Skip to main content
Indiana University of Pennsylvania
Cook Honors College Admissions
Virtual Campus Visits
Colleges and Departments
Cook Honors College
Internships and International Education
IT Support Center
Career and Professional Development Center
Centers and Institutes
Resources for Researchers
Undergraduate Research Office
Events and Activities
Dining, Housing, and Campus Life
Center for Health and Well-Being
Hawks Q&A Center
Center for Multicultural Student Leadership and Engagement
Returning to Campus and the Alumni House
Meet Our Alumni
Alumni and Friends News
IUP at a Glance
Campuses and Centers
Diversity, Equity, and Inclusion at IUP
Map, Directions, and Parking
Employment at IUP
News and Events
News and Events
Academic Restructuring Plans
COVID-19 Response Plan
Institute for Cyber Security
Programs of Study
Cyber Security Courses
Courses with Cybersecurity Components
IoT Anomaly Detection Research Project
DoD Cyber Scholarship Program
DoD Capacity Building Project
Cyber Catch Scholarship
Cyber Security Club
Cyber Security Day
Roundtable Discussions on National Cyber Security Issues
Cybersecurity Industry Advisory Board
About Cyber Security
Help Students Now
Research at the Institute for Cyber Security
Books and Book Chapters
Please visit the
ICS Grants website
for complete details on recently funded grants and projects.
G. Raja, S. Anbalagan, G. Vijayaraghavan, S. Theerthagiri, S. Suryanarayan, X.-W. Wu, "SP-CIDS: Secure and Private Collaborative IDS for VANETs," IEEE Transactions on Intelligent Transportation Systems (Special Issue on Deep Learning Models for Safe and Secure Intelligent Transportation Systems), to appear 2021.
A. Robbins, Waleed Farag, X-W Wu, P. Chaudhary, and S. Ezekiel, “Zigbee as a Candidate Standard for Use in Anomaly Detection in IoT LANs,” in the
Proceedings of the 2021 SPIE Defense + Commercial Sensing annual International Conference
, held April 11-14, 2021.
Laurent Njilla, Adam Lutz, Soundararajan Ezekiel, "Data Mining for Security on Cyber Physical Systems Using DCNNs, in SPIE Defense + Security, April 12-16, 2021, USA
X.-W. Wu, A. Jolfaei, “Securing the Internet of Everything Through Adaptive and Resource-Efficient Mechanisms," IEEE Internet of Things Magazine, Vol. 3, No. 4, pp. 16-19, December 2020.
S. Ezekiel, A. Ali Alshehri, L. Pearlstein, X.-W. Wu, A. Lutz, “IoT Anomaly Detection using Multivariate,” International Journal of Innovative Technology and Exploring Engineering, Vol.9, No.4, 2020, pp. 1662-1669.
T. Valentine, K. Ravindran, P. Chaudhary, S. Ezekiel, X.-W. Wu, “Mitigating Security Risk of IoT with A Blockchain-Based Solution,” Proceedings of the 2020 Annual IEEE Applied Imagery Pattern Recognition Workshop (AIPR 20200), virtual online conference, Oct 13-15, 2020.
P. Beelen, O. Geil, E. Martínez-Moro, and X.-W. Wu, “Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan,” Designs, Codes and Cryptography, 88(8), 1477-1478, 2020.
Kaliappa Ravindran, Pankaj Chaudhary, Timothy Valentine, Soundararajan Ezekiel, Xin-Wen Wu, "Mitigating Security Risk of IoT with A Blockchain-Based Solution," in AIPR 2020, Sponsored by IEEE, October 13-15, Washington DC.
Brennan, Dumm, Laurent Njilla, Adam Lutz, Soundararajan Ezekiel, "Analyzing Information Flow in the IoT Network for Threat Detection Using DCNN and Clustering Techniques," in AIPR 2020, Sponsored by IEEE, October 13-15, DC.
S. Ezekiel, L. Pearlstein, A. Alshehri, A. Lutz, J. Zaunegger, and Waleed Farag, “Investigate GAN and VAE to train DCNN,” in the
International Journal of Machine Learning and Computing
, vol. 9, no. 6, 774-781, 2019.
X. Wu, Waleed Farag, S. Ali, and S. Kulkarni, “An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices,” in the proceedings of
the IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
held at Columbia University, NY, pp. 0676-0682, Oct. 10-12, 2019.
A. Lutz, V. Sansing, Waleed Farag, and S. Ezekiel, "Malware Classification Using Fusion of Neural Networks", in
Proc. SPIE 11013, Disruptive Technologies in Information Sciences II
, 110130X, held in Baltimore, MD, April 14-18, 2019.
Soundararajan Ezekiel, Abdullah Ali Alshehri, Xin-Wen Wu, Larry Pearlstein, Adam Lutz, "Internet of Things Anomaly Detection using Multivariate Analysis," 3rd International conference on Interdisciplinary research on Computer Science, Psychology, and Education (ICICPE’ 2019), Phu Quoc, VN, December. 17 - 19, 2019.
