The analysis phase of the digital forensic process is the most complex. This phase grows more complicated as the size and ubiquity of digital devices increase. Graph theory is used to study the pairwise relations between objects. We explore how graph theory can be used as a basis for further analysis.View Paper View Slides
We investigate the needs, gaps and scientific challenges of industrial control systems. We apply research to prove theory and validate efforts of those working field deployment, and to ensure the realism of fundamental research.
The software-defined networking (SDN) field needs simple, general, and reusable abstractions for changing the configuration of the network in order to implement legacy security application such as firewalls. We begin to explore semantics of: per-packet and per-flow consistency to accomplish this task.View Slides View Code
This coordinated, multidisciplinary effort, we will draw on the strengths and expertise of the College of Engineering, College of Education, School of Information Sciences, and the Information Trust Institute at the University of Illinois at Urbana-Champaign to expand upon strong existing technology focused educational programs in cybersecurity at the University of Illinois to establish a curriculum addressing the ethical dimensions of cybersecurity.View Website