Computer Science and Engineering

Cyber Education and Research Center (CERC)

DHS, NSA Logo with students on computers

On this page:

What is CERC

The center is the focal point for cybersecurity at Wright State University.

We provided several different services, which include:

  • program guidance and oversight
  • academic program information
  • partnering with local businesses
  • collaboration with other academic institutions
  • student internship and job opportunities
  • information about other cybersecurity related activities

Education Opportunities

Cyber Security (M.S) with Cyberdefense Concentration

Complete a program study that meets the NSA specifications and receive notation on your transcripts indicating you have completed this cyberdefense concentration.

Program of Study consists of the following:

6 required courses:

  • CEG 6420 Host Security
  • CEG 6422 Secure Computing Practices
  • CEG 6424 Security Attacks & Defenses
  • CEG 6426 Legal Aspects of Cybersecurity
  • CEG 6430 Cyber Network Security
  • CEG 6750 Information Security

1 elective course

9 credit hours of thesis 

NSA LogoDHS logoWright State University has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2025 for the Master of Science in Cyber Security with CyberDefense Concentration.




Cyber Security Certificate (Undergraduate)

Secure the work you do!

Cybersecurity is big business. You can enhance your skills with a certificate in cybersecurity analytics. You will understand security vulnerabilities, threats, attacks, and mitigation solutions for modern cyber networks. This understanding of cyber risk will give you the valuable knowledge employers are looking for from their employees.

The certificate is available for both computer science and computer engineering majors. It will not add any time to your program, as the technical electives required for your degree count for the certificate.

Information Technology and Cybersecurity (B.S.)

Interested in working in a job that is in high demand, challenging, tech-focused, and pays well?

This degree will give you the technical foundation to understand cyberspace and manage security related risks. When you have completed your degree, you will have a detailed understanding of:

  • Security vulnerabilities
  • Threats and attacks
  • Mitigation solutions for modern cyber networks
  • Network infrastructure and how to protect it

Cyber Security Certificate (Graduate)

The Certificate in Cybersecurity Analytics contains the four core courses of our Master of Science in Cybersecurity degree. We offer a flexible learning environment with both online and in class courses. You can use this certificate to enhance your current skills or start on the journey to a master’s degree in cybersecurity. We will provide you with the technical foundation needed to understand the major risks associated with cyberspace, and how to begin mitigating those risks.

Complete this certificate online or on campus.

Cyber Security (M.S.)

Develop skills to identify and resolve cyber security threats.

Complete this degree online or on campus.

We give you the flexibility to work this degree into your schedule. You will develop the knowledge and skills applicable to protecting computer systems and networks.

A unique blend of faculty who balance theory, practice, hardware, and software in their courses is available to you. The on-campus courses take place in well-equipped computer engineering laboratory facilities. Our state-of-the-art Virtual Cyber Security Lab (VCSL) allows you to work in a safe environment while practicing what you learn.

Research Opportunities


The Department of Computer Science and Engineering of Wright State University recently received a grant, titled "REU Site: Cybersecurity Research at Wright State University", from the National Science Foundation. This NSF REU site offers a ten-week summer program that aims at providing a diverse group of motivated undergraduates with competitive research experiences in cyber-security research. A variety of projects will be offered in Network Security, Intrusion Detection, Wireless Sensor Network Security, Internet Malware Detection, Analysis, and Mitigation, Software Reverse Engineering and Vulnerability Discovery, and Privacy-Preserving Data Mining. More information of this REU Site can be found at  

In addition there are two ongoing projects sponsored by DARPA and ONR for Deepfake techniques, Deep Understanding of Technical Documents, and Computer Security (like memory attacks).

Cyber-Physical Systems

Cyber-Physical Systems are jointly physical and computational and are characterized by complex loops of cause and effect between the computational and physical components. We focus on the creation of methods by which such systems can self-adapt to repair damage and exploit opportunities and methods by which we can explain and understand how they operate even after having diverged from their original forms. Our current application area the creation of control systems for insect-like flapping-wing air vehicles that repair themselves, in flight, after suffering wing damage.

Click here for more information about Cyber Physical Systems at Wright State University


Research Labs

Research Grants

Junjie Zhang, Ph.D.:

  • Detecting and Analyzing Security Vulnerabilities for the Unmanned Systems Autonomy Services Architecture  AFRL/WBI, $90,620, 2017
  • Vulnerability Detection for Cyber-Physical Systems CSR/NSF, $50,00, 2016 – 2017
  • Automatically Detecting and Analyzing Cyber-Physical System Vulnerabilities and Attack Paths  Ball Aerospace & Technologies Corp., $80,000, 2013 - 2015

Derek Doran, Ph.D.:

  • CRII: CSR: Towards Understanding and Mitigating the Impact of Web Robot Traffic on Web Systems National Science Foundation, $174,319, 2015 – 2017
  • A Flexible Analytic Framework for Aviation Security Screening Checkpoint Performance Transportation Research Board of the National Academy of Sciences, $10,000, 2012 – 2013

