Research at the Institute for Cyber Security

  • Grants

    Please visit the ICS Grants website for complete details on recently funded grants and projects.  

    Publications

    • G. Raja, S. Anbalagan, G. Vijayaraghavan, S. Theerthagiri, S. Suryanarayan, X.-W. Wu, "SP-CIDS: Secure and Private Collaborative IDS for VANETs," IEEE Transactions on Intelligent Transportation Systems (Special Issue on Deep Learning Models for Safe and Secure Intelligent Transportation Systems), to appear 2021.
    • A. Robbins, Waleed Farag, X-W Wu, P. Chaudhary, and S. Ezekiel, “Zigbee as a Candidate Standard for Use in Anomaly Detection in IoT LANs,” in the Proceedings of the 2021 SPIE Defense + Commercial Sensing annual International Conference, held April 11-14, 2021.
    • Laurent Njilla, Adam Lutz, Soundararajan Ezekiel, "Data Mining for Security on Cyber Physical Systems Using DCNNs, in SPIE Defense + Security, April 12-16, 2021, USA
    • X.-W. Wu, A. Jolfaei, “Securing the Internet of Everything Through Adaptive and Resource-Efficient Mechanisms," IEEE Internet of Things Magazine, Vol. 3, No. 4, pp. 16-19, December 2020.
    • S. Ezekiel, A. Ali Alshehri, L. Pearlstein, X.-W. Wu, A. Lutz, “IoT Anomaly Detection using Multivariate,” International Journal of Innovative Technology and Exploring Engineering, Vol.9, No.4, 2020, pp. 1662-1669.
    • T. Valentine, K. Ravindran, P. Chaudhary, S. Ezekiel, X.-W. Wu, “Mitigating Security Risk of IoT with A Blockchain-Based Solution,” Proceedings of the 2020 Annual IEEE Applied Imagery Pattern Recognition Workshop (AIPR 20200), virtual online conference, Oct 13-15, 2020.
    • P. Beelen, O. Geil, E. Martínez-Moro, and X.-W. Wu, “Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan,” Designs, Codes and Cryptography, 88(8), 1477-1478, 2020.
    • Kaliappa Ravindran, Pankaj Chaudhary, Timothy Valentine, Soundararajan Ezekiel, Xin-Wen Wu, "Mitigating Security Risk of IoT with A Blockchain-Based Solution," in AIPR 2020, Sponsored by IEEE, October 13-15, Washington DC.
    • Brennan, Dumm, Laurent Njilla, Adam Lutz, Soundararajan Ezekiel, "Analyzing Information Flow in the IoT Network for Threat Detection Using DCNN and Clustering Techniques," in AIPR 2020, Sponsored by IEEE, October 13-15, DC.
    • S. Ezekiel, L. Pearlstein, A. Alshehri, A. Lutz, J. Zaunegger, and Waleed Farag, “Investigate GAN and VAE to train DCNN,” in the International Journal of Machine Learning and Computing, vol. 9, no. 6, 774-781, 2019. DOI 10.18178/ijmlc.2019.9.6.872.
    • X. Wu, Waleed Farag, S. Ali, and S. Kulkarni, “An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices,” in the proceedings of the IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference  held at Columbia University, NY, pp. 0676-0682, Oct. 10-12, 2019.
    • A. Lutz, V. Sansing, Waleed Farag, and S. Ezekiel, "Malware Classification Using Fusion of Neural Networks", in Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130X, held in Baltimore, MD, April 14-18, 2019. https://doi.org/10.1117/12.2533344.
    • Soundararajan Ezekiel, Abdullah Ali Alshehri, Xin-Wen Wu, Larry Pearlstein, Adam Lutz, "Internet of Things Anomaly Detection using Multivariate Analysis," 3rd International conference on Interdisciplinary research on Computer Science, Psychology, and Education (ICICPE’ 2019), Phu Quoc, VN, December. 17 - 19, 2019.
    •  Laruent Njilla, Larry Pearlstein, Xin-Wen Wu, Adam Lutz, Soundararajan Ezekiel, "Internet of Things Anomaly Detection using Machine Learning," AIPR 2019, Sponsored by IEEE, October 15-17, Washington DC.
    • David T. Smith and Azad Ali, “You’ve Been Hacked: A Technique for Raising Cyber Security Awareness,”  Issues in Information Systems, Vol. 20, Issue 1, 2019.
    • G. Yang, X.-W. Wu, “A Distributed Secure Monitoring System based on Blockchain,” International Journal of Performability Engineering, Vol.14, No.10, pp.2393-2402, Oct. 2018.
    • Terrence P. Fries, “Classification of Network Traffic Using Fuzzy Clustering for Network Security,” Industrial Conference on Data Mining, New York, NY, July 2017.
    • Jolfaei, X.-W. Wu, V. Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes,” IEEE Transactions on Information Forensics and Security, Vol.11, No.2, pp.235-246, 2016.
    • Z. Liu, X.-W. Wu, “The full rank value function,” Designs, Codes and Cryptography, Vol.81, No.2, pp.297-315, 2016.
    • A. Jolfaei, X.-W. Wu, V. Muthukkumarasamy, “A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability,” IEEE Transactions on Information Forensics and Security, Vol.10, No.2, pp.409-422, 2015.
    • J. Rodger, G. Bhatt, P. Chaudhary, G. Kline, and W. McCloy, “The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study,” Journal of Intelligent Information Management, July, 2015.
    • D. Fiddner, “Cyberspace’s Strategic Domain’s Implications for National Security,” Jagiellonian University Conference 2015 Interdisciplinary Approaches To Security in the Changing World, Krakow, Poland, June 18-20, 2015.      