Laruent Njilla, Larry Pearlstein, Xin-Wen Wu, Adam Lutz, Soundararajan Ezekiel, "Internet of Things Anomaly Detection using Machine Learning," AIPR 2019, Sponsored by IEEE, October 15-17, Washington DC.
David T. Smith and Azad Ali, “You’ve Been Hacked: A Technique for Raising Cyber Security Awareness,” Issues in Information Systems, Vol. 20, Issue 1, 2019.
G. Yang, X.-W. Wu, “A Distributed Secure Monitoring System based on Blockchain,” International Journal of Performability Engineering, Vol.14, No.10, pp.2393-2402, Oct. 2018.
Terrence P. Fries, “Classification of Network Traffic Using Fuzzy Clustering for Network Security,” Industrial Conference on Data Mining, New York, NY, July 2017.
Jolfaei, X.-W. Wu, V. Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes,” IEEE Transactions on Information Forensics and Security, Vol.11, No.2, pp.235-246, 2016.
Z. Liu, X.-W. Wu, “The full rank value function,” Designs, Codes and Cryptography, Vol.81, No.2, pp.297-315, 2016.
A. Jolfaei, X.-W. Wu, V. Muthukkumarasamy, “A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability,” IEEE Transactions on Information Forensics and Security, Vol.10, No.2, pp.409-422, 2015.
J. Rodger, G. Bhatt, P. Chaudhary, G. Kline, and W. McCloy, “The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study,” Journal of Intelligent Information Management, July, 2015.
D. Fiddner, “Cyberspace’s Strategic Domain’s Implications for National Security,” Jagiellonian University Conference 2015 Interdisciplinary Approaches To Security in the Changing World, Krakow, Poland, June 18-20, 2015.
An Evaluation of Cybersecurity Students’ Needs for Program Improvement
2020 Centers of Academic Excellence Community Meeting
held virtually, Nov. 19-20, 2020.
An Innovative and Successful Model to Promote Cybersecurity Education
2018 Centers of Academic Excellence Community Meeting
held in Miami, FL, Nov. 8-9, 2018.
An Interdisciplinary, Multifaceted Approach to Enhance Cybersecurity Education in Western Pennsylvania
2017 Centers of Academic Excellence Community Meeting
held in Dayton, OH on Nov. 9, 2017.
Fostering a Strong Cybersecurity Culture in High and Middle School Students and Teachers through a Holistic Multidisciplinary Approach
2016 Centers of Academic Excellence Community Meeting
held in Kansas City, MO on Thursday, November 3, 2016.
A Novel Approach to Involve Undergraduate Students in Multidisciplinary IA Research
at the 2015 Centers of Academic Excellence Community Meeting held in San Diego, California on Monday – November 2, 2015.
W. Oblitey and D. T. Smith presented "The IUP Cyber Vigilance Project", Big Data and Cyber Security Workshop, West Virginia University, Morgantown, WV, December 15, 2015.
J. Gossett, M. Pollis, J. Coyne, S. Moser and K. Stinedurf presented “Let’s Talk to Hackers: A Qualitative Study,” at ACJS Annual Meeting - Academy of Criminal Justice Sciences in Orlando, FL, March 2015.
Waleed Farag presented “Lessons Learned from the Long-term Offering of a Multidisciplinary IA Program” at the 2014 Centers of Academic Excellence Community Meeting Sponsored by California State University San Bernardino, Cyber Security Center and held in Columbia, Maryland on Monday – November 4, 2014.
Kustim Wibowo presented “How to Protect Your Data Effectively from Mobile Access,” at the 37th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, October 23-24, 2014.
Sanwar Ali presented “How is Quantum Cryptography Used to Secure Financial Transactions?” at the Second International Conference on E-Technologies and Networks for Development (ICeND 2013), Kuala Lumpur, Malaysia, March 4-6, 2013.
Kustim Wibowo presented “Security Issues in Private Use Cloud Computing,” with Rasben Dantes, Ganesha Universty of Education, 36th NABET (Northeastern Association of Business, Economics and Technology) Conference, State College, PA, 17-18 October 2013.
Books and Book Chapters
M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks, Springer, 2018.
R. Pellikaan, X.-W. Wu, S. Bulygin, and R. Jurrius, Codes, Cryptology and Curves with Computer Algebra, Cambridge University Press, Cambridge, UK, 2017 (600 pages).
Defining a Framework for Decision Making in Cyberspace
, IBM Center for the Business of Government, 2015.
This research report presents a new contemporary characterization of Cyberspace that takes into account security and risk management with the purpose of enabling prompt and intelligent decision making. This research is one outcome of a multi-year research project which involves several researchers from IUP, Carnegie Mellon University, University of Pittsburgh, Naval War College, RAND Corporation, and other security-based institutions.
Experimental Machine and Deep Learning Credit Card Fraud Detection
, Indiana University of Pennsylvania, 2021.
Surrounded by Crime: This I Know for the Internet Told Me So
, Indiana University of Pennsylvania, May 2015.
Institute for Cyber Security
Stright Hall, Room 233
210 South Tenth Street
Monday through Friday
8:00 a.m. – 12:00 p.m.
1:00 p.m. – 4:30 p.m.