James Cannady, Ph.D.

Similar documents
Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

ZACHARY J. OSTER CURRICULUM VITAE

Evolutive Neural Net Fuzzy Filtering: Basic Description

Knowledge-Based - Systems

Laboratorio di Intelligenza Artificiale e Robotica

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

Learning Methods for Fuzzy Systems

Data Fusion Models in WSNs: Comparison and Analysis

On the Combined Behavior of Autonomous Resource Management Agents

THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE. Richard M. Fujimoto

We are strong in research and particularly noted in software engineering, information security and privacy, and humane gaming.

Cooperative Systems Modeling, Example of a Cooperative e-maintenance System

Ph.D. Computer Engineering and Information Science. Case Western Reserve University. Cleveland, OH, 1986

Laboratorio di Intelligenza Artificiale e Robotica

CNS 18 21th Communications and Networking Simulation Symposium

Xinyu Tang. Education. Research Interests. Honors and Awards. Professional Experience

DOCTOR OF PHILOSOPHY HANDBOOK

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

Introduction to CS 100 Overview of UK. CS September 2015

2017 Florence, Italty Conference Abstract

Curriculum Vitae FARES FRAIJ, Ph.D. Lecturer

CROSS-BATTERY ASSESSMENT, SLD DETERMINATION, AND THE ASSESSMENT- INTERVENTION CONNECTION

Emmanuel Opara, D.B.A. Associate Professor Accounting & Finance & MIS College of Business

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Telekooperation Seminar

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF

CURRICULUM VITAE. Jose A. Torres

Axiom 2013 Team Description Paper

Australian Journal of Basic and Applied Sciences

TD(λ) and Q-Learning Based Ludo Players

Undergraduate Program Guide. Bachelor of Science. Computer Science DEPARTMENT OF COMPUTER SCIENCE and ENGINEERING

Time series prediction

AC : DESIGNING AN UNDERGRADUATE ROBOTICS ENGINEERING CURRICULUM: UNIFIED ROBOTICS I AND II

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14)

Seminar - Organic Computing

Computerized Adaptive Psychological Testing A Personalisation Perspective

Department of Computer Science GCU Prospectus

Sung-Wook Kwon. Texas Tech University Phone: Box Fax: Lubbock, TX 79409

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

ROBERT M. FULLER. Ph.D. Indiana University, Kelley School of Business, June 2003 Major: Management Information Systems Minor: Organizational Behavior

Georgia Tech College of Management Project Management Leadership Program Eight Day Certificate Program: October 8-11 and November 12-15, 2007

Russell M. Rhine. Education

Sung-Wook Kwon. Texas Tech University Phone: Box Fax: Lubbock, TX 79409

11:00 am Robotics and the Law: An American Perspective Prof. Ryan Calo, University of Washington School of Law

SURVEY RESEARCH POLICY TABLE OF CONTENTS STATEMENT OF POLICY REASON FOR THIS POLICY

Case Acquisition Strategies for Case-Based Reasoning in Real-Time Strategy Games

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Len Lundstrum, Ph.D., FRM

A SURVEY OF FUZZY COGNITIVE MAP LEARNING METHODS

Top US Tech Talent for the Top China Tech Company

Date : Controller of Examinations Principal Wednesday Saturday Wednesday

CSL465/603 - Machine Learning

STRUCTURAL ENGINEERING PROGRAM INFORMATION FOR GRADUATE STUDENTS

An Automated Data Fusion Process for an Air Defense Scenario

Human Emotion Recognition From Speech

Reinforcement Learning by Comparing Immediate Reward

Curriculum Vitae Bharat K. Soni

Detecting Wikipedia Vandalism using Machine Learning Notebook for PAN at CLEF 2011

Classification Using ANN: A Review

SAM - Sensors, Actuators and Microcontrollers in Mobile Robots

Computer Science PhD Program Evaluation Proposal Based on Domain and Non-Domain Characteristics

Test Effort Estimation Using Neural Network

A Case-Based Approach To Imitation Learning in Robotic Agents

Ph.D in Advance Machine Learning (computer science) PhD submitted, degree to be awarded on convocation, sept B.Tech in Computer science and

