Curriculum Vitae

Dr. Robert F. Erbacher, Sc.D.

3337 Hampton Point Drive, #E
Silver Spring, MD 20904

 

Cell: 435-757-3231

E-Mail: Robert.Erbacher@gmail.com

https://sites.google.com/site/roberterbacher

  

Citizenship: USA

Security Clearance: Secret

 

Curriculum Vitae

 

 

 

 

Research Interests: cyber analytics, network security, usable security, digital forensics, situational awareness, computer security, information assurance, intrusion detection, visualization, cyber-terrorism, and cyber command and control.

 

 

 

 

 

Professional Preparation:

 

 

University of Massachusetts at Lowell, Computer Science Department, Lowell, MA

 

 

·   Doctor of Science in Computer Science. Conferred June ‘98
Dissertation: Visual Assistance for Concurrent Processing
Advisor: Dr. Georges G. Grinstein, Ph.D.

9/93-6/98

 

·   Master of Science in Computer Science

9/91-6/93

 

University of Lowell, Computer Science Department, Lowell, MA

 

 

·   Bachelor of Science in Computer Science. Minor in Mathematics

9/88-6/91

 

 

 

 

Professional Experience:

 

 

ITC-Brazil

 

 

·   Associate Director
Joint Position with ARO

4/16-Present

 

Army Research Office

 

 

·   Program Manager (DB IV)
S&T Outreach Program Manager to South America on Advanced Computing
RFEC Americas Engagement and Outreach (South America) on Advanced Computing
Army Liaison on Research to Brazil

4/16-Present

 

 

 

Army Research Laboratory

 

 

·   Computer Scientist (DB IV)
Review of the Chilean Cybersecurity Research Program
COR, AR&EP Contract (Cyber CRA Industrial Partner), cap of $48.5M
COR, Phase II SBIR, “Novel Detection Mechanisms for Advanced Persistent Threat,” $1M 
Project Lead, Cognitive Foundations of Cyber Analysis
Project Lead, Tactical Cyber Defense
Task Lead, Cognitive Foundations of Cyber Analysts, ARL Internal Mission Funds               
COR, Phase I SBIR, “Novel Detection Mechanisms for Advanced Persistent Threat”

10/13-4/16

10/2015

08/14-12/15

2/14-12/15

10/14/-09/15

06/14-09/14

10/13-09/14

09/12-12/13

 

·   Computer Scientist (DB III)|
Cooperative Agreement Manager: Science of Cyber Security Cooperative Agreement
Project Lead, Advanced Intrusion Detection, ARL Internal Mission Funds                
Technical Lead, Adversarial Dynamics, ARL Internal Directorate Funds (DSI)
                    Final Report, Final Presentation
Project Lead, Science of Intrusion Detection, ARL Internal Mission Funds               

5/11-9/13

9/11-3/14

10/12-09/13

10/11-09/13

04/2014

10/11-09/12

 

·   Security clearance granted: Secret

8/11-Present

 

·   Acting Branch Chief (Tactical Network Assurance Branch)

5/13-10/13

 

Northwest Security Institute (NWSI)

 

 

·   Senior Principal Scientist

7/10-5/11

 

Utah State University - Logan, UT

Computer Science Department

 

 

·   Assistant Professor

8/03-6/10

 

University at Albany - SUNY, Albany, NY

Computer Science Department

 

 

·   Assistant Professor

9/99-7/03

 

University of Idaho, Moscow, ID

Computer Science Department

 

 

·   Visiting Assistant Professor

8/98-7/99

 

University of Massachusetts at Lowell, Lowell, MA

Institute for Visualization and Perception Research



 

·   Research Assistant

9/90-8/98

 

University of Massachusetts at Lowell, Lowell, MA

Continuing Studies and Corporate Education

 

 

·   Adjunct Faculty

1/96-5/98

 

SpaceTec IMC Corporation, Lowell, MA

 

 

·   Software Engineer

6/97-9/97

 

The MITRE Corporation, Bedford, MA

 

 

·   Software Engineer

5/94-5/97

 

University of Massachusetts at Lowell, Lowell, MA

Computer Science Department

 

 

·   Teaching Assistant

9/91-5/93

 

 

 

 

Honors and Awards:

 

 

·   Best Paper Award, “Ontology-based Adaptive Systems of Cyber Defense,” 2015 Semantic Technology for Intelligence, Defense, and Security (STIDS), Fairfax, VA.

11/15

 

·   Department of the Army, Certification of Achievement

4/15

 

·   Best Paper Award, “Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness,” SPIE ‘2010 Conference on Visualization and Data Analysis, Santa Clara, CA.

1/10

 

·   Long Service Award, IS&T/SPIE Conference on Visualization and Data Analysis

1/08

 

·   Best Paper Award, “Identification and Localization of Data Types within Large-Scale File Systems,” Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA

4/07

 

·   Best Paper Award Nomination, “Foundations of Visual Forensic Analysis,” Information Assurance Workshop, West Point, NY.

6/06

 

·   AFRL Summer Faculty Fellowship Program, externally reviewed by ASEE (External, $21,806), 80% rejection rate

5/06-7/06

 

·   Best Paper Award Nomination, “A Visualization Paradigm for Network Intrusion Detection,” Information Assurance Workshop, West Point, NY.

6/05

 

·   AFRL Summer Faculty Fellowship Program, externally reviewed by ASEE (External, $21,806), 80% rejection rate, A+ rating. Highest rated project at AFRL-Rome Labs.

5/05-7/05

 

·   2004 AFRL Visiting Faculty Research Program Extension Grant (External, $10,000)

8/04-12/04

 

·   AFRL Visiting Faculty Research Program (External, $21,806)

5/04-7/04

 

·   Outstanding Contributions Award as Applications Co-Chair, IEEE Visualization

10/03

 

·   2001 International Multi-Conference Achievement Award

6/01

 

·   Award for outstanding contributions to Computer Graphics by an Undergraduate

5/91

 

·   Award for outstanding service and research to the Computer Science Department by an Undergraduate

5/91

 

 

 

 

Funding (Dr. Erbacher as PI):

 

 

·   Awarded CISD directorate competitive research funding

·   Continuation Funding: Novel integration Strategies for Google Maps, Funded by IntelliVis (External, $3,300)

FY16

1/09-4/09

 

·   Darpa Seed Grant: Network Visualization Seedling, Funded by Darpa through  IntelliVis (External, $50,000)

5/08-3/09

 

·   Exchange Transport Agent, Funded by Xapio (External, $1633);

11/08-12/108

 

·   Continuation Funding: Extending VisAlert with automated topology generation and java appletization, Funded by IntelliVis (External, $5,000)

8/08-12/08

 

·   Develop a java based interactive infostrip visualization, Funded by Medivis through IntelliVis (External, $4,000)

4/08-6/08

 

·   Continuation Funding: Extending VisAlert with java appletization, Funded by IntelliVis (External, $5,000)

1/08-5/08

 

·   Continuation Funding: Novel Interface Development for XAPIO, Funded by Xapio (External, $7529)

9/07-12/07

 

·   Visual Situational Awareness for Vulnerability and Impact Assessment, Funded by AFRL-Rome Labs (ExternalSolo PI, $144,500)

5/07-4/08

 

·   Novel Interface Development for XAPIO, Funded by Xapio (External, $15,000)

5/07-9/07

 

·   Extending VisAlert with Novel GUI and Database Functionality, Funded by IntelliVis (External, $12,500)

1/07-5/07

 

·   A Java Implementation of VisAlert, Funded by IntelliVis (External, $12,500)

9/06-12/06

 

·   A Laboratory for Security, Distributed Systems, and Data Mining, PI: Supratik Mukhopadhyay, CoPIs: Stephen Clyde, Robert Erbacher, SeungJin Lim, Chad Mano. Innovation Fund Grant. (Internal, $50,000)

12/06

 

·   Student programming for support of research and development of the VisAware project, Funded by DARPA through IntelliVis (External, $12,500)

1/06-6/06

 

·   2005 AFRL Visiting Faculty Fellowship Program Extension Grant funded Through SUNYIT (External, $10,000)

9/05-12/05

 

·   Statistical Methods for Computational Biology. PI: Adele Cutler (Internal, $30,000)

7/04-6/05

 

·   New Faculty Research Grant (Internal, $15,000)

5/04-4/05

 

·   Acquired donation of an NVIDIA FX3000 graphics board from NVIDIA (External, MSRP: $2,500)

9/03

 

·   “The Information Security Academy: A Partnership Model for Building Public Sector Capacity”, funded by Dept. of Education (FIPSE), PI: Bloniarz; Investigators: Bangert-Drowns, Berg, Erbacher, Gangolly, Gironda, Goel; Partners: Hurbanek (NY State Police), Iwan (NY State Office of Technology). (External, $490K)

9/02-8/05

 

·   “High Performance Network Connections for Science and Engineering Research - HPNC: University at Albany-SUNY Connection to vBNS and Abilene via NYSERNet,” funded by NSF,PI’s: Delia, Lance; Investigators: Bloniarz, Bosart, Chang, Dawes, Erbacher, Keyser, Knight, Molinari, Mullin, Wang. (External, $150K)

9/01-8/03

 

·   Acquired donation of two used  high end SGI workstations from RayTech Systems of Latham, NY (External)

1/03

 

·   Category A Faculty Research Award Program 2000 — 2001 Award, funded by University at Albany-SUNY. (Internal, $7,500)

5/00

 

 

 

 

Travel Grants:

 

 

·   Waived Registration Fee, VizSec 2011, Pittsburgh, PA. (External, $300)

07/11

 

·   Travel Grant to attend the Digital Forensics Research Workshop at PNNL, funded by PNNL (External, $1,500)

09/09

 

·   Travel Grant to Present an invited talk at the ARO Workshop on Digital Forensics, funded by Strategic Analysis (External, $1200)

09/09

 

·   Travel Grant to attend PNNL’s VAC Consortium Meeting, funded by PNNL (External, $1,000)

08/09

 

·   Travel Grant to Present Two Invited Talks at PNNL and attend UW-PNNL Cyber Analytics Workshop, funded by PNNL (External, $2,200)

9/08

 

·   Travel Grant to Attend the Second DOE Open Workshop on Cyber-Security Research and Development 2008, Funded by Darpa through Intellivis (External, $1,444).

6/08

 

·   Travel Grant to Attend IEEE Security and Privacy Symposium 2008, Funded by Darpa through Intellivis (External, $2,276).

5/08

 

·   Travel Grant to Attend the COI Workshop on Security in Large-Scale Computing. Funded by PNNL (External, $2,000)

8/05

 

·   Travel Grant to Attend the ARDA IA Workshop, Funded by University of Utah. (External, $1,500)

6/04

 

·   Travel Grant to Attend IEEE Visualization 2002, Funded by University at Albany-SUNY. (Internal, $800)

12/02

 

·   Travel Grant to attend the 2002 Computer Forensics Workshop, funded by University of Idaho. (External, $1,000)

9/02

 

 

 

 

Licenses and Invention Notification Forms:

 

 

·   Software License for “AdviseAid” to Intellivis

6/08-Present

 

·   “Generalized visualization design for immediate situational awareness assessment with applications to impact of cyber events,” invention notification.

