Cyber Education and Research Center (CERC)

Research Opportunities

Cybersecurity

The Department of Computer Science and Engineering of Wright State University recently received a grant, titled "REU Site: Cybersecurity Research at Wright State University", from the National Science Foundation. This NSF REU site offers a ten-week summer program that aims at providing a diverse group of motivated undergraduates with competitive research experiences in cyber-security research. A variety of projects will be offered in Network Security, Intrusion Detection, Wireless Sensor Network Security, Internet Malware Detection, Analysis, and Mitigation, Software Reverse Engineering and Vulnerability Discovery, and Privacy-Preserving Data Mining. More information of this REU Site can be found at http://reu.cs.wright.edu.  

In addition there are two ongoing projects sponsored by DARPA and ONR for Deepfake techniques, Deep Understanding of Technical Documents, and Computer Security (like memory attacks).


Cyber-Physical Systems

Cyber-Physical Systems are jointly physical and computational and are characterized by complex loops of cause and effect between the computational and physical components. We focus on the creation of methods by which such systems can self-adapt to repair damage and exploit opportunities and methods by which we can explain and understand how they operate even after having diverged from their original forms. Our current application area the creation of control systems for insect-like flapping-wing air vehicles that repair themselves, in flight, after suffering wing damage.

Click here for more information about Cyber Physical Systems at Wright State University

Researchers

Research Labs


Research Publications

  • Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders. "Mission-Aware Vulnerability Assessment for Cyber-Physical Systems." in Proceedings of the 1st IEEE International Workshop on Trustworthy Software Systems (TrustSoft’15), Helsinki, Finland, 2015.
  • Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, and Xiaohong Guan, “Modeling Repeating Behaviors in Packet Arrivals: Detection and Measurement”, in Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM'15), HONG KONG, China, 2015. (R) 
  • Yu Li, Rui Dai, and Junjie Zhang, "Morphing Communications of Cyber-Physical Systems Towards Moving Target Defense", In Proceedings of the 2014 IEEE International Conference on Communications (ICC’14), Jun. 2014. (R) 
  • D. Doran and S. Gokhale. “Web Robot Detection Techniques: Overview and Limitations”, Data Mining and Knowledge Discovery, vol. 22, pp. 183-210, 2011
  • Sagar Sharma, Keke Chen, and Amit Sheth, "Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems" ", IEEE Internet Computing, accepted in 2017, online 2018
  • Keke Chen and Shumin Guo, “RASP-Boost: Practical Confidential Classifier Learning in the Cloud”, IEEE Transactions on Cloud Computing, 2015.
  • V. Muppavarapu and S. M. Chung, “Semantic-based Access Control for Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI),” International Journal of Grid and High Performance Computing, Vol. 6, No. 2, IGI Global, 2014, pp. 1–23. 
  • S. M. Park and S. M. Chung, “Privacy-Preserving Attribute-Based Access Control for Grid Computing,” International Journal of Grid and Utility Computing, Vol. 5, No. 4, Inderscience, 2014, pp. 286–296
  • Giovani Abuaitah*, Bin Wang, “A Taxonomy of Sensor Network Anomalies and Their Detection Approaches.” Technological Breakthroughs in Modern Wireless Sensor Applications. Edited by Kavian/Sharif, IGI Global 2015. (R)
  • Yue Dang*, Bin Wang, Ryan Brant*, Zhiping Zhang, Maha Alqallaf*, Zhiqiang Wu, “Anomaly Detection for Data Streams in Large-Scale Distributed Heterogeneous Computing Environments,” Proceedings of International Conference on Cyber Warfare and Security (ICCWS), 2017.

Conference

  • Nikhil George and Prabhaker Mateti, Keeping the Android User Aware of Past and Present Network Tra_c, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 7 pp. Sep 13 - 16, 2017, Manipal, Karnataka, India.
  • Karthik M. Rao, PS Aiyyappan, and Prabhaker Mateti, Adding Continuous Proactive Forensics to Android, 2nd International Conference on Applied Soft computing and Communication Networks (ACN 2017), Sep 13 - 16, 2017, Manipal, Karnataka, India

Take the Next Step

Finding the right college means finding the right fit. See all that the College of Engineering and Computer Science has to offer by visiting campus.