Chapter 10 APPLYING TOPIC MODELING TO FORENSIC DATA. 1. Introduction. Alta de Waal, Jacobus Venter and Etienne Barnard

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Interaction Design Considerations for an Aircraft Carrier Deck Agent-based Simulation

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

Speech Emotion Recognition Using Support Vector Machine

Soft Computing based Learning for Cognitive Radio

Dinesh K. Sharma, Ph.D. Department of Management School of Business and Economics Fayetteville State University

Word Segmentation of Off-line Handwritten Documents

USER ADAPTATION IN E-LEARNING ENVIRONMENTS

To link to this article: PLEASE SCROLL DOWN FOR ARTICLE

Laurie Mercado Gauger, Ph.D., CCC-SLP

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

UCEAS: User-centred Evaluations of Adaptive Systems

JAIMIE NICOLE MORSE Curriculum Vitae

Computer Science (CS)

Modeling user preferences and norms in context-aware systems

Lecture 10: Reinforcement Learning

Cooperative evolutive concept learning: an empirical study

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

Prof. Dr. Hussein I. Anis

Evolution of Symbolisation in Chimpanzees and Neural Nets

Julie Gawrylowicz. Personal Statement and Research Interests

TOKEN-BASED APPROACH FOR SCALABLE TEAM COORDINATION. by Yang Xu PhD of Information Sciences

Programme Specification (Postgraduate) Date amended: 25 Feb 2016

Multisensor Data Fusion: From Algorithms And Architectural Design To Applications (Devices, Circuits, And Systems)

Proposal of Pattern Recognition as a necessary and sufficient principle to Cognitive Science

Hongyan Ma. University of California, Los Angeles

Agent-Based Software Engineering

Journal title ISSN Full text from

FEIRONG YUAN, PH.D. Updated: April 15, 2016

An Open Framework for Integrated Qualification Management Portals

Python Machine Learning

UTILITY POLE ATTACHMENTS Understanding New FCC Regulations and Industry Trends

XXII BrainStorming Day

Wildlife, Fisheries, & Conservation Biology

Causal Link Semantics for Narrative Planning Using Numeric Fluents

Transcription:

James Cannady, Ph.D. Graduate School of Computer and Information Sciences Nova Southeastern University, Fort Lauderdale, FL 33314 Phone / Fax : (954)262-2085/3915 E-Mail: cannady@nova.edu URL: http://www.scis.nova.edu/~cannady Home Address 91 Mountain View Lane, Danielsville, GA 30633 Phone: (706) 335-4116 Education Ph.D. (Computer Information Systems) 2000, Nova Southeastern University. Thesis Title: An Adaptive Neural Network Approach to Intrusion Detection and Response. Advisor: Professor Sumitra Mukherjee. M.S. (Management Information Systems) 1995, Nova Southeastern University. B.S. (Criminal Justice) 1987, Georgia State University, Atlanta. Academic Experience June 2000 to Present, Nova Southeastern University Professor, School of Computer and Information Sciences (July 2010 Present) Served as the GSCIS Center of Academic Excellence representative to NSA Developed and taught courses at the doctoral and masters level in Computer Science (software engineering and artificial intelligence) and Information Security (Secure System Analysis and Design, Risk Management, and Foundations of Information Security). Supervised doctoral students in their dissertation work as primary advisor. Served on doctoral dissertation committees for students in GSCIS

Associate Professor, School of Computer and Information Sciences (July 2004 July 2010) Served as the GSCIS Center of Academic Excellence representative to NSA Developed and taught courses at the doctoral and masters level in Programming, Artificial Intelligence and Expert Systems, Information Security, Legal and Ethical Aspects of Computing, and Client-Server Computing Systems. Supervised doctoral students in their dissertation work as primary advisor. Served on doctoral dissertation committees for students in GSCIS. Institutional Review Board representative (Feb 2001 Apr 2008). Led effort to establish NSU as a National Center of Academic Excellence in Information Assurance. Assistant Professor, School of Computer and Information Sciences (June 2000 July 2004) Developed and taught courses at the doctoral and masters level in Artificial Intelligence and Expert Systems, Information Security, Legal and Ethical Aspects of Computing, and Client-Server Computing Systems. Supervised doctoral students in their dissertation work as primary advisor. Served on doctoral dissertation committees for students in GSCIS. IRB representative. Primary research has focused on information security issues and artificial intelligence. June 2000 to July 2008, University of Georgia. Faculty Fellow/Adjunct Research Scientist Provide program guidance and serve as committee member for master s theses in Artificial Intelligence. Conducted research into the application of neural networks in the detection of network attacks April 1999 to December 1999, James Madison University. Adjunct Assistant Professor Developed and taught courses at the master s level in Information Security. 2