Bin Wang, Ph.D.:

  • “Software Defined Secure Ad Hoc Wireless Networks,” KFAS, Kuwait Foundation for the Advancement of Sciences, $30,00, 201 - 2016
  • “Distributed Real-time Decision Support based on Secure Semantic Layered Sensing,” AFOSR Senior Research Fellowship, Grant No. F49620-02-C-0015, Air Force Office of Scientific Research, $71,600, 2008 - 2009

Research Publications

  • Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders. "Mission-Aware Vulnerability Assessment for Cyber-Physical Systems." in Proceedings of the 1st IEEE International Workshop on Trustworthy Software Systems (TrustSoft’15), Helsinki, Finland, 2015.
  • Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, and Xiaohong Guan, “Modeling Repeating Behaviors in Packet Arrivals: Detection and Measurement”, in Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM'15), HONG KONG, China, 2015. (R) 
  • Yu Li, Rui Dai, and Junjie Zhang, "Morphing Communications of Cyber-Physical Systems Towards Moving Target Defense", In Proceedings of the 2014 IEEE International Conference on Communications (ICC’14), Jun. 2014. (R) 
  • D. Doran and S. Gokhale. “Web Robot Detection Techniques: Overview and Limitations”, Data Mining and Knowledge Discovery, vol. 22, pp. 183-210, 2011
  • Sagar Sharma, Keke Chen, and Amit Sheth, "Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems" ", IEEE Internet Computing, accepted in 2017, online 2018
  • Keke Chen and Shumin Guo, “RASP-Boost: Practical Confidential Classifier Learning in the Cloud”, IEEE Transactions on Cloud Computing, 2015.
  • V. Muppavarapu and S. M. Chung, “Semantic-based Access Control for Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI),” International Journal of Grid and High Performance Computing, Vol. 6, No. 2, IGI Global, 2014, pp. 1–23. 
  • S. M. Park and S. M. Chung, “Privacy-Preserving Attribute-Based Access Control for Grid Computing,” International Journal of Grid and Utility Computing, Vol. 5, No. 4, Inderscience, 2014, pp. 286–296
  • Giovani Abuaitah*, Bin Wang, “A Taxonomy of Sensor Network Anomalies and Their Detection Approaches.” Technological Breakthroughs in Modern Wireless Sensor Applications. Edited by Kavian/Sharif, IGI Global 2015. (R)
  • Yue Dang*, Bin Wang, Ryan Brant*, Zhiping Zhang, Maha Alqallaf*, Zhiqiang Wu, “Anomaly Detection for Data Streams in Large-Scale Distributed Heterogeneous Computing Environments,” Proceedings of International Conference on Cyber Warfare and Security (ICCWS), 2017.


  • Nikhil George and Prabhaker Mateti, Keeping the Android User Aware of Past and Present Network Tra_c, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 7 pp. Sep 13 - 16, 2017, Manipal, Karnataka, India.
  • Karthik M. Rao, PS Aiyyappan, and Prabhaker Mateti, Adding Continuous Proactive Forensics to Android, 2nd International Conference on Applied Soft computing and Communication Networks (ACN 2017), Sep 13 - 16, 2017, Manipal, Karnataka, India

Faculty and Staff

John Gallagher

Meilin Liu

Yong Pei

Vance Saunders

Junjie Zhang

Matthew Kijowski

Cybersecurity News

Collaboration Opportunities


  • CaTS—Security and IT Security Resources

CyberSecurity Club

The Wright State University Cybersecurity Club is dedicated to teaching, learning, sharing, and researching information and methods to protect and secure data, systems, and networks. We are a group of people who share a passion for software and hardware security. This club is mainly aimed at computer science and engineering majors, but anyone interested is welcomed to join.

Contact: Lisa Morriss
Faculty Advisor: Mathew Kijowski

Cyber Raider Competition

This competition introduces cybersecurity and cybersecurity competitions to everyone. We host two competitions each year during Fall and Spring Semesters. Our cybersecurity club members provide mentoring and help to each team.

Fall Semester
  • High school students
  • College students
Spring Semester
  • High school students
  • College students
  • employees of local commercial and defense businesses

Boonshoft School of Medicine, Health Care & Homeland Security


Careers and Internships

  • Brandeberry Career Development Center

External Advisory Board

  • Brian Beebe, Leidos
  • Dr. Praveen Chawla, Edaptive Computing, Inc.
  • Carl Fisher, Ball Aerospace & Technologies Corp.
  • Dr. Nella Ludlow, Washington State University
  • Paul Moorman, Retired
  • Woodrow Willis, Altamira Technologies Corp

Take the Next Step

Finding the right college means finding the right fit. See all that the College of Engineering and Computer Science has to offer by visiting campus.