M. Hossain Heydari, Ph.D. |
|
|||||
Professor, Computer Science Director, Graduate
Information Security Program |
||||||
Professional Activities Publication Chair, Proceedings of New Security Paradigm Workshop, 2007-2009. Proceedings Editor: New Security Paradigm Workshop, 2007-2009. Referee:
Refereed papers for several journals and proceedings. Funded Grants: Principal
Investigator (PI) for over $1 million NSF, DoD, and other agencies’
grants. Also Co-PI for over $2.3 Million Scholarship for Service
grant, funded by NSF. Please see the detailed list at the end of the vita. Co-advisor, Cyber Defense Club since 2005:
Our Cyber
Defense Club brings together a large number of undergraduate and graduate
students who meet weekly to learn different security tools, get hands-on
experience in our Cyber Security lab, and prepare to participate in national
Cyber Defense Competitions. Our team has consistently ranked as one of the
top teams in these competitions. We send members of our Cyber Defense team to
high schools to present engaging security demos and promote Cyber Security
Education. Bootcamp Organizer (outreach): M. Hossain Heydari, Brett Tjaden, and Steve Wang, developed several lectures and
hands-on exercises for 3 week-long Cyber Defense Bootcamp for High School Technology
Teachers, supported by NSF and NSA and Virginia CIT, summers 2013, and
15. Served as the PI for the grants and the project director. Cyber Defense Competition Organizer: Brett Tjaden and M. Hossain Heydari, organized a Cyber Defense
Competition for High School Students. Scholarly Activities Areas of Research Interest: Information
Security, Internet of Things Security, Interconnection Networks and Parallel
Architectures, Telecommunication Networks, E-Commerce, VLSI Layout and
Routing, and Computer Science Education. Book
Chapters: Xunhua Wang, Brett Tjaden,
and M. Hossain Heydari,
“Bitcoin for E-Commerce: Principles and Applications”, Encyclopedia of
E-Commerce Development, Implementation, and Management, 2016. Xunhua Wang, Ralph Grove, and M. Hossain Heydari, “Secure
electronic voting with cryptography. In Hamid R Nemati and Li Yang, editors, Applied Cryptography for Cyber Security and Defense: Information
Encryption and Cyphering, chapter 12, pages
271-288, Information Science Reference, 2010. |