November 1995 to July 2008, Georgia Institute of Technology. Senior Research Scientist (June 2000 July 2008) Research Scientist II (June 1999 - June 2000) Research Scientist I (November 1995 June 1999) Conducted basic and applied research in information security and artificial intelligence. Serve as Co-Director of Information Security Center Supervised graduate students in projects and thesis research. Served on the Georgia Tech Faculty Senate. Taught undergraduate and graduate courses in Java and Information Security Research Interests My research concerns the intersection between artificial intelligence and information security. In particular I am working to develop new adaptive intelligent systems that can be applied to protect computer systems and networks. These techniques include the use of advanced neural networks in the detection of network-based attacks. I have developed a modified reinforcement-learning algorithm that enhances the effectiveness of the neural networks. My work has also included the use of adaptive self-organizing software agents that are designed to actively protect the computer network from attack. I have been involved in a variety of security-related research projects, including public-key infrastructure interoperability, malicious code detection, and system vulnerability assessments. Teaching Interests Information Security, Artificial Intelligence, and Complex Adaptive Systems. Professional Affiliations Senior Member, Institute of Electrical and Electronics Engineers (IEEE) Member, American Association for the Advancement of Science (AAAS) Member, American Association for Artificial Intelligence (AAAI) 3

Member, Association for Computing Machinery (ACM) Member, ACM SIGART -- ACM's special interest group on Artificial Intelligence Member, IEEE Computer Society Member, IEEE Computational Intelligence Society Member, IEEE Systems, Man, and Cybernetics Society Associate Editor, International Journal of Information Technology and Decision Making (IT&DM) Referee, IEEE Transactions on Neural Networks and Learning Systems Refereed Publications in Journals and Proceedings Cannady, J. (1997, February). Security in Object-Oriented Databases. Database Management, 8, (2), 45-52. Cannady, J. (1997, October). Security Models for Object-Oriented Database Management Systems. Journal of Data Security Management, 11, (10), 38-44. Cannady, J., Security Models for Object-Oriented Databases, in Handbook of Information Security Management. pp. 595-606, (Krause, M. Ed.), New York: CRC Press (1999). Cannady, J. (1997, February). Software Development with Cryptography. Databased Advisor, 15, (2), 78-82. Cannady, J., & Harrell, J.R. (1996). A Comparative Analysis of Current Intrusion Detection Technologies. Proceedings of Technology in Information Security Conference (TISC) 96, 212-218. Cramer, M.L., Cannady, J., & Harrell, J. (1996). New Methods of Intrusion Detection using Control-Loop Measurement. Proceedings of Technology in Information Security Conference (TISC) 96, 229-245. Cannady, J., Harrell, J., & Huggins, D. (1996). A Model of an Attack Database System. 4