10/2008

 

·   “Trilogy: Detailed situational awareness visualization technique for the integration of ground truth data, impact assessment data, and network topologies,” invention notification.

10/2008

 

 

 

 

 

Consulting (Technology Transfer and Commercialization):

 

 

·   Intellivis - Advising the development of visualization techniques for situational awareness.

2005-2011

 

·   Xapio - Advising the integration of DRM capabilities into a novel document management and distribution system.

2006-2011

 

 

 

 

Professional Memberships:

 

 

·   IEEE Communications Society Technical Committee on Communications and Information Security

2013-Present

 

·   IEEE Communications Society

2013-Present

 

·   IEEE Systems, Man, and Cybernetics Society Membership

2013-Present

 

·   Association for Computing Machinery (ACM)

1994-Present

 

·   IEEE and the IEEE Computer Society

1994-Present

 

·   IEEE Computer Society Technical Committee on Visualization and Graphics (TCVG)

1999-Present

 

·   ACM SIGKDD (Special Interest Group on Knowledge Discovery and Data Mining)

1999-Present

 

·   IEEE Computer Society Technical Committee on Security and Privacy

2002-Present

 

·   ACM SIGGRAPH (Special Interest Group on Computer Graphics)

1994-2006

 

·   IASTED

2001-2004

 

·   IASTED Technical Committee on “Computer Vision”

2001-2004

 

·   Member, University at Albany-SUNY’s Center for Comparative Functional Genomics

2000-2003

 

·   ACM SIGARCH (Special Interest Group on Computer Architecture)

1996-2003

 

 

 


 


Publications (graduate studentsundergraduate students):

Journal Publications:

·   Robert F. Erbacher and Steve Hutchinson, “Case-Based Reasoning Extensions for Network Alert Reporting,”International Journal of Advancements in Computing Technology (IJACT), Vol. 8, No. 2, March 2016, pp. 88-107.

·   Zhijiang ChenLinqiang GeGuobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, and Nnanna Ekedebe, “A threat monitoring system in enterprise networks with smart mobiles,” Int. J. Security and Networks, Vol. 11, Nos. 1/2, 2016, pp.66–81.

·   Robert F. Erbacher, Rian ShelleySteena Monteiro, “GULv3—A Novel Tool for Network Managers to Audit Networks,” ISCA International Journal of Computers and Their Applications (IJCA), Vol. 19, No. 1, March 2012, pp. 26-39.

·   Robert F. Erbacher, Anupama BiswasTrent Cameron, “Novel Data Reduction Techniques in Large-Scale Network Infrastructures through Impact and Vulnerability Assessment,” International Journal of Advancements in Computing Technology (IJACT), Vol. 4, No. 1, March 2012, pp. 32-48.

·   Robert F. Erbacher, Deborah A. Frincke, Sarah J. Moody, Glenn Fink, “A Multi-Phase Network Situational Awareness Cognitive Task Analysis,” Information Visualization Journal, Vol. 9, No. 3, September 2010, pp. 204-219.

·   Robert F. Erbacher and Karen A. Forcht, “Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data,” Journal of Computer Information Systems, Vol. 50, No. 4, Summer 2010, pp. 117-126.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” ACM SIGOPS Operating Systems Review, Vol. 42, No. 3, 2008, pp. 41-50.

·   Richard Swart and Robert F. Erbacher, “Educating Students to Create Trustworthy Computer and Information Systems,” IEEE Security & Privacy, Vol. 5, No. 3, May/June 2007, pp. 58-61.

·   Stefano Foresti, James Agutter, Yarden Livnat, Robert Erbacher, and Shaun Moon, “Visual Correlation of Network Alerts,” Computer Graphics and Applications, Vol. 26, No. 2, March/April 2006, pp. 48-59.

·   Sheldon Teerlink and Robert F. Erbacher, “Improving the Computer Forensic Analysis Process through Visualization,” Communications of the ACM, Vol. 49, No. 2, 2006, pp. 71-75.

·   Alec Yasinsac, Robert Erbacher, Donald G. Marks, Mark M. Pollitt, and Peter Sommer, “Computer Forensics Education,” IEEE Security and Privacy, Vol. 1, No. 4, 2003, pp. 15-23.

·   Matthew J. Pastizzo, Robert F. Erbacher, and Laurie B. Feldman, “Multi-Dimensional Data Visualization,”Behavior Research Methods, Instruments, and Computers, Vol. 34, No. 2, 2002, pp. 158-162.

·   Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” Computer Graphics and Applications, Vol. 22, No. 1, January/February 2002, pp. 38-48.

·   Robert F. Erbacher and Alex Pang, “Special Section on Visualization and Data Analysis,” Guest Editorial: Journal of Electronic Imaging, Vol. 9, No. 4, October 2000, pp. 354-355.

·   Robert F. Erbacher and Georges G. Grinstein, “Visual Data Exploration and Analysis II,” Editorial: IEEEComputational Science & Engineering, Summer 1995, pp. 85.

·   Robert F. Erbacher, Georges G. Grinstein, John Peter Lee, Haim Levkowitz, Lisa Masterman, Ron Pickett, and Stuart Smith, “Exploratory Visualization Research at the University of Massachusetts at Lowell,” Computers & Graphics, Vol. 19, No. 1, 1995, pp. 131-139.

                                    

Book Chapters:

·   Sabrina De Capitani di Vinnercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanno Livraga, and Pierangela Samarati,” Encryption and fragmentation for data confidentiality in the cloud,” Springer Foundations of Security Analysis and Design VII, December 2014, pp. 212-243.

·   John Yen, Robert Erbacher, Cheng Zhong, and Peng Liu, “Cognitive Process,” Springer Cyber Defense and Situational Awareness, December 2014, pp. 119-144.

·   Massimiliano Albanese, Robert Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperl`ı, and V. S. Subrahmanian, “Recognizing Unexplained Behavior in Network Intrusions,”Springer Network Science and Cybersecurity: Advances in Information Security, January 2014, pp. 39-62.

·   Alexander Kott, Cliff Wang, Robert F. Erbacher, “Preview,” Cyber Defense and Situational Awareness, Springer 2014, pp. 1-5.

·   Alexander Kott, Cliff Wang, Robert F. Erbacher, “Concluding Thoughts,” Cyber Defense and Situational Awareness, Springer 2014, pp. 323-328.

 

Refereed Full Conference and Workshop Papers (Presenter Noted with *):

·   Chen Zhong, John Yen, Peng Liu, and Robert F. Erbacher. “Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process.” In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 357-363. IEEE, 2016.

·   Maggie X. Cheng*, Quanmin Ye, Xiaochun Cheng, Robert F. Erbacher, “Network coding and coding-aware scheduling for multicast in wireless networks,” Proceedings of the IEEE International Conference on Communications (ICC), London, UK, June 2015, pp. 5703-5708.

·   Noam Ben-Asher*, Alessandro Oltramari, Robert F. Erbacher, Cleotilde Gonzalez, “Ontology-based Adaptive Systems of Cyber Defense,” Proceedings of the Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS), Fairfax, VA, November 2015, pp. 34-41.

·   Chen Zhong*, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau “An Integrated Computer-Aided Cognitive Task Analysis Method for Tracing Cyber-Attack Analysis Processes,” Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS). ACM, New York, NY, USA, 2015, pp. 9-19.

·   Chen Zhong*, John Yen, Peng Liu, Robert Erbacher, Renee Etoty, and Chris Garneau, “ARSCA: A Computer Tool for Tracing the Cognitive Processes of Cyber-Attack Analysis,” Proceedings of the Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2015 IEEE International Inter-Disciplinary Conference on, 9-12 March 2015, pp.165-171.

·   Sulabh Bhattarai*, Sixiao WeiStephen Rook, Wei Yu, Robert F. Erbacher, and Hasan Cam, “On Simulation Studies of Jamming Threats Against LTE Networks,” Proceedings of the IEEE International Conference on Computing, Networking, and Communications, February 2015, Anaheim, CA, pp. 99-103.

·   Steve Hutchinson*, John Wittkamper, Jovina Allen, and Robert F. Erbacher, “cnetmon: A Curses-Based Network Interface Activity Monitor,” Proceedings of the International Conference on Software Engineering Research and Practice (SERP), July 2015, p. 157-163.

·   Steve Hutchinson* and Robert F. Erbacher, “ASN reputation system model,” Proc. SPIE 9458, Proceedings of Cyber Sensing 2015, 94580A, May 14, 2015.

·   Jun Xu*Pinyao GuoMingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu, “Comparing Different Moving Target Defense Techniques” Proceedings of the ACM Moving Target Defense Conference, Scottsdale, Arizona, November 2014, pp. 97-107.

·   Chu Huang*, Sencun Zhu, Robert F. Erbacher, “Toward Software Diversity in Heterogeneous Networked Systems,” Proceedings of the IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Vienna, Austria, July 2014, pp. 114-129.

·   Nirupama Talele*, Jason Teutsch, Robert Erbacher, and Trent Jaeger, “Monitor Placement for Large-Scale Systems,” Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT),London, ON, Canada, June 2014, pp. 29-40.

·   Chen Zhong*, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve Hutchinson, Renee Etoty, Hasan Cam, and William Glodek, “RankAOH: Context-driven Similarity-based Retrieval of Experiences in Cyber Analysis,” Proceedings of the IEEE Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Antonio, TX, March 2014, pp.230,236.

·   Maggie Cheng*, Quanmin Ye, Robert F. Erbacher, “Characterization and Visualization of Sophisticated Scanning Attacks,” Proceedings of the IEEE Communications and Information Systems Security Symposium, June 2013, pp. 2047-2051.

·   Nirupama Talele*, Jason Teutsch, Trent Jaeger, and Robert F. Erbacher, “Using Security Policies to Automate Monitor Placement,” Proceedings of the IEEE Conference on Engineering Secure Software and Systems (ESSOS), Paris, France, February 2013, pp. 17-32.

·   Maggie Cheng*, Quanmin Ye, Robert F. Erbacher, “Visualizing Graph Features for Scanning Attack Detection,” Proceedings of CSIIRW, Oak Ridge, TN, January 2013.

·   Maggie Cheng*, Mariesa Crow, Robert F. Erbacher, “Vulnerability Analysis of a Smart Grid with Monitoring and Control System,” Proceedings of CSIIRW, Oak Ridge, TN, January 2013.

·   Robert F. Erbacher and Steve Hutchinson*, “Extending Case-Based Reasoning to Automated Alert Assessment,” Proceedings of the ASE International Conference on Cyber Security, Washington, DC, December 2012.

·   Robert F. Erbacher*, “Visualization Design for Immediate High-Level Situational Assessment,” Proceedings of the IEEE Workshop on Visualization for Computer Security, Seattle, WA, October 2012.

·   Jeff Rowe*, Karl N. Levitt, Tufan Demir, Robert F. Erbacher, “Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense,” Proceedings of the National Moving Target Research Symposium, Annapolis, MD, June 2012.

·   Robert F. Erbacher and Steve Hutchinson*, “Distributed Sensor Objects for Intrusion Detection Systems,”Proceedings of the International Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April, 2012pp. 417-424.

