems, and Operating Systems.  Security, Encryption, and Social Impact are specifically discussed on pages 148-150, 191-198, 436-438 and 553-557. Ethical, privacy, and security concerns are raised where applicable in the Social Issues section concluding each chapter.

Rodger, J. A. & George, J., Mobile Speech and the Armed Services: Making a Case for Adding Siri-like features to VAMTA (Voice-Activated Medical Tracking Application). In Amy Neuinstein and Judith Markowitz (Eds.), Mobile Speech and Natural Language Solutions. pp. 319-332, Springer, 2013.

  • This chapter addresses techniques to ensure the security of Military communication systems.

J. Glenn Brookshear, with contributions by David T. Smith and Dennis Brylow, Computer Science: An Overview, 11th Edition, Addison Wesley, 2012.

  • This book provides a breath first introduction to Computer Science. Included are chapters on Networking, Database Systems, and Operating Systems.  Security, Encryption, and Social Impact are specifically discussed on pages 130-132, 173-181, 416-418 and 536-538. Ethical, privacy, and security concerns are raised where applicable in the Social Issues section concluding each chapter.

George, James, Hall, Donald, and Rodger, James, Smart Data: Enterprise Performance Optimization Strategy, John Wiley & Sons, 2010.

  • Throughout this book the importance of the data security, interoperability and the correct use of metrics and algorithms is emphasized. The book also discusses how information operations can protect and defend information and information systems by ensuring confidentiality, integrity, availability, authentication and nonrepudiation. On pages 252-254, the book specifically discusses how a smart data paradigm would not be complete without consideration of security and information assurance. Topics such as the DoD Information Assurance Certification and Accreditation Process (DIACAP), and the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) are discussed.

Rodger, J. A. & George, J., “Hands Free”: Adapting the Task-Technology-Fit Model and Smart Data to Validate End-User Acceptance of the Voice Activated Medical Tracking Application (VAMTA) in the United States Military. In Amy Neustein, Ph.D. (Ed.),  Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics. 101 Philip Drive, Norwell, MA 02061, pp. 275-303: Springer, 2010

  • This chapter evaluates the perceived usefulness of the proposed VAMTA given the stringent security requirements for deployment in a military environment.

Dissertations

Phil Wagner, Surrounded by Crime:This I Know For the Internet Told Me So, Indiana University of Pennsylvania, May 2015.

Joshua Smallridge, Social Learningand Digital Piracy: Do Online Peers Matter?, Indiana University of Pennsylvania, May 2012.

  • Institute for Information Assurance
  • Stright Hall, Room 319
    210 South Tenth Street
    Indiana, PA 15705
  • Phone: 724-357-2524
  • Fax: 724-357-2724
  • Office Hours
  • Monday through Friday
  • 8:00 a.m. – 12:00 p.m.
  • 1:00 p.m. – 4:30 p.m.