Just as technology has made more things possible, it has also introduced new risks. Today, computer systems run everything from our air traffic systems to controls in a nuclear power plant, from operating rooms to the stock market. It is imperative that we protect critical systems from hacking, the planting of malware, phishing, ransomware, and distributed denial-of-services attacks. However, to build effective protections, you need to understand how the business/organization works, how the system was designed and it’s vulnerabilities, how the network was constructed, and how people use (and abuse) the system. The constantly evolving world of computer and information systems requires more sophisticated approaches to protecting systems, data, and people. Our faculty and doctoral students are working on a range of projects and problems that will change how future systems are designed and built:

Active Research Projects:

TitleFunding SourceProject TimeframeFaculty Involved
Towards Security Assured Cyberinfrastructure in PennsylvaniaNational Science Foundation2014 - 2018James Joshi, PI; Michael Spring, Co-PI; Balaji Palanisamy, Co-PI; Prashant Krishnamurthy, Co-PI
A Curriculum for Security Assured Health InformaticsNational Science Foundation2016 - 2018James Joshi, PI; Konstantinos Pelechrinis, Co-PI; Balaji Palanisamy, Co-PI; Prashant Krishnamurthy, Co-PI

Recent Publications:

Palanisamy, B and Liu L and Zhou Y and Wang Q (2018) Privacy-preserving Publishing of Multi-level Utility Controlled Graph Datasets. ACM Transactions on Internet Technology. ACM TOIT 2018
Baracaldo N and Palanisamy B and Joshi J (2017) An Insider Attack Resilient Geo-Social Access Control Framework. IEEE Transactions on Dependable and Secure Computing. IEEE TDSC 2017)
Long, X and Tipper, D and Qian, Y (2016) A key management architecture and protocols for secure smart grid communications. Security and Communication Networks, 9 (16). 3602 – 3617. ISSN 1939-0114
Abliz M and Znati T (2015) Defeating DDoS using Productive Puzzles. ICISSP 2015, pp. 114-123
Palanisamy, B and Liu, L and Lee, K and Meng, S and Tang, Y and Zhou, Y (2014) Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases, 32 (1). 91 – 118. ISSN 0926-8782


Our security projects have been featured at national and international conferences including:

  • ACM Symposium on Access Control Models and Technologies
  • CollaborateCom
  • ACM Hotmobile
  • EEE Global Communications Conference
  • ACM International Conference on Information and Knowledge Management
  • International Conference on Network and Systems Security
  • IEEE International Conference on Information Reuse and Integration