·   Michael J. Shevenell* and Robert F. Erbacher, “Design and Implementation of an Open Network and Host-Based Intrusion Detection Test bed with an Emphasis on Accuracy and Repeatability,” Proceedings of theInternational Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April, 2012, pp. 409-416.

·   Robert F. Erbacher*, Anupama Biswas, and Trent Cameron, “A Novel Data Reduction Technique,” Proceedings of the Cyber Security and Information Intelligence Research Workshop, Oakridge, TN, October 2011, Article 35.

·   Robert F. Erbacher*, Steve Hutchinson, and Joshua Edwards, “Web Traffic Profiling and Characterization,”Proceedings of the Cyber Security and Information Intelligence Research Workshop, Oakridge, TN, October 2011, Article 71.

·   Robert F. Erbacher*, “Preparing for the Next WikiLeaks: Making Forensics Techniques Work,” Proceedings of the 6th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2011, pp. 1-8.

·   Robert Whitaker and Robert F. Erbacher*, “A Tri-Linear Visualization for Network Anomaly Detection,”Proceedings of the SPIE ‘2011 Conference on Visualization and Data Analysis, San Francisco, CA, January 2011, pp. 78680P-1...78680P-12.

·   Robert F. Erbacher*, “Validation for Digital Forensics,” Proceedings of the The International Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April 2010, pp. 756-761.

·   Robert F. Erbacher*, Deborah A. Frincke, Sarah J. Moody, Glenn Fink, “Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness,” Proceedings of the SPIE 2010 Conference on Visualization and Data Analysis, Santa Clara, CA, January 2010, pp. 75300H-1-75300H-12. Best Paper Award.

·   Robert F. Erbacher*, “Visualization for Rapid Assessment and Projection in Cyber Situational Awareness,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2009, pp. 475-480.

·   Robert F Erbacher*, Jason Daniels, and Steena Monteiro, “OleDetection: Forensics and Anti-Forensics of Covert Channels in OLE2-Formatted Documents,” Proceedings of the 4th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2009, pp. 85-96.

·   Steena Dominica Steven Monteiro* and Robert F. Erbacher, “Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model,” Proceedings of the 3rd IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2008, pp. 57-68.

·   Sarah J. Moody* and Robert F. Erbacher, “SÁDI – Statistical Analysis for Data type Identification,”Proceedings of the 3rd IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2008, pp. 41-54.

·   Robert F. Erbacher*, Adele Cutler, Pranab Banerjee, and Jim Marshall, “A Multi-Layered Approach to Botnet Detection,” Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2008, pp. 301-308.

·   Robert F. Erbacher*, “Steps for Improving Data Comprehension for Digital Security and Forensics,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2008, pp. 318-326.

·   Robert F. Erbacher, “The Forensic Validity of Visual Analytics,” Proceedings of the SPIE 2008 Conference on Visualization and Data Analysis, San Jose, CA, January, 2008, pp. 68090H-1-68090H-10. Invited Paper.

·   Vikas P. Deshpande*, Robert F. Erbacher, and Chris Harris, “An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY, June 2007, pp. 333-340.

·   Robert F. Erbacher*, “Exemplifying the Inter-Disciplinary Nature of Visualization Research,” Proceedings of IV07: 11th International Conference Information Visualization, Zurich, Switzerland, July 2007, pp. 623-630.

·   Robert F. Erbacher* and Deborah A. Frincke, “Hierarchical Linked Views,” Proceedings of the 2007 Coordinated and Multiple Views in Exploratory Visualization Conference, Zurich, Switzerland, July 2007, pp. 35-46.

·   Richard Swart* and Robert F. Erbacher, “Legal Developments in eDiscovery: Implications for Security Management,” Proceedings of the 6th Security Conference, Las Vegas, NV, 12 Pages, April 2007.

·   Robert F. Erbacher, Shashi Prakash*Chet ClaarJason Couraud, “Intrusion Detection: Detecting Masquerade Attacks Using UNIX Command Lines,” Proceedings of the 6th Security Conference, Las Vegas, NV, 18 Pages, April 2007.

·   Robert F. Erbacher* and John Mulholland, “Identification and Localization of Data Types within Large-Scale File Systems,” Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007, pp. 55-70. Best Paper Award.

·   Robert F. Erbacher*, Kim Christensen, and Amanda Sundberg, “Visual Forensic Techniques and Processes,”Proceedings of the 9th Annual NYS Cyber Security Conference Symposium on Information Assurance, Albany, NY, June 2006, pp. 72-80.

·   Sheldon Teerlink* and Robert F. Erbacher, “Foundations of Visual Forensic Analysis,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY June 2006, pp. 192-199. Best Paper Nomination.

·   Robert F. Erbacher, Richard Swart*, and Matt Harris, “Computer Forensics: Training and Education,”Proceedings of the 5th Security Conference, Las Vegas, NV, 10 Pages, April 2006.

·   Robert F. Erbacher*, Kim Christensen, and Amanda Sundberg, “Designing Visualization Capabilities for IDS Challenges,” Proceedings of the IEEE Workshop on Visualization for Computer Security, Minneapolis, MN, October 2005, pp. 121-127.

·   Robert F. Erbacher*, “Extending Command and Control Infrastructures to Cyber Warfare Assets,” Proceedings of the IEEE Systems, Man, and Cybernetics (SMC), Waikoloa, HI, October 2005, pp. 3331-3337.

·   Yarden Livnat, Jim Agutter, Shaun Moon, Robert F. Erbacher*, and Stefano Foresti, “A Visualization Paradigm for Network Intrusion Detection,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY June 2005, pp. 92-99. Best Paper Nomination.

·   Robert F. Erbacher* and Menashe Garber, “Visualization Techniques for Intrusion Behavior Identification,”Proceedings of the IEEE Information Assurance Workshop, West Point, NY, June 2005, pp. 84-91.

·   Robert F. Erbacher* and Menashe Garber, “Real-Time Interactive Visual Port Monitoring and Analysis,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, June 2005, pp. 228-234.

·   Michael Farnsworth* and Robert F. Erbacher, “Global Illumination: Efficient Renderer Design and Architecture,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics2005, Salt Lake City, UT, July 2005, pp. 1691-1695.

·   David McDonald and Robert F. Erbacher*, “Hardware Accelerated Graphics in Java,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1708-1712.

·   Robert F. Erbacher* and Menashe Garber, “Interactive and Dynamic Visual Port Monitoring and Analysis,”Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1704-1707.

·   Zhifu You*, Charles L. Thomas, and Robert F. Erbacher, “A 3D Shape Measurement System,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1686-1690.

·   Robert F. Erbacher* and Menashe Garber, “Fusion and Summarization of Behavior for Intrusion Detection Visualization,” Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Marbella, Spain, September 6 - 8, 2004, pp. 159-165.

·   Robert F. Erbacher*, “Analysis and Management of Intrusion Data Collection,” Proceedings of the 2004 International Conference on Security and Management (SAM ‘04), Las Vegas, NV, June 2004, pp. 179-185.

·   Robert F. Erbacher*, “Intrusion Behavior Detection through Visualization,” Proceedings of the IEEE Systems, Man & Cybernetics Conference, Crystal City, Virginia, October 2003, pp. 2507-2513.

·   Robert F. Erbacher* and Zhouxuan Teng, “Analysis and Application of Node Layout Algorithms for Intrusion Detection,” Proceedings of the SPIE 2003 Conference on Visualization and Data Analysis, Santa Clara, CA, January, 2003, pp. 160-170.

·   Robert F. Erbacher*, Zhouxuan Teng, and Siddharth Pandit, “Multi-Node Monitoring and Intrusion Detection,”Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Malaga, Spain, September 9 - 12, 2002, pp. 720-725.

·   Robert F. Erbacher*, “A Component-Based Event-Driven Interactive Visualization Software Architecture,”Proceedings of the 2002 International Symposium on Information Systems and Engineering (ISE 2002), San Diego, CA, July 2002, pp. 237-243.

·   Robert F. Erbacher* and Bill Augustine, “Intrusion Detection Data: Collection and Analysis,” Proceedings of the 2002 International Conference on Security and Management (SAM ‘02), Las Vegas, NV, June 2002, pp. 3-9.

·   Robert F. Erbacher*, “Glyph-Based Generic Network Visualization,” Proceedings of the SPIE 2002 Conference on Visualization and Data Analysis, San Jose, CA, January, 2002, pp. 228-237.

·   Robert F. Erbacher and Karl Sobylak, “Improving Intrusion Analysis Effectiveness,” Proceedings of the 2002 Workshop on Computer Forensics, Moscow, ID, September 2002.

·   Robert F. Erbacher*, “Visual Behavior Characterization for Intrusion Detection in Large Scale Systems,”Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Marbella, Spain, September 3 - 5, 2001, pp. 54-59. Color version available.

·   Robert F. Erbacher*, “Visual Traffic Monitoring and Evaluation,” Proceedings of the Conference on Internet Performance and Control of Network Systems II, Denver, CO, August 2001, pp. 153-160.

·   Robert F. Erbacher*, “User Issues in Visual Monitoring Environments,” Proceedings of the 2001 International Conference on Imaging Science, Systems, and Technology 2001, Vol. 2, Las Vegas, NV, June, 2001, pp. 644-650.

·   Robert F. Erbacher*, “Interactive Program Debugging,” Proceedings of the 2001 International Conference on Imaging Science, Systems, and Technology 2001, Vol. 1, Las Vegas, NV, June, 2001, pp. 219-224.

·   Robert F. Erbacher* and Deborah Frincke, “Visual Behavior Characterization for Intrusion and Misuse Detection,” Proceedings of the SPIE 2001 Conference on Visual Data Exploration and Analysis VIII, San Jose, CA, January, 2001, pp. 210-218.

·   Robert F. Erbacher* and Deborah Frincke, “Visualization in Detection of Intrusions and Misuse in Large Scale Networks,” Proceedings of the International Conference on Information Visualization 2000, London, UK, July, 2000, pp. 294-299.

·   Robert F. Erbacher*, “Visual Steering for Program Debugging,” Proceedings of the SPIE 0 Conference on Visual Data Exploration and Analysis VII, San Jose, CA, January, 0, pp. 106-113.

·   Robert F. Erbacher* and Georges G. Grinstein, “Program visualization: bringing visual analysis to code development,” Proceedings of the SPIE ’99 Conference on Visual Data Exploration and Analysis VI, San Jose, CA, January, 1999, pp. 32-39.

·   Robert F. Erbacher*, “Visual debugging of data and operations for concurrent programs,” Proceedings of theSPIE ’97 Conference on Visual Data Exploration and Analysis IV, San Jose, CA, February, 1997, pp. 120-128.

·   Robert F. Erbacher and David A. Southard*, “Rapid Modeling of C2 Simulations,” Proceedings of the Conference of the Society for Information Display, Santa Ana, CA, May 1996, pp. 139-142.

·   Robert F. Erbacher* and Georges G. Grinstein, “Visualization of Data for the Debugging of Concurrent Systems,” Proceedings of the SPIE ‘96 Conference on Visual Data Exploration and Analysis III, San Jose, CA, February, 1996, pp. 140-149.

