|Present||Professor, Nova Southeastern University ‐ College of Engineering and Computing|
Professional Service and Affiliations
|2016 - Present||CS Curriculum Chair, Department of Engineering and Computer Science, Nova Southeastern University||2007 - Present||NSU's Institutional Review Board, Nova Southeastern University||2005 - Present||Cybersecurity Curriculum Committee, Nova Southeastern University||2001 - 2013||University Internal Review Committee, Nova Southeastern University||2010 - 2010||GSCIS On-Campus Open Houses, Nova Southeastern University||2007 - 2007||GSCIS Booth, RSA Conference, San Francisco, CA, Nova Southeastern University||GSCIS/CEC PhD Admissions Committee for CISD, DCIS, and DIA programs, Nova Southeastern University||GSCIS/CEC Curriculum Review Committee, Nova Southeastern University||GSCIS/CEC Faculty Promotion/Contract Renew Review Committee, Nova Southeastern University|
|2005||Ph.D., Computer Science, Mississippi State University|
|2002||M.S., Computer Science, Mississippi State University|
|1999||M.E., Computer Science, Shandong University, Jinan, China|
|1994||B.E., Computer Engineering, Shandong University, Jinan, China|
(800) 986-2247 Ext. 22068
Empirical results of an experimental study on the role of password strength and cognitive load on employee productivity Online Journal of Applied Knowledge Management (2016)
The demand or information system authentication has significantly increased over the last decade. Research has shown that the majority of user authentications remain to be password - based,however,itiswelldocumentedthatpasswordshavesignificantlimitations.Toaddress this issue,companieshavebeenplacingincreasedrequirementsontheusertoensuretheir passwords are more complex and ...
Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks Computer and Information Science (2014)
Mobile ad hoc network (MANET) is vulnerable to numerous attacks due to its intrinsic characteristics such as the lack of fixed infrastructure, limited bandwidth and battery power, and dynamic topology. Recently, several unsupervised machine-learning detection ...
An Approach to Model Network Exploitations Using Exploitation Graphs Simulation (2006)
In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to ...
Books and Book Contributions (1)
Pre-Requirements Traceability Encyclopedia of Software Engineering (2002)
Covering all aspects of engineering for practitioners who design, write, or test computer programs, this updated edition explores all the issues and principles of software design and engineering. With terminology that adheres to the standard ...