    Presentations

    • Waleed Farag,An Evaluation of Cybersecurity Students’ Needs for Program Improvement at the 2020 Centers of Academic Excellence Community Meeting held virtually, Nov. 19-20, 2020.
    • Waleed Farag, An Innovative and Successful Model to Promote Cybersecurity Education at the 2018 Centers of Academic Excellence Community Meeting held in Miami, FL, Nov. 8-9, 2018.
    • Waleed Farag,An Interdisciplinary, Multifaceted Approach to Enhance Cybersecurity Education in Western Pennsylvania at the 2017 Centers of Academic Excellence Community Meeting held in Dayton, OH on Nov. 9, 2017.
    • Waleed Farag,Fostering a Strong Cybersecurity Culture in High and Middle School Students and Teachers through a Holistic Multidisciplinary Approach at the 2016 Centers of Academic Excellence Community Meeting held in Kansas City, MO on Thursday, November 3, 2016.
    • Waleed Farag, A Novel Approach to Involve Undergraduate Students in Multidisciplinary IA Research at the 2015 Centers of Academic Excellence Community Meeting held in San Diego, California on Monday – November 2, 2015.
    • W. Oblitey and D. T. Smith presented "The IUP Cyber Vigilance Project", Big Data and Cyber Security Workshop, West Virginia University, Morgantown, WV, December 15, 2015.
    • J. Gossett, M. Pollis, J. Coyne, S. Moser and K. Stinedurf presented “Let’s Talk to Hackers: A Qualitative Study,” at ACJS Annual Meeting - Academy of Criminal Justice Sciences in Orlando, FL, March 2015. 
    • Waleed Farag presented “Lessons Learned from the Long-term Offering of a Multidisciplinary IA Program” at the 2014 Centers of Academic Excellence Community Meeting Sponsored by California State University San Bernardino, Cyber Security Center and held in Columbia, Maryland on Monday – November 4, 2014. 
    • Kustim Wibowo presented “How to Protect Your Data Effectively from Mobile Access,” at the 37th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, October 23-24, 2014.
    • Sanwar Ali presented “How is Quantum Cryptography Used to Secure Financial Transactions?” at the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.
    • Kustim Wibowo presented “Security Issues in Private Use Cloud Computing,” with Rasben Dantes, Ganesha Universty of Education, 36th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 17-18 October 2013. 

    Books and Book Chapters

    • M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks, Springer, 2018.
    • R. Pellikaan, X.-W. Wu, S. Bulygin, and R. Jurrius, Codes, Cryptology and Curves with Computer Algebra, Cambridge University Press, Cambridge, UK, 2017 (600 pages).
    • Fiddner, D., Defining a Framework for Decision Making in Cyberspace, IBM Center for the Business of Government, 2015.
      This research report presents a new contemporary characterization of Cyberspace that takes into account security and risk management with the purpose of enabling prompt and intelligent decision making. This research is one outcome of a multi-year research project which involves several researchers from IUP, Carnegie Mellon University, University of Pittsburgh, Naval War College, RAND Corporation, and other security-based institutions. 

    Dissertations

    • Marouane Balmakhtar, Experimental Machine and Deep Learning Credit Card Fraud Detection, Indiana University of Pennsylvania, 2021.
    • Phil Wagner, Surrounded by Crime: This I Know for the Internet Told Me So, Indiana University of Pennsylvania, May 2015.