·   Robert F. Erbacher* and Georges G. Grinstein, “Issues in the Development of 3D Icons,” Proceedings ofVisualization in Scientific Computing, Springer-Verlag, 1995, pp. 109-123.

·   Robert F. Erbacher*, David Gonthier, and Haim Levkowitz, “The color icon: A new design and a parallel implementation,” Proceedings of the SPIE ‘95 Conference on Visual Data Exploration and Analysis II, San Jose, CA, February, 1995, pp. 302-312.

·   Robert F. Erbacher* and Georges G. Grinstein, “Performance issues in a real-time true color data display,”Proceedings of the SPIE ‘95 Conference on Visual Data Exploration and Analysis II, San Jose, CA, February, 1995, pp. 256-262.

·   Robert F. Erbacher* and David A. Southard, “Interactive Visualization of C2 Simulations,” Proceedings of the Summer Conference on Computer Simulation. Ottawa, Ontario. July 1995, pp. 223-228.

·   Grinstein, G., V.G. Prakash and R. Erbacher, “Modifying and Using Khoros for Building Interactive Closed Form Imaging Applications,” in the Khoros Users Group Workshop Proceedings held during Visualization ‘92, Boston, October 21-25, 1992.

                                     

Technical Reports:

·   Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Observability Assumptions for Cyber Analysis,” U.S. Army Research Laboratory, Contractor’s Report #under PreparationAdelphi, MD, May 2016.

·   Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Synthetic additions to PSU Shift Transition study data-set,” U.S. Army Research Laboratory, Contractor’s Report #under preparationAdelphi, MD, May 2016.

·   Robert F. Erbacher, Renee Etoty, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Chen Zhong, Vasant Honavar, Ping Li, Nanyin Zhang, Xiaoxiao Bai, Fengyang Ma, Qing Yang, “Studying Cognitive, Visual, and Neural Functions of Network Security Analysts Using EEG,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Robert F. Erbacher, Renee Etoty, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Chen Zhong, Vasant Honavar, Ping Li, Nanyin Zhang, Qing Yang, Timothy Mosher, “Studying Neural, Visual, and Cognitive Processes of Network Security Analysts Using fMRI, EEG, and Eye Tracking,” U.S. Army Research Laboratory,Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Cnetmon: network traffic monitor,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “COLD: (ARL sensor) network traffic collection daemon,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “VSNAP: (ARL sensor) network traffic collector and data-type file generator,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “XFLOW: (ARL) flowfile query and conversion tool,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “iGREP: (ARL) query and conversion tool for internet string files (istr),” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “FTALK: Interrogator tool to identify most frequent conversation endpoints per sensor, per time-period,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “FTAIL: Interrogator tool to open and follow a log-file,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “DLYZER: Interrogator tool to identify DNS related flicker-hosts,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “DIRMOND: Sensor or server tool to monitor a directory and respond to events,” U.S. Army Research Laboratory, Technical Note #In Press,Adelphi, MD, May 2016.

·   Robert F. Erbacher and Steve Hutchinson, “Building on the Scientific Foundations Underlying Cyber Semantics,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Robert F. Erbacher, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Coty Gonzalez, “Collaborative Project: ARSCA-Facilitated Training Procedures for Network Security Analysts,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Chris Garneau, Robert F. Erbacher, Renee Etoty, “Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study,” U.S. Army Research Laboratory,Technical Note #In PressAdelphi, MD, May 2016.

·   Greg Shearer and Robert F. Erbacher, “Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Renée E. Etoty and Robert F. Erbacher, “Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6951, Adelphi, MD, May 2014.

·   Renée E. Etoty, Robert F. Erbacher, Steve Hutchinson, Richard Astrom, Garrett Payer, Raymond Chang, “CyFall: A Cyber-Network Game Scenario,” U.S. Army Research Laboratory, Technical Report #ARL-TR-7024, Adelphi, MD, August  2014.

·   Renée E. Etoty and Robert F. Erbacher, “A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6891, Adelphi, MD, April 2014.

·   Robert F. Erbacher, Rodrigo Mendoza, Chuck Smith, Carlos Mateo, and Kin Wong, “Interrogator vs. INVA/DE,” DSI Final Report, U.S. Army Research Laboratory, Technical Report #ARL-TR-6890, Adelphi, MD, April 2014.

·   Robert F. Erbacher and Robinson Pino, “Open Source Software Tools for Anomaly Detection Analysis,” U.S. Army Research Laboratory, Memorandum Report #ARL-MR-0869, Adelphi, MD, April 2014.

·   Renée E. Etoty, Dr. Robert F. Erbacher, and Dr. Christopher Garneau, “Evaluation of the Presentation of Network Data via Visualization Tools for Network Analysts,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6865, Adelphi, MD, March 2014.

·   Peng Liu, Robert Erbacher, William Glodek, Renée E. Etoty, and John Yen, “Human Subject Research Protocol: Computer-Aided Human Centric Cyber Situation Awareness: Understanding Cognitive Processes of Cyber Analysts,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6731, Adelphi, MD, November 2013.

·   Robert Erbacher, “Saliency as a Quantitative Validation Mechanism for Visualization Techniques,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6094, Adelphi, MD, 9/2011.

·   Robert Erbacher, Steve E. Hutchinson, Jonathan Katz, “Network Understanding -extension to behaviors,” Technical Report, Army Research Laboratory, Adelphi, MD, 9/2011.

·   Robert F. Erbacher, Steve E. Hutchinson, “Extending Case-Based Reasoning (CBR) Approaches to Semi-Automated Network Alert Reporting,” Technical Report #ARL-TR-6410 April 2013, Army Research Laboratory, Adelphi, MD, 9/2011.

·   RB Whitaker and Dr. Robert F. Erbacher, “AdviseAid Developer Documentation,” Technical Report #erb-2009-001, Department of Computer Science, Utah State University, Logan, UT, 84322, December 26, 2009.

·   Robert F. Erbacher, “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL Final Report, Final Report number in DTIC AFRL-RI-RS-TR-2008-269, C Distribution Restrictions, October 2008.

·   Robert F. Erbacher, “2004 AFRL Summer Faculty Research Program Final Report,” Technical Report #2005-1.1, Utah State University, Department of Computer Science, 2005.

·   Robert F. Erbacher, “Computer Forensics: Training and Education,” Technical Report #: SUNYA-CS-02-02 University at Albany, Computer Science Department, December 2002.

·   Robert F. Erbacher, “Implementing an Interactive Visualization System on a SIMD Architecture,” University of Massachusetts at Lowell Technical Report, Lowell, MA 01854, 1996.

·   David A. Southard and Robert F. Erbacher, “Rapid Modeling for Ground Mission Visual Simulation,” Technical Report #: 96B0000111, The MITRE Corporation, Bedford, MA, May 1996.

·   Hugh C. Masterman, Robert F. Erbacher, and Laura R. Ricci, “Suitability of COTS Products for Air Defense Systems,” Technical Report #: WP 96B0000078, The MITRE Corporation, Bedford, MA, July 1996.

·   D. A. Southard, R. F. Erbacher, S. G. Tammaro, and G. Spitz. “Exploitation of Virtual Environment Technology,”Technical Report #: MTR 95B49, The MITRE Corporation, Bedford, MA, March 1995.

 

Other Publications (Including Invited Papers, Refereed Posters, Refereed Position Statements, RefereedAbstracts, and White Papers):

·   Chirs Garneau and Robert F. Erbacher, “Human Factors Research on Displays for Cyber Security Network Analysts,” Unrefereed Poster, ARL External TAB Review, 6/2015.

·   Noam Ben-Asher, Alessandro Oltramari, Coty Gonzalez, Robert F. Erbacher, “Cognitive models and knowledge-based technologies for detection of cyber attacks,” Unrefereed Poster, Cyber CRA Bootrcamp, 5/2015.

·   Robert F. Erbacher, “Internet of Things 2025,” Position Statement for NSF SaTC 2025 Workshop, April 2014.

·   Robert F. Erbacher, “Quantitative Assessment Algorithms for Intrusion Detection,” Unrefereed Poster, ARL External TAB Review, 6/2012.

·   Steve Hutchinson and Robert F. Erbacher, “Distributed Sensor Objects for Intrusion Detection Systems,” Unrefereed Poster, ARL External TAB Review, 6/2012.

·   Robert F. Erbacher, “Foundations of Intrusion Detection,” Unrefereed Poster, ARL Science Day, 4/2012

·   Carol Ellis, Robert F. Erbacher, Steve Hutchinson, Jonathan Katz, “Interrogator:2i Projects in Detection and Evidence Fusion,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Sidney C. Smith, Hasan Cam, Robert F. Erbacher, “ARL Dataset for NIDS Evaluation 6.1,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Sidney C. Smith, Rodrigo Mendoza, Hasan Cam, Robert F. Erbacher, “Adversarial dynamics,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Robert F. Erbacher, Steve Hutchinson, Joshua Edwards, “Web Profiling and Characterization,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Robert F. Erbacher, “General Chair Introduction,” Proceedings of the 5th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2010, pp. vii.

·   Robert F. Erbacher, “General Chair Introduction,” Proceedings of the 4th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2009, pp. vi.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” ACM Student Research Competition, Richard Tapia Celebration of Diversity in Computing Conference, Portland, OR, April 1-4, 2009.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” SRC Poster Competition, Grace Hopper Conference, Denver, CO, October 1-4, 2008.

·   Anupama Biswas and Robert F. Erbacher, “Impact Analysis of System and Network Attacks using Artificial Neural Networks,” SRC Poster Competition, Grace Hopper Conference, Denver, CO, October 1-4, 2008.

·   Robert F. Erbacher, Barbara Endicott-Popovsky, and Deborah A. Frincke, “Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution,” Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007, pp. 150-151. Refereed Challenge Paper.

·   Robert F. Erbacher, “Panel Position Statement: The Future of CMV,” Proceedings of IV07: 11th International Conference Information Visualization, Zurich, Switzerland, July 2007, pp. 75. Refereed Panel Position Statement.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” Poster, Grace Hopper Conference, Orlando, FL, October 17-20, 2007.

·   Sarah Moody and Robert F. Erbacher, “SÁDI – Statistical Analysis for Data type Identification,” Poster, Grace Hopper Conference, Orlando, FL, October 17-20, 2007.

·   Robert F. Erbacher, “Visualization Techniques for Situational Awareness,” Contributing author for report on Cyber Research and Capabilities for the Secretary of Defense, Editor: Jim Kadtke, National Defense University, 2007.

·   Robert F. Erbacher, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,” Proceedings of the SPIE Conference on Visualization and Data Analysis 2006, San Jose, CA, January 2006, pp. ix-x.

·   Robert F. Erbacher, “Extending Command and Control Infrastructures to Cyber Warfare Assets,” IEEE Information Assurance Workshop, West Point, NY June 2005, pp. 446-447. Refereed Poster Paper.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,”Proceedings of the SPIE Conference on Visualization and Data Analysis 2004, San Jose, CA, January 2004, pp. ix-x.

·   Juergen Symanzik, Palyne Gaenir, Robert Erbacher, and Natascha Vukasinovic, “On the Effect of the Ordering of Questions on Exam Scores,” Proceedings of the 2004 ASA Joint Statistical Meetings, Toronto, Canada, August 8-12, 2004. Refereed Abstract.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,”Proceedings of the SPIE Conference on Visualization and Data Analysis 2003, San Jose, CA, January 2003, pp. ix.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, and Matti Grohn, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VIII, San Jose, CA, January 2001, pp. ix.

