Cybersecurity
EECS researchers develop, verify, and field high assurance information systems. Expertise includes theoretical modeling, synthesis and verification, security modeling and analysis, network and database security. Additionally, researchers explore user privacy and security issues in centralized, distributed, and Web environments. Expanding leading-edge cyber security and defense mechanisms earned EECS a federal National Center of Academic Excellence in Information Assurance Education designation.
Program Objectives
- Understand the cryptographic foundations of information security.
- Understand and able to employ common encryption/decryption protocols.
- Understand the fundamental principles, models and algorithms in information and systems security.
- Understand the risks, vulnerabilities, threats, and attacks in computer and communications systems.
- Understand the state-of-art protection and defense mechanisms, and the theoretical foundations behind the mechanisms.
- Understand the theories, principles, and state-of-art practices on dependably and fault-tolerant systems.
- Understand user privacy issues and protection mechanisms, in centralized, distributed, and Web environments.
Associated Faculty
Director of the Institute for Information Sciences
palexand@ku.edu
785-864-8833
Perry Alexander's Website
2022 Eaton Hall
Primary Research Interests
- Formal Methods, Verification, and Synthesis
- Trusted Computing
- System-Level Design Languages and Semantics
- Specification Languages
Primary Research Interests
- Cybersecurity from a systems perspective
- Moving target defenses
- Enterprise network security
- Bringing social sciences into cybersecurity
Primary Research Interests
- Security
- Privacy
- Secure Design
- Mobile and Embedded Software
- Program Analysis
Primary Research Interests
- High-Performance Networks
- Mobile Networking and Wireless Systems
- Pervasive Computing Systems
- System Implementations
Primary Research Interests
- Data mining
- Knowledge discovery
- Machine learning
- Expert systems
- Reasoning under uncertainty
- Rough set theory
Primary Research Interests
- Hardware Trust Verification
- Hardware IP protection from piracy and reverse engineering
- CAD tool development for hardware security and trust
Primary Research Interests
- IoT Security and privacy
- Adversarial Machine Learning
- Social network privacy
- Network security
- Secure data sharing and publishing
Primary Research Interests
- Information security and privacy, database security
- Information retrieval, Web and online social networks
- Security and privacy issues in smart grid systems
- XML and conventional database systems, data management
Primary Research Interests
- Digital systems
- Microprocessors
- Embedded Systems
Primary Research Interests
- Software architecture
- Formal methods in software engineering
- Cybersecurity and information assurance
- Secure software engineering
- Software process and project management
- Software engineering education
Associated Facilities
- SELinux installation
- Virtualization environment
- SAL, PVS, and Isabelle verification tools and expertise
- Rosetta specification and analysis capabilities
- Computational cluster with over 1,000 processors connected to 37 TB of on-line storage