Proceedings of DOD Database Colloquium 96, 78-90. Cannady, J. (1998). Neural Networks for Misuse Detection: Initial Results. Proceedings of the Recent Advances in Intrusion Detection 98 Conference, 31-47. Cannady, J. (1998) Applying Neural Networks to Misuse Detection. Proceedings of the 21 st National Information Systems Security Conference, 368-381. Cannady, J. (2000, July). Applying CMAC-based On-line Learning to Intrusion Detection. Proceedings of the 2000 IEEE/INNS Joint International Conference on Neural Networks. Cannady, J. (2000, October). Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks. Proceedings of the 23rd National Information Systems Security Conference. Rhodes, B., Mahaffey, J., & Cannady, J. (2000, October). Multiple Self-Organizing Maps for Intrusion Detection. Proceedings of the 23rd National Information Systems Security Conference. Garcia, R., & Cannady, J. (2001, April). Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions. Proceedings of the 2001 IEEE SOUTHEASTCON Conference. Bauer, D, Cannady, J., & Garcia, R (2001, April). Detecting Anomalous Behavior: Optimization Of Network Traffic Parameters Via An Evolution Strategy. Proceedings of the 2001 IEEE SOUTHEASTCON Conference. Cannady, J. (2001, August). The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks. Proceedings of the 2001 International Conference on Artificial Neural Networks. Cannady, J. (2002). Intrusion Detection Capabilities and Considerations. Global Infosecurity 2000, World Markets Research Centre. London. Cannady, J. & Little, M. (2003). Representing Battlefield Network Attacks with Conceptual Structures. In Proceedings of the 2003 Army Science Conference. Cannady, J. (2003). Identifying Complex Multi-Stage Network Attacks With Dynamic Petri Nets. In Proceedings of the 2003 Army Science Conference. Dass, M., Cannady, J., & Potter, D. (2003). LIDS: Learning Intrusion Detection System. In Proceedings of the 2003 Florida Artificial Intelligence Symposium. Dass, M., Cannady, J., & Potter, D. (2003). A Genetic Algorithm-based Intrusion Subclassifier Filter. In Proceedings of the 2003 ACM Southeast Conference. 5

Lu, J., & Cannady, J. (2003). Application Of Fuzzy Logic Controllers For High Accuracy Laser Tracking With Autonomous Robot System. Proceedings of the 2003 International Conference on Control,Automation, and Systems. Gonzalez, L., & Cannady, J. (2004). A Self-Adaptive Negative Selection Approach for Anomaly Detection. Proceedings of the 2004 Congress of Evolutionary Computation. Fuhs, J., & Cannady, J. (2004). An Automated Approach in Reverse Engineering Java Applications Using Petri Nets. Proceedings of the 2004 IEEE SOUTHEASTCON Conference. Palnitkar, R., & Cannady, J. (2004). A Review of Adaptive Neural Networks. Proceedings of the 2004 IEEE SOUTHEASTCON Conference. Cannady, J. (2005). Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks. Proceedings of the 2005 IEEE Workshop on Soft Computing as Transdisciplinary Science and Technology Wang, Y., Cannady, J., & Rosenbluth, J. (2005). Foundations of Computer Forensics: A Technology for the Fight Against Computer Crime. Computer Law and Security Report. Volume 21, Issue 2, pp 119-127. Cannady, J. (2009). Distributed Detection of Attacks in Mobile Ad-hoc Networks Using Learning Vector Quantization. In Proceedings of the Network and System Security Conference (NSS 2009). Pak, C. & Cannady, J. (2009). Asset Priority Risk Assessment using hidden markov models. In Proceedings of the ACM SIGITE Conference (2009). Cannady, J. (2010). Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks. International Journal Of Network Security And Its Applications. Cerkez, P. & Cannady, J. (2010). Automated detection of semagram-laden images using adaptive neural networks. Proceedings of SPIE, Volume 7708. Fuhs, J. & Cannady, J. (2010). A Model for Detecting Source Code Anomalies by Extending Petri Nets.. In Proceedings of the 5th International Conference on Information Warfare and Security. Cannady, J. (2010). Real-time Detection of Distributed Zero-day Attacks in Ad Hoc Networks. In Proceedings of the 5th International Conference on Information Warfare and Security. Cannady, J. (2010). Detection Of Distributed Attacks In Mobile Ad-Hoc Networks Using 6

Self-Organizing Temporal Neural Networks. In Proceedings of the Second International Conference on Agents and Artificial Intelligence. Cannady, J. (2011). An Adaptive Neural Swarm Approach for Intrusion Defense in Ad Hoc Networks, Proceedings of SPIE. Cannady, J. (2013). The Detection of Temporally Distributed Network Attacks Using an Adaptive Hierarchical Neural Network. Proceedings of the 5 th World Congress on Nature and Biologically Inspired Computing. 7