·   Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VII, San Jose, CA, January 2000, pp. ix.

·   Robert F. Erbacher and Alex Pang, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis V, San Jose, CA, January 1998, pp. ix.

·   Robert F. Erbacher, “Visual Assistance for Concurrent Processing,” University of Massachusetts at Lowell Doctoral Dissertation (1998 CS-3), Lowell, MA 01854.

·   Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis IV, San Jose, CA, January 1997, pp. ix.

·   Robert F. Erbacher, “Increasing Usage of 3D Graphics by the Masses,” Position Paper for the Workshop on PC-Based Graphics, IEEE Visualization ‘97, Phoenix, AZ, 1997.

·   Georges G. Grinstein and Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference onVisual Data Exploration and Analysis III, San Jose, CA, January 1996, pp. ix.

·   Georges G. Grinstein and Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference onVisual Data Exploration and Analysis II, San Jose, CA, January 1995, pp. 3-4.

                                                 

Books and Proceedings:

·   Cyber Defense and Situational Awareness, Editors: Alexander Kott, Cliff Wang, Robert F. Erbacher, Advances in Information Security 62, Springer 2014.

·   Proceedings of the IEEE Visualization Workshop on Visualization for Computer Security (VizSec) 2009 Workshop, Editors: Deborah A. Frincke, Carrie Gates, John Goodall, Robert F. Erbacher, Atlantic City, NJ, 2009.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2006, Editors: Robert F. Erbacher, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2006.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2005, Editors: Robert F. Erbacher, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2005.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2004, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2004.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2003, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts , Matti Grohn, Katy Borner, Santa Clara, CA, 2003.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2002, Editors: Robert F. Erbacher, Philip C. Chen, Matti Grohn, Jonathan C. Roberts, Craig M. Wittenbrink, San Jose, CA, 2002.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VIII, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, Matti Grohn, San Jose, CA, 2001.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VII, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, San Jose, CA, 2000.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VI, Editors: Robert F. Erbacher, Philip C. Chen, Craig M. Wittenbrink, San Jose, CA, 1999.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis V, Editors: Robert F. Erbacher and Alex Pang, San Jose, CA, 1998.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis IV, Editors: Georges G. Grinstein and Robert F. Erbacher, San Jose, CA, 1997.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis III, Editors: Georges G. Grinstein and Robert F. Erbacher, San Jose, CA, 1996.

·   Proceedings of the International Conference on Imaging Science, Systems, and Technology, Editor: H. R. Arabnia, Associate Editors: R. F. Erbacher, X. He, C. Knight, B. Kovalerchuk, M. M-O. Lee, Y. Min, M. Sarfraz, J. Schqing, M. H. N. Tabrizi, Las Vegas, NV, 2001.

 


 

Significant and Notable Presentations (Required):

 

·   “ARL Cyber Security Portfolio,” Briefing to Army Science Board

3/2012

·   “Science for Cyber Security Cooperative Agreement,” Intermediary Progress  Report to Directorate

3/2012

·   “ARL Cyber Security Portfolio,” Briefing to Honorable Lemnios

11/2011

 

 

Invited Talks (Not listed or implied elsewhere):

 

·   “ARO/RDECOM support for Advanced Computing in South America,” Brazil Universidade Estadual Paulista (UNESP)

07/27/2016

·   “ARO/RDECOM support for Advanced Computing in South America,” Brazil Federal University of ABC

07/20/2016

·   “ARO/RDECOM support for Advanced Computing in South America,” Brazil Laboratório Nacional de Computação Científica (LNCC)

07/11/2016

·   “Cognitive Foundations of Cyber Security,” Army Research Office

05/15/2015

·   “ARL Cyber Research Portfolio,” Rutgers University

11/21/2014

·   “ARL Cyber Research Portfolio,” TTCP C3I TP3

09/28/2014

·   "Cognitive Foundations of Cyber Analysts," TAB Laboratory Review

06/25/2014

·   "Cognitive Foundations of Cyber Analysts," NATO IST-108

06/10/2014

·   “ARL Cyber Research Portfolio,” Penn State University

04/01/2014

·   “ARL Cyber Research Portfolio,” Carnegie Mellon University

03/18/2014

·   “ARL Cyber Research Portfolio,” TTCP C3I TP3

11/12/2013

·   “User Considerations in a Unified Cyber Security Model,” JHU-APL Technical Exchange Meeting

02/04/2013

·   “ARL Cyber Research Portfolio,” UMASS-Lowell

01/23/2013

·   “Scientific Foundations for Cyber Security,” RTI International

01/17/2013

·   “Tactical Directions of ARL's Cyber Research Portfolio,” PEO/PM IEW&S

12/19/2012

·   “ARL Cyber Research Portfolio,” ITC-A

12/12/2012

·   “ARL Cyber Research Portfolio,” LIA/Polish MUT

12/05/2012

·   “ARL view: Science of Cyber Security,” NSA Science of Security Community Meeting

11/29/2012

·   “Scientific Foundations of Visualization,” Technical Exchange Meeting with NSF

11/20/2012

·   “ARL Cyber Security Research Portfolio,” TTCP C3I TP3 by teleconference

10/25/2012

·   “Anomaly Detection Algorithms for Network Intrusion Detection,” Network Science and Reconfigurable Systems for Cyber Security, ICF International, Beltsville, MD.

08/2012

·   “ARL Research Portfolio: The Science of Cyber Security,” NIST, Gaithersburg, MD.

6/2012

·   “ARL Research Portfolio: The Science of Cyber Security,” ORNL, Oak Ridge, TN.

6/2012

·   “ARL Research Portfolio: The Science of Cyber Security,” CSIA IWG, NSF, Washington, DC.

5/2012

·   “ARL Research: The Science of Cyber Security,” DIMACS Workshop Connectivity and Resilience for Large-Scale Networks, Piscataway, NJ.

4/2012

·   “ARL Research: Cyber Maneuver,” CSIA IWG, NSF, Washington, DC.

1/2012

·   “ARL Research: The Science of Cyber Security,” TTCP C3I TP11 (Technical Panel on Information Assurance and Cyber Defense) National Brief, Adelaide, Australia.

12/2011

·   “ARL Research: The Science of Cyber Security,” Pittsburgh State University, Pittsburgh, PA.

11/2011

·   “ARL Research: The Science of Cyber Security,” Cyber Security and Information Intelligence Research Workshop, Oakridge, TN.

10/2011

·   “ARL Research: The Science of Cyber Security,” Rutgers University, Piscataway, NJ.

9/2011

·   “ARL Research: The Science of Cyber Security,” Scholarship for Service Informational Session, Carnegie Melon University, Pittsburgh, PA.

9/2011

·   “ARL Perspective: The Future of Visualization for Cyber Security,” VizSec 2011, Pittsburgh, PA.

7/2011

·   “Preparing for the Next WikiLeaks: Forensics Techniques and Government Policy,” Sandia National Laboratory, Livermore, CA

1/2011

·   “Visual and Statistical Foundations for Digital Forensic Science,” ARL, Adelphi, MD

12/2010

·   “Visual and Statistical Foundations for Digital Forensic Science,” Accenture, San Jose, CA

10/2010

·   “Visual and Statistical Foundations for Digital Forensic Science,” Sandia National Laboratory, Livermore, CA

8/2010

·   “Visualization+Security!=Science,” IEEE VizSec Panelist, Atlantic City, NJ.

10/2009

·   IEEE VisWeek Doctoral Consortium Panelist/Mentor, Atlantic City, NJ.

10/2009

·   “Research Processes and Needs of Digital Forensics,” PNNL Digital Forensics Workshop, Richland, WA.

9/2009

·   “The Needs and Benefits for Validation and Error Analysis in Digital Forensics,” ARO Special Workshop on Digital Forensics. Arlington, VA.

9/2009

·   “The Darpa Visualization Seedling,” PNNL/UW Cyber Analytics Workshop, Seattle, WA.

9/2008

·   “Next Steps in PNNL Cyber Security Research Initiatives,” Pacific Northwest National Labs, Richland, WA.

9/2008

·   “The Darpa Visualization Seedling,” Pacific Northwest National Labs, Richland, WA.

9/2008

·   “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL BAA-06-01-IFKA Project Final Report Meeting, Rome, NY.

6/2008

·   “Digital Forensic Engineering: The Past and Future,” Panelist, Systematic Approaches to Digital Forensics Engineering, Oakland, CA.

5/2008

·   “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL Cyber Defense Conference, Rome, NY.

5/2008

·   Visual Situational Awareness for Network Security and Forensics Assessment,” HP Research Labs, Santa Clara, CA.

1/2008

·   “Forensic Validity of Visual Analytics,” SPIE Conference on Visualization and Data Analysis, San Jose, CA.

1/2008

·   “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL BAA-06-01-IFKA, Project Progress and Status Meeting, Logan, UT.

10/2007

·   “Visual Situational Awareness of Impact and Vulnerability Assessment,” IEEE Sponsored Colloquium, Pacific Northwest National Labs, Richland, WA.

7/2007

·   “Visualization Infrastructures for Scalable Cyber Conflict Resolution,” Panelist, CCSA Sponsored Workshop on Visualization of Cyber Conflicts, Logan, UT.

6/2007

·   “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL BAA-06-01-IFKA Project Kickoff Meeting, Rome, NY.

5/2007

·   “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL Cyber Defense Conference, Rome, NY.

5/2007

·   “Courtroom Implications of Presenting Digital Evidence,” Panelist2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA.

4/2007

·   “Basics of Computer Security: Programming Securely and Defending Network Connected Devices,” Association for Computing Machinery, Logan, UT.

12/2006

·   “Visual Network forensic Techniques and Processes,” IEEE Sponsored Colloquium, Pacific Northwest National Labs, Richland, WA.

10/2006

·   “History and Trends of BotNets,” Air Force Research Labs Colloquium, Rome, NY.

7/2006

·   “Large Scale Visualization: Challenges and Capabilities,” BOF at IEEE Visualization Conference on Using Visualization to Support Security-Relevant Information Understanding in Very Large Scale Infrastructures and Networks, Minneapolis, MN.

10/2005

·   “Break-out Session Results: Critical Challenges in Large-Scale Security and Needed Technologies,” Workshop on Security in Large-Scale Computing, PNNL, Richland, WA.

8/2005

·   “Large Scale Visualization: Challenges and Capabilities,” Panelist, Workshop on Security in Large-Scale Computing, PNNL, Richland, WA.

8/2005

·   “Persistent Visual Fusion for Network Attack Detection,” Air Force Research Labs Colloquium, Rome, NY.

7/2005

·   “Current and Future Directions of Intrusion Detection Visualization at Utah State University,” Air Force Research Labs Colloquium, Rome, NY.

7/2004

·   “Intrusion Detection Challenges and Research directions,” USU Computer Science Department Brown Bag Research Seminar, Logan, UT.

3/2004

·   “Network Security,” USU Free Software and Linux Club, Logan, UT.

