Current PhD Students
- •Adrian Tang
- •David Tagatac (firstname.lastname@example.org)
Symbiote defense against concurrency attacks
- •Yuan Kang
Symbiotes and self-monitoring monitors
- •Jill Jermyn
Decoy technology for Android Apps
Miranker (email@example.com) Professor, Univ Texas at Austin
"Treat: A New and Efficient Match Algorithm for AI Production Systems," 1987.
- •Stephen Taylor (firstname.lastname@example.org)
"Parallel Logic Programming Systems (Completed at Technion)," 1987.
- •Alexander Pasik (email@example.com)
"A Methodology for Programming Production Systems and Its Implications on Parallelism," 1989.
- •Michael van Biema (firstname.lastname@example.org)
"Constraint-Based Invocation: Integrating the Object-Oriented and Rule-Based Paradigms," 1990.
- •Russell Mills (degree
"llC: A Hierarchial Parallel Programming Language," 1992.
- •Nathaniel Polish (email@example.com)
"Mixed Distance Measures for the Optimization of Concatenative Vocubularies in Speech Synthesis," 1993.
- •Hasanat Dewan (firstname.lastname@example.org)
"Runtime Reorganization of Parallel and Distributed Expert Database Systems," 1994.
- •Jason Glazier (email@example.com)
" Dynamic Neighborhood Bounding: An Error Reduction Technique for Monte Carlo Simulation," 1994.
- •David Espinosa (firstname.lastname@example.org)
"Semantic Lego: A Modular Theory of Interpreters," 1995.
- •Mauricio Hernandez (email@example.com) IBM Almaden
"A Generalization of Band Join and its Application to the Merge/Purge Problem," 1996.
- •Philip Chan
"An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning," 1997.
- •David Ohsie (firstname.lastname@example.org) Smarts
"Codebook-based Fault Diagnosis in Network Management," 1998.
- •Andreas Prodromidis (email@example.com) Director of
"Efficiency and Scalability of Distributed Data Mining, Pruning and Bridging Multiple Models," 1998.
- •Wenke (firstname.lastname@example.org) Professor, GA Tech
- •Dave (Wei)
Fan (email@example.com) IBM Hawthorne
"Cost-sensitive, scalable adaptive learning," 2000.
- •Eleazar (firstname.lastname@example.org) Professor, UCLA
- •Shlomo Hershkop (email@example.com)
"The Yank Spam Detection System," 2004.
- •German Creamer (firstname.lastname@example.org) Professor,
Steven Institute of Technology
"On the use of boosting in financial prediction," (co-advisor: Y. Freund) 2005.
- •Ke (email@example.com) Google
- •Janak Parekh (firstname.lastname@example.org)
"Privacy-preserving Distributed Event Corroboration," 2007.
- •Wei-Jen Li (email@example.com)
"Malcode-bearing Documents", 2008.
- •Vanessa Friaz-Martinez (firstname.lastname@example.org) Telefonica, Spain
"Behavior-based Access Control," 2008.
- •Gabriela Cretu (mailto:email@example.com) RTI
"STAND Anomaly Detection Learning Strategies," 2009.
- •Brian Bowen
"Decoy Networking," 2010.
- •Malek (Malek@cs.columbia.edu)
- •Yingbo (firstname.lastname@example.org)
- •Ang Cui (email@example.com)
"Symbiotic Embedded Machine and Embedded Device Insecurity"
Relative Metrics of Security for Defense in Depth Architectures
"A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems," 1999.
"Probabilistic methods in Intrusion Detection and Genomics," 2002.
"Network Payload-based Anomaly Detection and Content-based Alert Correlation," 2006.
"Insider Threat, 2011"
"Privatizing Network Traces, 2012"