Faculty Research Interests
- Explainable AI for Network Intrusion Detection
- Anomaly Detection in Autonomous Driving Systems
- Human Decision-Making in CPS Security
- Game Theory for Proactive Security
- Internet of Things (IoT) and Cyber-Physical Systems (CPS) Security, Security and Privacy in Cloud-Enabled Internet of Things (CE-IoT), Access Control and Communication Control Models and Architectures, Edge Computing, Cybersecurity Education
- Online and hybrid education
- Women in technology
- Data automation, business intelligence and artificial intelligence
- Homeland Security
- Intelligence and Decision Making Information Technology
- Risk Management and Critical Infrastructure Protection
- Energy Security
- Military Veteran
- Project Management
- Requirements Management
- Quality Management
- IT Business Analysis
- Cybersecurity Governance
- biometrics, fingerprint
- imaging
- graphics
- game development
- visualization
- computational linguistics
- High Performance Computing
- Cloud and Grid Computing
- Operating Systems
- Distributed Systems
- Machine Learning, Digital Media Forensics, and Computer Vision
- Gamification
- Technology Supported Active Learning
- IT and Project Management Education
- Social Engineering
- Cybersecurity Education
- Collaborative Learning
- Games Research
- Virtual Reality
- Human-Computer Interaction
- Digital and Cyber Forensics
- Cybersecurity
- User and Data Privacy
- Cyber Forensic Intelligence
- Machine Learning Applications in Cyberforensics and Security
- Information Governance
- Computer supported collaborative learning
- Student Persistence
- Operations Excellence
- Lean Sustainability
- Six Sigma
- Industry 4.0
- Quality 5.0
- Wireless networks, sensor networks, security and trust.
- Computer networks, security and trust issues.
- Crowdsourcing
- Human-AI Collaboration
- Sensemaking
- Security and privacy issues in networked/mobile/distributed systems, AI and machine learning, indoor localization/navigation systems, wireless networks, mobile crowdsourcing, mobile systems for disabled people, cloud and edge computing, and social network
- Identify how computational model-based reasoning can effectively support scientific inquiry learning, problem-solving, and innovation processes in the context of authentic modeling and simulation practices.
- Identify how embodied-based learning can enable students to attain, retain, and apply threshold concepts in STEM by integrating visual and haptic modalities.
- Identify how students develop computer and data science self-regulated learning skills enabled via a computational cognitive apprenticeship.
- Identify the role of sociology in computing learning within the context of technology-enabled environments.
- Integrating computational, scientific, and engineering thinking into K-12 education
- Leverage the affordances of learning analytics and AI to support student learning in computing-intensive domains.
- Multiagent Systems
- Robotic Systems
- Software Development and Engineering
- STEM Outreach
- Robotics
- Human-Robot Interaction
- Robot Learning
- Multi-Robot Systems
- Software Defined Networks (SDN)
- Network Functions Virtualization (NFV)
- Cloud-native Infrastructure
- Computer Networks
- Network Observability
- AI/ML applications to networking
- Data management
- Responsible data science
- Machine learning
- System & Network Administration
- System & Network Security
- Knowledge representation and reasoning, natural language understanding, AI
- Behavioral Profiling of Consumers of Online Child Pornography
- Cyber Adversarial Predictive Modelling
- IT Insider Threats
- Computer Forensics
- Psychological Crime Scene Analysis
- Applied forensic behavioral analysis
- Philosophy of Science: Scientific evolutions
- Underground Soil Sensing
- Internet of Underground Things
- Antennas and Electromagnetic Wave Propagation in Stratified Media
- Digital Agriculture
- Vehicular Communications
- Wireless Underground Communications
- Sensor-Guided Irrigation Systems
- Computer Vision and Machine Learning
- Personality & Motivation of Cyberdeviants
- Child Sexual Exploitation
- Behavioral Analysis of Digital Evidence
- Automated Antenna Systems
- Broadband Wireless Access
- Data Science
- Machine and Deep Learning
- Privacy-enhancing Technologies
- AI/ML for privacy and security
- Blockchain
- Machine Learning, Mobile/Wearable Computing, and IoT
- Information Integration and Informatics
- Healthcare Informatics
- Biometric Authentication
- Cyber-Physical-Social Security and Privacy
- Machine Learning and Reinforcement Learning
- Blockchain Techniques
- Game Development and Design
- Virtual/Augmented Reality
- Physically Based Rendering/Global Illumination
- Modeling, Simulation, Visualization
- Software Engineering
- Computer Programming Education
- Applied Machine Learning
- Big Data
- Cybersecurity