3/2004

·   “University Related Computer Security Issues and solutions,” Panelist: USU Computer Security Week. University Related IT Security Issues Panel, Logan, UT.

11/2003

·   “Visualization: Visual Data Exploration and Analysis for Genomic and Biological Sciences,” USU Biotechnology and Genomics Research Center Seminar Series, Logan, UT.

10/2003

·   “Improving Intrusion Analysis Effectiveness,” The Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Washington, DC.

9/2003

·   “Improving Intrusion Analysis Effectiveness,” Utah State University, Logan, UT.

3/2003

·   “Improving Intrusion Analysis Effectiveness,” New York State Cyber-Security Symposium, Utica, NY.

2/2003

·   “Lab-Based Instructional Facilities and Issues,” Panelist: Teaching Computer and Network Forensics, 2002 Workshop on Computer Forensics, Moscow, ID.

9/2002

·   “Visualization in Detection of Intrusions and Misuses,” Computing Laboratory, University of Kent.

7/2000

·   “Visual Assistance for Concurrent Processing,” Department of Computer & Information Science & Engineering, University of Florida.

4/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, University at Albany - SUNY.

4/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, Florida State University.

4/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, Western Michigan Univ.

3/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, Oregon State University.

3/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, University of Alabama.

3/1999

·   “Visual Assistance for Concurrent Processing,” Department of Computer Science, University of Idaho.

4/1998

 

 

Professional Activities:

 

External:

 

Editorialships:

 

·   Editor: Journal of Convergence Information Technology

2010-Present

·   Associate Editor: The Journal of Electronic Imaging

2000-2016

·   Article Editor: SAGE Open Manuscript

2014

·   Associate Editor: Proceedings of the International Conference on Imaging Science, Systems, and Technology

2001

·   Guest Editor: The Journal on Electronic Imaging: Special Issue on Visualization and Data Analysis

2000

 

 

Conference Committees:

 

·   Steering Committee: Visualization and Data Analysis

2011-2014

·   Steering Committee: Systematic Approaches to Digital Forensics Engineering (SADFE)

2011-2016

·   Program Co-Chair: International Symposium on Digital Forensics and Information Security (DFIS)

2012

·   General Chair: Systematic Approaches to Digital Forensics Engineering (SADFE)

2009-2011

·   Publications Chair: Workshop on Visualization for Cyber Security (VizSec)

2009

·   Publications Chair: Systematic Approaches to Digital Forensics Engineering (SADFE)

2007-2008

·   Conference Co-Chair: Visualization and Data Analysis

2002-2007

·   Track Chair: 6th Security Conference, Digital Forensics Track.

2007

·   Program Chair: High Performance Computing Symposium (Advanced Simulation Technologies Conference)

2004

·   Applications Co-Chair: IEEE Visualization

2003

·   Posters Co-Chair: IEEE Visualization

2002

·   Conference Co-Chair: Visual Data Exploration and Analysis, II-VIII

1995-2001

·   Workshops and BOF’s Co-Chair: IEEE Visualization

1999-2001

·   Workshop Co-Organizer: Fundamental Issues in Visualization 2001

2001

·   Audio Visual Co-Chair: IEEE Visualization

1997-1998

 

 

Program Committees:

 

·   International Conference on Emerging Security Information, Systems and Technologies (SecureWARE)

2015

·   IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)

2015

·   Moving Target Defense (MTD)

2014-2015

·   IEEE Visualization Workshop on Visualization for Computer Security  (VizSec)

2005-2006, 2008-2014

·   International Conference on IT Convergence and Security (ICITCS)

2011, 2014

·   IJCNN Special Session on Neuromorphic Science Technology for Cybersecurity

2013

Program Committee for International Conference on Data Mining and Intelligent Information Technology Applications

2013

·   ICF' CyberSci Summit 2013 Conference

2013

·   IASTED International Conference on Computers, Graphics and Imaging (CGIM)

2003-2005, 2008, 2011-2013

·   Systematic Approaches to Digital Forensics Engineering (SADFE)

2007-2008, 2010-2011, 2013, 2015

·   Workshop on Security and Forensics in Communication Systems (SFCS)

2012

·   Cyber Security and Information Intelligence Research Workshop (CSIIRW)

2011-2012

·   International Conference on Next Generation Information Technology (ICNIT)

2011

·   IASTED International Conference on Graphics and Virtual Reality (GRVR)

2011

·   International Conference on Mechanical Engineering and Information Technology (MEIT 2011)

2011

·   International Symposium on Forensics for Future Generation Communication environments (F2GC)

2007-2011

·   International Conference on Networked Computing and Advanced Information Management (NCM)

2010-2011

·   International Conference on Computer Sciences and Convergence Information Technology (ICCIT)

2010

·   SECRYPT (Int’l Conf on Security and Cryptography)

2006-2009

·   SPIE Conference on Visualization and Data Analysis

2008-2009

·   International Conference on Digital Forensics & Cyber Crime (ICDF2C)

2009

·   IEEE InfoVis Conference

2003, 2007-2008

·   International Conference on Coordinated & Multiple Views in Exploratory Visualization

2003-2005, 2007

·   IEEE Information Assurance Workshop

2005-2007

·   International Conference on Information Science and Security

2007, 2015

·   The International Conference on Security and Management

2003-2004, 2006

·   Image producing, sending, and mining (Image)

2006

·   IEEE Visualization Conference

2005

·   International Conference on E-business and Telecommunication Networks

2005

·   Workshop on Visualization and Data Mining for Computer Security

2004

·   IEEE InfoVis Conference

2001-2002

·   The International Conference on Imaging Science, Systems, and Technology

2001

 

 

Session Chair:

 

·   SPIE Conference on Visualization and Data Analysis

2002-2008, 2010-2011

·   Systematic Approaches to Digital Forensics Engineering (SADFE)

2008, 2010

·   IEEE Visualization Workshop on Visualization for Computer Security

2005, 2009

·   Security and Management (SAM)

2008

·   IEEE International Conference on Information Visualization

2007

·   9th Annual NYS Cyber Security Conference Symposium on Information Assurance

2006

·   Information Assurance Workshop, West Point

2006

·   IASTED VIIP Conference

2001, 2005

·   COI Workshop on Security in  Large-Scale Computing, breakout session

2005

·   IEEE International Conference on Systems, Man, and Cybernetics

2005

·   IEEE Visualization Conference

2001-2003

·   International Symposium on Information Systems and Engineering

2002

·   SPIE Conference on Visual Data Exploration and Analysis

1995-2001

·   The International Conference on Imaging Science, Systems, and Technology

2001

 

 

Other:

 

·   CyberSA CONOPS Working Group

2015

·   National Science Foundation SaTC 2025 Panel (Invite Only)

2014

·   Army Research Lab rep for the Cyber Materiel WG on Cyber Situational Awareness Materiel Development Group

2014-Present

·   GSTOC - National Research Council (NRC) Committee on Globalization of S&T Opportunities and Challenges  (GSTOC) for DOD (Acted as cyber security SME)

2013

·   The Technical Cooperation Program - Command, Control, Communications, and Information Systems Group - Technical Panel 11: Information Assurance and Defensive Information Warfare (TTCP C3I TP11)

2011-Present

·   Information Assurance Technology Analysis Center's Subject Matter Expert

2011-Present

·   CMU CyLab Review Panel

2011

·   Organizer: WikiLeaks/Manning Panel, held at SADFE

2011

·   Assisted SDL in the organization of their Workshop on Visualization in Cyber Conflict. Identified and recruited invited speakers and attendees.

2007

·   BOF Co-Organizer, IEEE Visualization Conference, “Using Visualization to Support Security-Relevant Information Understanding in Very Large Scale Infrastructures and Networks,” with D. Frincke, B. Yurcik, C. North, and G. Schmidt

2005

·   Student Volunteer, IEEE Visualization Conference

1991-1992

 

 

College:

 

·   Bioinformatics Faculty Search Committee

2001

·   Judge: Undergraduate Research Colloquium

2000

·   Academic Support Committee

2000

 

 

Department:

 

·   Chair, CS3100 Textbook Committee

2006-2010

·   ACM Chapter Advisor

2006-2010

·   Contest Team Committee

2004-2009

·   Departmental Placement Exam Committee (Operating Systems)

2004-2008

·   Planning Committee: Senior Graduation Dinner

2005-2008

·   Doctoral Program and Qualifier Re-Examination Committee

2008

·   CS/MIS Relations Committee

2006-2007

·   PhD Qualifiers Oral Committee (Chair)

2004

·   CS3100 Textbook Committee

2004

·   Capstone Course Committee

2004

·   Undergraduate Curriculum Committee

2000-2003

·   Computer Oversight Committee

2001-2003

·   Undergraduate Advisor: 25+ Students

2003

·   Undergraduate Advisor: 35+ Students

2002

·   Undergraduate Advisor: 20+ Students

2001

·   Undergraduate Advisor: 10+ Students

2000

 

 

Colloquiums Arranged (External Speakers)

 

·   Stefano Foresti (Xapio), Captmail: convergence and compliance of emails and files

2008

·   Kevin A. Kwiat (AFRL-Rome Labs), “Is Network Message Loss Malicious or Not? -  A Game-Theoretic Approach”

2007

·   Jim Agutter and Stefano Foresti (University of Utah), “Generic Visualizations for Decision Makers”

2005

 

 

Notable Meetings Attended (Not Listed or Implied Elsewhere)

 

·   Nato IST 108 meeting

2015

·   ARO MTD MURI Kickoff

2014

·   ARL Cyber CRA Kickoff

2014

·   OSD/DoD SBIR Meeting

2012

·   ARO MURI Topic Review Meeting

2011

·   CMU CyLab Review

2011

·   IEEE Systematic Approaches to Digital Forensics Engineering

2008-2010

·   Visual Analytics:  The Next Five Years, VAC Consortium Meeting

2009

·   Darpa Seed Grant PI Meeting

2008

·   IEEE Security and Privacy Symposium

2008

·   Visualization Summit, Aesthetics Working Group

2007

·   AFRL-Rome Labs Info Challenges Conference

2005-2006

·   IEEE Visualization

1999-2005

·   ARDA PI Meeting

2004

 

 

Reviewing:

 

NSF: Proposal Reviewer/Panelist

2003,2005, 2008×2, 2009, 2012-2013

ARO Conference Proposal Reviewer

 

ARO STIR Reviewer

2015, 2016×3

2014

ARO MURI Reviewer

2012, 2013

ARO BAA Proposal Reviewer

2012×3, 2013, 2015×5, 2016×2

ARO STTR Proposal Reviewer

2013, 2016×3

ARO SBIR Proposal Reviewer

2012

ORNL LTRD Proposal Reviewer

2011

ARL Internal TRAC Proposal Reviewer

2011

Swiss National Science Foundation: Proposal Reviewer

2008

Journals:

 

