Invitations & Awards

b-of-a-award-07-9-18-15_21812932649_o

Awards

  1. Microsoft Research Hawaii Project provided 10 smart phone devices for instructional and research purposes, 2011/2012.
  2. Joyent Cloud Service Provider donated 2 year cloud provisioning and database space to be used for instructional and research purposes, 2010/2011.
  3. Nominated for the College of Computing and Informatics Outstanding Faculty Research Award, UNC Charlotte, 2011.
  4. Nominated by a senior research staff member at IBM T.J. Watson Lab for the IBM Faculty Award, 2008.
  5. Nominated for Ralph E. Powe Junior Faculty Award, Oak Ridge Associated Universities (ORAU).  UNC Charlotte nominated only 2 junior applicants for this award campus wide, 2008.
  6. Best Questioner Award, IBM Summer Seminars, IBM T.J.Watson Research Lab. Summer 2006.
  7. Nominated for Microsoft Research Fellowship by ECE, Purdue University. 2006.
  8. Research Poster Competition Award (3rd place), Sixth Annual Information Security Symposium, Center for Education and Research in Information Assurance and Security, Purdue University. March 2005.
  9. CERIAS, Awarded Student Travel Grant (CCS’05). 2005.
  10. CERIAS, Awarded Student Travel Grant (SACMAT’05). 2005.
  11. Purdue Research Foundation (PRF) Summer Research Scholarship. Summer 2003.
  12. Estus H. and Vashti L. Magoon Award for Excellence in Teaching, School of Electrical and Computer Engineering, Purdue University. 2002 – 2003.
  13. Scholarship to Study Abroad at Wollongong University, Wollongong, Australia. Summer 1999.

Invited Lectures

  1. “User Centric Policy Management in Online Social Networks”, UAE University, at Faculty of Information Technology at the UAE University, Al-Ain, United Arab Emirates, May 2014.
  2. “Security Hardening for Cross Platform Mobile Development”, IBM University Day, IBM at the Research Triangle Park, NC, October 2013.
  3. “Recommendation Models for Open Authorization”, Ajou University, Korea, August 2013.
  4. “Policy By Example in Social Networks”, Invited Speaker, College of Computing and Informatics Graduate Seminar Series 2012, UNC Charlotte, April 2012.
  5. “Introduction to Computer Forensics Tools and Research”, Security Symposium, Johnson C. Smith University, April 2012.
  6. “ROAuth: Recommendation-based Open Authorization”, Invited Speaker, Cyber Defense and Network Assurability Research Center Security Seminar, UNC Charlotte, September 2011.
  7. Panelist on Charlotte Talks with Mike Collins (radio), program on Mobile App Security, Charlotte NC,  September 2011.
  8. “Identity Mapping Challenges and Solutions in Social Networks”, Invited Speaker, Security Summer Camp, Johnson C. Smith University, July 2011.
  9. “Security in Social and Mobile Personal Health Records Apps”, Invited Speaker, Innovation Summit on Mobile Technologies to Improve Health, Wake Forest University Transitional Science Institute, March 2011.
  10. “Social Networks Security and Privacy”, Invited Speaker, Science Cafe Discovery Place, Charlotte NC, Nov 2010.
  11. “Efficient XACML Policy Evaluation”, Invited Speaker, Trusted Cloud Initiative Group, Charlotte NC, August 2010.
  12. “Security Challenges in Social Networks”, Invited Speaker, Cyber Security Professional Certification Training, UNC Charlotte, January 2009.
  13. “Security and Privacy a Human-Computer Interaction Perspective”, Invited Speaker, UNC Charlotte, September 2007.
  14. “Watermarking Relational Data”, Invited Speaker, College of Computing and Informatics Graduate Seminar Series 2007, UNC Charlotte, August 2007.
  15. “Distributed Secure Collaboration”, Invited Speaker, Florida International University, Miami, Florida, April 2007.
  16. “Distributed Secure Collaboration”, Invited Speaker, Concordia University, Montreal, Canada, April 2007.
  17. “Distributed Secure Collaboration”, Invited Speaker, University of Michigan in Detroit, Detroit, Michigan, March 2007.
  18. “Distributed Secure Collaboration”, Invited Speaker, Aspera Systems, Berkeley, California, March 2007.
  19. “Distributed Secure Collaboration”, Invited Speaker, UNC Charlotte, March 2007.
  20. “Distributed Secure Collaboration”, Invited Speaker, Intel, Portland, Oregon, February 2007.
  21. “Watermarking Relational Databases”, Invited Speaker, lecture at CS526 Computer Security class, Purdue University, October 2006.
  22. “Security in Distributed Services”, Invited Speaker, IBM T. J.Watson Research Lab. Aug. 2006.
  23. “Watermarking Relational Databases”, Invited Speaker, lecture at CS526 Computer Security class, Purdue University, November 2005.
  24. “Hippocratic Databases”, Invited Speaker, Database Group, Purdue University, May 2005.
  25. “Watermarking Relational Databases”, Invited Speaker, CERIAS Security Seminar, Purdue University, April 2005.
  26. “Watermarking Relational Databases”, Security Reading Group, Purdue University, Feb 2005.
  27. “Hierarchical Key Generation and Diffusion for Sensor Networks”, lecture at CS590S Database Security class, Purdue University, October 2004.

Comments are closed.