麻豆传媒

Expert Directory

Showing results 1 – 3 of 3

Tirthankar Ghosh, Ph.D.

Professor and Associate Chair

University of West Florida

Computer Engineering, Computer Science, Cybersecurity, Electrical Engineering, network security, threat intelligence

Dr. Tirthankar Ghosh is a Professor and Associate Chair in the Department of Computer Science at UWF. Dr. Ghosh joined UWF in 2018 after spending 13 years at St. Cloud State University in Minnesota as their lead cybersecurity faculty and program director. He has over seventeen years of experience in cybersecurity education and research in network security, ICS security, anomaly detection, and adversary tactics techniques and procedures, and threat intelligence.

Dr. Ghosh has received multi-million dollars of grants from NSF, NSA, State of MN, state of FL, and private sectors. He established a funded research lab on industrial control systems using motes from Linear Technologies and Emerson Process Management on St. Cloud campus and has experience in leading several state-funded projects on scenario-based, competency-focused, learner-centric curriculum design using the NIST NICE Cybersecurity Workforce Framework.

Dr. Ghosh was the co-founder of a state-wide consortium in Minnesota and a regional cybersecurity consortium in St. Cloud. Dr. Ghosh authored a book titled 鈥淪ecurity by Practice: Exercises in Network Security and Information Assurance鈥, and several journal papers and book chapters. He is also an ABET evaluator for Cybersecurity and Computer Science.

Konstantinos Kyriakopoulos, PhD

Lecturer in Digital Communications

Loughborough University

network security

Network performance monitoring, Network security, Anomaly-based Intrusion detection, Data fusion, Knowledge engineering

Kostas' research interests include computer network performance monitoring and management, network security through cross-layer measurements and data fusion techniques.

cyber physical systems, energy analysis, network security

Salman researches cryptography for secure communications in lightweight devices and techniques for conserving battery power in those devices since cryptographic functions are power-hungry. Projects include a node that can be placed in streams to collect data such as temperature and pH levels. The node collects the data and sends it to a drone that is flown near it, enabling researchers to collect data without disturbing the device in the water or the ecosystem surrounding it. He also explores the security and privacy concerns in tracking devices used in hospitals to track patients and hospital staff as they move from location to location. Since the patients and staff do not carry cell phones, the technology would be helpful in tracking them, but maintaining patients’ privacy is a HIPPA requirement and should be embedded in such technology.

Salman received doctoral and master's degrees in computer engineering from George Mason University and a bachelor's degree in computer engineering from the Arab Academy for Science and Technology.

Showing results 1 – 3 of 3

close
0.19391