·   International Journal of Parallel, Emergent and Distributed Systems

2015

·   Security and Communication Networks

2015

·   The Scientific World Journal

2014

·   Elsevier Computers & Security

2014×3, 2015×3, 2016×3

·   Journal of Cognitive Engineering and Decision Making

2014

·   Journal of Network and Computer Applications

2014

·   Springer Journal of Supercomputing

2013-2014

·   IASTED International Journal of Computers and Applications

2004, 2010, 2012, 2014×3

·   IEEE Transactions on Parallel and Distributed Systems

2013

·   Elsevier Journal of Visual Languages and Computing

2003, 2010, 2012, 2013

·   Transactions on Information Forensics & Security

2013×3

·   The Electronic and Telecommunication Research Institute Journal (ETRI Journal)

2003, 2008, 2010×2, 2013×3,

·   IEEE Computer

2012

·   The International Journal of Information Visualization

2003, 2010×2, 2011×2, 2012×3, 2015×2

·   IEEE Computer Graphics and Applications

2004×2, 2012 2005×3, 2007, 2011×2, 2012,

·   International Journal of Advancements in Computing Technology

2011

·   Journal of Visualization

2011

·   Journal of Convergence Information Technology

2010, 2011×2

·   IEEE Transactions on Visualization and Computer Graphics

2001-2002, 2006, 2009×2, 2010-2011

·   Journal of Visual Communication and Image Representation

2007-2009

·   IETE Technical Review

2009

·   IBM Systems Journal

2008

·   Wireless Personal Communications

2008

·   Optical Engineering

2006

·   IEEE Transactions on Knowledge and Data Engineering

2006

·   IEEE Transactions on Secure and Dependable Computing

2004-2005

·   IEEE Software

2005

·   IEEE Security and Privacy

2004

·   The Bioinformatics Journal (Oxford Journals)

2003

 

 

Conferences:

 

·   International Conference on Information Science and Security

2015

·   International Conference on Emerging Security Information, Systems and Technologies (SecureWARE)

2015

·   Moving Target Defense Conference

2014, 2015

·   IEEE Conference on Visual Analytics Science and Technology (IEEE VAST)

2013-2014

·   International Conference on Computer Graphics, Visualization, and Computer Vision (WSCG)

2001-2014

·   International Multi-Conference on Society, Cybernetics and Informatics (IMSCI)

2011, 2014, 2015

·   IEEE Conference on Visual Analytics Science and Technology (IEEE VAST) Challenge

2011, 2014

·   IEEE Information Visualization Symposium

2001-2009, 2014

·   International Conference on Education, Training and Informatics (ICETI)

2010-2011, 2014, 2015

·   IEEE Visualization Workshop on Visualization for Computer Security  (VizSec)

2005-2006, 2008-2014

·   International Conference on Education and Information Systems, Technologies and Applications: EISTA

2007-2009, 2011, 2013-2014

·   International Conference on Data Mining and Intelligent Information Technology Applications

2013

·   IEEE Control Systems Society Conference Management System 

2013

·   IASTED International Conference on Computers, Graphics, and Imaging (CGIM)

2003-2005, 2007-2008, 2010-2013

·   International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA)

2012

·   International Conference on Next Generation Information Technology (ICNIT)

2012

·   Cyber Security and Information Intelligence Research Workshop (CSIIRW)

2011-2012

·   International Conference on Education, Informatics, and Cybernetics (icEIC)

2011, 2012

·   International Conference on Advanced Information Management and Service

2011

·   International Conference on Interaction Sciences: IT, Human and Digital Content

2011

·   Information Technology Interfaces (ITI)

2011

·   IASTED International Conference on Graphics and Virtual Reality (GRVR)

2011

·   SPIE Conference on Visualization and Data Analysis (VDA)

2002-2011

·   International Conference on Information Technology Interfaces (NCM)

2010-2011

·   Systematic Approaches to Digital Forensics Engineering (SADFE)

2007-2008, 2010-2011, 2015

·   International Conference on Politics and Information Systems, Technologies and Applications (PISTA)

2011

·   International Conference on Computer Sciences and Convergence Information Technology

2010

·   International Symposium on Engineering Education and Educational Technologies

2010

·   International Conference on Networked Computing and Advanced Information Management

2010

·   International Workshop on Forensics for Future Generation Communication environments

2007, 2009-2010

·   IEEE Visualization

2000-2001, 2003-2009

·   IEEE Visual Analytics Science and Technology

2006-2009

·   SECRYPT (Int’l Conference on Security and Cryptography)

2006-2009

·   International Conference on Education and Information Systems: Technologies and Applications

2005,2008

·   International Conference on Coordinated & Multiple Views in Exploratory Visualization

2003-2005, 2007

·   The IEEE SMC Information Assurance Workshop

2005-2007

·   IASTED International Conference on Graphics and Visualization in Engineering

2006-2007

·   International Conference on E-Business and Telecommunication Networks

2005

·   IASTED International Conference on Visualization, Imaging, and Image Processing

2001, 2002, 2004

·   IEEE Visualization Conference (Applications papers)

2003-2004

·   International IPSI-2004: Symposium on Challenges in the Internet and Interdisciplinary Research

2004

·   International Conference on Information Visualization

2004

·   IASTED  Modeling, Simulation and Optimization

2004

·   IASTED Applied Simulation and Modeling

2004

·   High Performance Computing Symposium (Advanced Simulation Technologies Conference)

2004

·   IASTED International Conference on Circuits, Signals, and Systems

2003

·   IASTED Conference on Applied Informatics

2003

·   IASTED Conference on Modeling, Identification, and Control

2003

·   IASTED Conference on Applied Modeling and Simulation

2002

·   Engineering and Applications (SEA 2002)

2002

·   SPIE Conference on Visual Data Exploration and Analysis

1995-2001

·   Workshop on Fundamental Issues of Visualization

2001

·   International Conference on Computer Graphics, Visualization and Interactive Digital Media

2000

·   International Conference in Central Europe on Computer Graphics and Visualization

1999

·   IEEE InfoVis LBHT

1999

 

 

Books:

 

·   Springer US

2005-2006

·   John Wiley & Sons

2004

·   Morgan-Kaufman

2001

·   SPIE Press

1999-2001

 

 

Student Advising (Dates listed indicate when defenses were passed):

 

Masters Thesis Advisor (and 6970 Advisor):

 

·   RB Whitaker, “Applying Information Visualization to Computer Security Applications”

04/2010

·   Anupama Biswas, “Impact and Analysis of System and Network Attacks”

11/2008

·   Ryan Shelley, “A novel technique of network auditability with managers in the loop”

05/2008

·   Steena Monteiro, “A Novel Authentication and Validation Mechanism for Analyzing Syslogs Forensically”

05/2008

·   Sarah Moody, “Automated Data Type Identification and Localization using SÁDI - Statistical Analysis Data Identification”

05/2008

·   Jason Daniels, “Forensic and Anti-Forensic Techniques for OLE2-Formatted Documents”

05/2008

·   Quint Wheeler, “A Secure Database Implementation for Personal Information Storage”

11/2006

·   Sheldon Teerlink, “Visual Forensic Analysis of Hard Disks”

12/2004

 

 

Masters Project Advisor (and 6970 Advisor):

 

·   Harish Kumar Modugu, “DMMasker: A Data Sanitization Tool for Ideasis”

6/2010

·   Gokul Krishnan, “Extending Search Capabilities of Advanced Network Situational Awareness Tools”

6/2010

·   Santhi Swarup, “Integrating Maps into AdviseAid”

6/2010

·   Srinidhi Kakani, “Clustering Files:Digital Profile System”

11/2008

·   Anusha Davuluri, “Force-Based Visualization”

07/2008

·   Sriram Iyer, “Network Data Miner”

12/2006

·   Shashi Prakash, “Intrusion Detection: Detecting Masquerades Using UNIX Commands”

9/2005

·   Zhifu You, “A 3D Shape Measurement System”

3/2005

·   Srilakshmi Bobba, “Enhanced Security for Credit Card Databases”

2/2005

·   Vikas Deshpande, “An Evaluation Of Filtering Techniques In Naïve Bayesian Spam Filter”

11/2004

·   Scott Ivani, “UNIX File Scanner and Virus Checker”

7/2003

·   Siddarth Pandit, “Visual Intrusion Detection Interaction”

7/2003

·   Phyo Nyunt - “Intrusion Detection System Collection of Data and Visualization”

7/2003

·   Menashe Garber - “Intrusion Detection Visualization and Analysis”

7/2003

·   Min Wu - “Applications of Information Retrieval Techniques to Intrusion Detection”

6/2003

·   Narayana Vadlamani - “Research into Collaborative Virtual Environments”

8/2002

·   Zhouxuan Teng - “Visualization for Intrusion Detection”

5/2002

·   Kenneth Walker - “Research into Visual Intrusion and Misuse Detection”

5/2001

·   Ken Swarner - “Visualization of Gel Generated Gene Comparisons”

5/2000

 

 

Doctoral Dissertation Advisor:

 

·   Steena Monteiro (USU)

5/08-12/09

 

 

Doctoral Dissertation Committee:

 

·   Chen Zhong (PSU)

11/14-Present

 

 

Masters Project Committees:

 

·   Keerthana Janaswami, “ShopMobile: A Mobile Shopping Aid for Visually Impaired Individuals”

2/2010

·   Ravi Shankar Sathish, “TRIP AND RECREATION MAP SERVER (TRMS)”

8/2004

 

 

Masters Thesis Committees:

 

·   Renée Etoty, “Evaluation of the Presentation of Network Data via Visualization Tools for Network Analysts: Comparison of Node-Link, Parallel Coordinates and Tabular Displays

05/2014

·   Sathyaraj  Balasubramanian, “Strides Towards Better Application Security”

11/2008

·   Brian Norman, “Botnet Analysis and Classification”

12/2007

·   Mansi Amin, “Analysis of a Combined Scheme of Digital Watermarking and Compression”

6/2005

·   Terry G. Ballard, “Optical Flow Structure, Retinal Field, and the Perception of Ego Speed”

5/1999

 

 

Teaching and Other Research Mentoring:

 

Tutorials:

 

·   “Introduction to Digital Forensics Research.” At the 2008&2009 Security and Management Conference, Las Vegas, NV.

7/2008, 7/2009

·   “Introduction to Information Assurance: How secure is your data?” at the SPIE Symposium on Electronic Imaging, Santa Clara, CA.

1/2003

 

 

Undergraduate Courses (1000-4000):

 

·   Operating Systems, 3100 (Spr ‘2005-‘2010): 15-40 Students/Class

 

·   Introduction to Computer Graphics, 5400 (Spr ‘1999, Fall ‘1999-’2002): 25-35 Students/Class

 

·   Systems Programming (Spr ‘2000-`2003): 100-150 Students/Class

 

·   Introduction to Programming and Problem Solving using C++ (Fall ‘98, Spr ‘99): 20-30 Students

 

·   Introduction to Computer Science (Fall ‘98): 20-30 Students/Class

 

·   Exploring the Internet (Spr ‘96, 2´Spr ’97, 3´Sum ‘97, Fall ‘97, 2´Spr ‘98): 20-30 Students/Class

 

 

 

Graduate Courses (5000+):

 

·   Doctoral Seminar, 7900 (Spring ‘2007)

 

·   Advanced Computer Security Research,  7460 (Fall ‘2005, Spring ‘2007, Fall ‘2008, Fall ‘2009): 4-30 students/Class

 

·   Computer Security, 6450 (Spr 2003, Spr ‘2004-‘2006, Fall ‘2006, Spring ‘2008):  15-35 Students/Class

 

·   Computer Visualization (Spr ‘2001-`2002): 5-10 Students/Class

 

·   Introduction to Computer Graphics (Spr ‘1999, Fall 1999-2002, Fall ‘2003-’2009): 10-40Students/Class

 

 

 

Undergraduate Independent Studies (CS5950, CSI 497):

 

·   Stephen Miller - Advanced problem solving techniques and methods

Spring 2007

·   Joshua Dawson - Integration of user interface design, networking, and databases in web development

Summ 2006

·   Jason Maughan - Computer forensics based analysis. Student from ECE.

