- Home
- Announcements
- Multiple Papers Published from CCPS Faculty in the Department of Computer Science, Math and Science
Dr. Erald Troja, coordinator of the Cybersecurity program and the Cybersecurity Center of Academic Excellence, along with Computer Science Associate Professor Dr. Nikhil Yadav and fourth year Cyber Security Systems student Laura M. Truong ’22CCPS, had their joint paper, “Personalized Outsourced Privacy-Preserving Database Updates for Crowd-Sensed Dynamic Spectrum Access” accepted for publication in the highly rated IEEE MELECON22 interdisciplinary international flagship conference. The conference brings together researchers and practitioners from different fields of Computer Science, Cybersecurity, and Electrical Engineering. Their paper contributes to the field of Cybersecurity by proposing and investigating novel cryptographic constructions to secure and protect the privacy of mobile user's locations which operate over Dynamic Spectrum Access networks.
Furthermore, Dr. Yadav, Dr. Troja, and Ms. Truong had a second joint paper titled, "Machine Learning Architecture for Signature-Based IoT Intrusion Detection in Smart Energy Grids" also accepted in MELECON22. The paper contributes to the field of AI in Cybersecurity by proposing an automated machine learning architecture for IoT enabled smart energy systems capable of deciding whether to generate rules for signature-based intrusion detection.
In addition, Dr. Troja, Dr. Joan E. DeBello, Ph.D., Chairperson of the Division of Computer Science, Mathematics and Science, Dr. Suzanna Schmeelk, Prof. Denise Dragos, and Ms. Truong, had their paper, “Teaching effective Cybersecurity through Escape the Classroom Paradigm,” accepted in the 2021 IEEE flagship conference of the IEEE Education Society. Their research focused on the effectiveness and suitability of utilizing the Escape The Classroom (ETC) paradigm in order to gamify the cybersecurity and computer science lab assignments and to provide students with a fun, interesting, and rewarding experience while learning Cybersecurity through the appropriate Bloom taxonomy levels. The paper discussed their approach and highlighted challenges that faculty encounter while applying ETC towards the Cybersecurity curriculum.