M. Hossain Heydari, Ph.D.

 

Home

Teaching

Publications

Grants

Contact

http://www.jmu.edu/_images/cs/faculty-staff-images/heydari.jpg

 

Professor, Computer Science

Director, Graduate Information Security Program

 

Professional Activities

 

Publication Chair, Proceedings of New Security Paradigm Workshop, 2007-2009.

Proceedings Editor: New Security Paradigm Workshop, 2007-2009.

Referee: Refereed papers for several journals and proceedings.

Funded Grants: Principal Investigator (PI) for over $1 million NSF, DoD, and other agencies’ grants. Also Co-PI for over $2.3 Million Scholarship for Service grant, funded by NSF. Please see the detailed list at the end of the vita.

Co-advisor, Cyber Defense Club since 2005:  Our Cyber Defense Club brings together a large number of undergraduate and graduate students who meet weekly to learn different security tools, get hands-on experience in our Cyber Security lab, and prepare to participate in national Cyber Defense Competitions. Our team has consistently ranked as one of the top teams in these competitions. We send members of our Cyber Defense team to high schools to present engaging security demos and promote Cyber Security Education.

Bootcamp Organizer (outreach): M. Hossain Heydari, Brett Tjaden, and Steve Wang, developed several lectures and hands-on exercises for 3 week-long Cyber Defense Bootcamp for High School Technology Teachers, supported by NSF and NSA and Virginia CIT, summers 2013, and 15. Served as the PI for the grants and the project director.

Cyber Defense Competition Organizer: Brett Tjaden and M. Hossain Heydari, organized a Cyber Defense Competition for High School Students.

 

Scholarly Activities

 

Areas of Research Interest:

Information Security, Internet of Things Security, Interconnection Networks and Parallel Architectures, Telecommunication Networks, E-Commerce, VLSI Layout and Routing, and Computer Science Education.

Book Chapters:

Xunhua Wang, Brett Tjaden, and M. Hossain Heydari, “Bitcoin for E-Commerce: Principles and Applications”, Encyclopedia of E-Commerce Development, Implementation, and Management, 2016.

Xunhua Wang, Ralph Grove, and M. Hossain Heydari, “Secure electronic voting with cryptography. In Hamid R Nemati and Li Yang, editors, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, chapter 12, pages 271-288, Information Science Reference, 2010.