Spring 2006

·   Ryan VanSickle - Computer forensics based analysis. Student from ECE.

Spring 2006

·   Benjamin Galloway - Visualization of sensory input and wave guides

Spring 2006

·   Erik Falor - Development within a statistical visualization environment

Fall 2005

·   Carl Ellsworth - Analysis of database model security and effectiveness

Fall 2005

·   Kim Christensen - Development of an visualization-based IDS architecture and associated techniques

Fall 2005

·   John Forsyth - Development of a Bioinformatics-based Visualization System

Spring 2005

·   David McDonald - Comparison and Analysis of Web-Based Graphics APIs

Fall 2004

·   Alan Sorensen - Explore modification to a visual intrusion detection environment

Summ 2004

·   Sean Spillane - Enhancements to visual intrusion detection and monitoring facilities and infrastructure

Spring 2003

·   Christopher Kardell - Visual simulation of wireless networks

Fall 2002

·   Steve Hart - User interfaces for analyst feedback

Spring 2002

·   Brian Kandel - Network traffic simulation and visualization

Fall 2001

·   Ovais Qadir - Automated file parsing and linking

Spring 2001

·   Julee MatharKutty - User studies in the analysis of visual gambling perception

Spring 2001

·   Sean Spillane - Undergraduate teaching assistant for CSI402 - Systems Programming

Spring 2000

 

 

Undergraduate Senior Projects in Computer Science (CSI 499):

 

·   Nicholas Howansky, Web-based store development

Spring 2003

·   Karl Sobylak - Interactive Refinement to Intrusion Detection Analysis. Recipient of a SUNY-Albany Presidential award for undergraduate research as a result of this work.

Fall 2002

·   Heather Sundberg - Visual Representation of Gambling Odds For Behavior Modification

Spring 2000

 

 

Graduate Directed Readings and Independent Studies (CS 7950, CS 6950, CSI 694):

 

·   Steena Monteiro - Background and applications of Basis Functions to Digital Forensics

Fall 2009

·   Santhi Swarup - Feature development and implementation for visualizations in AdviseAid

Spring 2009

·   Gokul Krishnan - Identification and implementation of advanced search facilities within AdviseAid

Spring 2009

·   Harish Kumar Modugu - Analysis of Web-Based Security Techniques

Fall 2008

·   Steena Monteiro - Network Forensics and Attack Graphs

Fall 2008

·   Swathi Gudipali - Computer Forensics

Spring 2008

·   Chris Harris - Self Aware Data with Security and Forensics

Fall 2007

·   Sarah Moody - Network Forensics

Fall 2007

·   Manas Narkar - Attack Graph Analysis

Fall 2007

·   Vineela Kalluru  - Legal Admissibility and Digital Forensics

Fall 2007

·   Anusha Davuluri - State of the Art in Force-Directed Graphs

Fall 2007

·   Uday Ramayanam - Data hiding Techniques in Computer and Network Forensics

Fall 2007

·   Anupama Biswas - Impact Analysis of Cyber Attacks

Summ 2007

·   Shalini Rathnavel - A Literature Survey on Network Forensics

Summ 2007

·   Trent Cameron - Literature Search and Report on Botnet Detection Algorithms and Techniques

Summ 2006

·   Sam George - Report on Growth Algorithm Literature Search and Applications to Masters Thesis

Spring 2006

·   John Mulholland - Report on Background of Intrusion Detection and Computer Security

Spring 2006

·   Richard Swart - Report on Security Background and User Studies for Forensics and Intrusion Detection

Spring 2006

·   James Whiteley - Research and Survey of Computer Security Topics

Spring 2005

·   Shashi Prakash - Wireless Network Security Analysis

Spring 2004

·   Menash Garber - Network Data Based Port Monitoring and Analysis

Fall 2003

·   Zhouxuan Teng, “Intrusion Detection and Analysis Literature Survey”

Spring 2003

·   Pinal Chhowala -Intrusion Detection Research

Spring 2003

·   Menashe Garber - Game Engine Development

Spring 2003

·   Niquiche Sangster - Visualization of Biological Data

Spring 2002

·   Aasavari Gokhale - Research into Data Collection of Data For Network Traffic Monitoring

Fall 2001

·   Bill Augustine - Research into Data Collection of Data For Network Intrusion Detection

Summ 2000

·   Xiaochun Huang - Research into Visual Representation of Concurrent Processing For Debugging

Spring 2000

·   Narayana Vadlamani - Visualization of Hummer Data For Network Intrusion Detection

Spring 2000

 

 

Curricular Practical Training Co-op Students:

 

·   Stephen Miller - USU CS Department

Fall ‘07

·   Cassi Bergman - USU CS Department

Spring ‘04

·   Sriram Iyer - Ingeo Systems, Inc.

Fall ‘04

·   Kim Christiansen - USU CS Department

Fall ‘04

 

 

Other Graduate Advising/Mentoring:

 

·   Steena Monteiro - Internship at PNNL, summer 2009
                            2008 Grace Hopper ACM Student Research Competition (Poster)
                             Microsoft and IBM Travel Scholarships to the 2008 Grace Hopper conference
                             Full NSF Travel Scholarship to the 2007 Grace Hopper conference

                            2008 Google Workshop for Women Engineers

                             Presented at SADFE 2008

                             NSF Travel Grant to attend SADFE 2008

2007-2009

·   Sarah Moody - 2007 Summer Internship at PNNL

                             Attended  SADFE 2007

                             Presented at SADFE 2008

                             NSF Travel Grant to attend SADFE 2008

                             ACMW Travel Grant to attend SADFE 2008

2007-2008

·   Anupama Biswas - 2008 Grace Hopper ACM Student Research Competition (Poster)
                             Full NSF Travel Scholarship to the 2008 Grace Hopper conference
                             2008 Google Workshop for Women Engineers

                                       2008 CRA-W Grad Cohort Workshop

2007-2008

·   John Mulholland - Attended the 2007 SADFE Workshop

2007

·   Karl Sobylak - Attended 2002 Workshop on Computer Forensics. Received a Full Travel 
                            Scholarship.

2002

 

 

Other Advising/Mentoring:

 

·   ACM Programming Contest Coach

2006-2009

·   Tech-Topia Regional Software Development Challenge Sponsored by CA. Team included: Stephen Miller, Rajesh Kolla, RB Whitaker, and Kamath Purushotham Contest Coach/Advisor

2007

·   Undergraduate Senior Project  (Engineering) - Scott Haymore, Jason Maughan, and Ryan VanSickle, “Digital Profiler System: Computer Forensics Software”

2006

·   ACM Programming Context Coach (With Dan Watson).

2004-2005

·   Josh Wheeler, Alejandro Garcia, Darren D’Orlando, and Matt Jenson – Microsoft Windows CE Challenge Mentor (With Steve Clyde).

2004

·   Gyamfi Yaw - Bioinformatics-Based Computation and Analysis. Ronald McNair Post Baccalaureate Program.

2003

·   Justin Lintz - Network-Based Intrusion Monitoring and Analysis Data Collection Issues

2002

·   Karl Sobylak - Histogram-based intrusion signature analysis. Recipient of a University of Idaho
travel grant to attend the 2002 Workshop on Computer Forensics (Based on this work).

2002

·   Joe Quinion - Intrusion Data Collection Enhancements and Analysis

2002

 

 

Guest Lectures:

 

·   CS 7000 - Research Interests and Current Projects

Semesterly

2003-2009

·   MIS 6800 - Basics of Digital Forensics and Associated Research Directions

3/2008

·   ECE 5930 - Computer Security and Forensics Research Directions

8/2007

·   CS 3000 - Computer Security Basics, Single Day Lecture

Semesterly

2003-2006

·   CS 6900 - Visualization and Computer Security Research Overview, single Day Lecture

Semesterly

2003-2007

 

 

Graduate Interns and Post-Docs

 

·   Eric Graves

03/14-Present

·   Renee Etoty, Towson University

10/12-06/14

 

 

Graduate Research Assistants

 

·   Steena Monteiro

5/07-12/09

·   RB Whitaker

1/08-6/09

·   Chris Harris

1/08-6/09

·   Anupama Biswas

1/08-12/08

·   Gokul Krishnan

1/08-4/08

·   Anusha Davuluri

2/07-4/08

·   Srinidhi Kakani

1/07-4/08

·   Sarah Moody

2/07-12/07

·   Purushotham Kamath

9/06-12/07

·   Rajesh Kolla

5/07-12/07

·   Matt Manley

9/06-1/07

·   John Mulholland

11/05-5/07 9/04-12/04

·   Nirupa Iyer

5/06-8/06

·   Ramya Venugopalan

5/06-8/06

·   Zheng Lu

9/05-12/05

·   Kanti C Surapaneni

9/04-5/05

·   Zhouxuan Teng

9/01-6/03

·   Kenneth Walker

9/00-5/01

 

 

Undergraduate Research Assistants

 

·   Stephen Mill.er

2/07-2/08

·   Jason Newbold

1/08-5/08

·   RB Whitaker

9/06-12/07

·   John Forsyth

1/05-3/07

·   Chad Coats

9/06-1/07

·   Kim Christensen

9/04-6/06

·   Amanda Sundberg

5/05-6/06

·   Cassie Bergman

1/05-9/05

·   Karl Sobylak

6/02-5/03

 

 

New Courses Developed:

 

·   Advanced Computer Security Research (Doctoral Level)

Fall ‘2005

·   Introduction to Information Security and Intrusion Detection (Graduate Level)

Spring ‘2003

·   Introduction to Computer Visualization (Graduate Level)

Spring ‘2001

 

 

New Curriculums Developed for Existing Courses:

 

·   Computer Security. Deployed a new exam format to more effectively target student understanding.

Spring 2008

·   Operating Systems. Modified the course to include networking. Added pair programming.

Spring 2007

·   Advanced Computer Security. Refocused the course on digital forensics

Spring 2007

·   Introduction to Information Security and Intrusion Detection (Graduate Level). Modified course content to be more up to date. Increased discussion of theory and foundational models.

Spring 2005

·   Computer Graphics. Switched textbooks from Computer Graphics using OpenGL by Hill to Interactive computer Graphics: A Top Down Approach Using OpenGL by Angel. This switch was made to better meet the needs of the students. Adapted course material to better fit local student population

Fall 2004

·   Operating Systems. Added security component.

Spring 2004

·   Systems Programming (Undergraduate Level). Changed textbook and modified course content to be more up to date.

Spring 2000

·   Computer Graphics (Shared Resource). Modified course to be dependent on OpenGL.

Fall 1999