This page uses javascript to help render elements, if you have problems please enable javascript.
 
You are now inside the main content area
 
 
 
left col
right col
 
left col

Research

right col
 
left col
right col
 
left col

The center faculty works collaboratively with each other, the students, and industry partners to conduct security research in areas of network security, cloud security, biometrics, access controls, hardware security, and many other topics. They publish their work in peer-reviewed conferences, journals, and pursue funding opportunities. 

 

Publications of the Center for Cybersecurity at CSUF

  1. Gofman, Mikhail, Sinjini Mitra, Berhanu Tadesse, and Maria Villa. "Biometrics for Enterprise Security Risk Mitigation." In  Advances in Cybersecurity Management , pp. 163-195. Springer, Cham, 2021.  

  2. Hovsepian, Patrick, and Yun Tian. "Energy Consumption Analysis of Scheduling Algorithms for Cloud Computing Systems." In  2020 10th Annual Computing and Communication Workshop and Conference (CCWC) , pp. 0134-0141. IEEE, 2020.

  3. Khedekar, Vinay, and Yun Tian. "Multi-Tenant Big Data Analytics on AWS Cloud Platform." In  2020 10th Annual Computing and Communication Workshop and Conference (CCWC) , pp. 0647-0653. IEEE, 2020.

  4. Villa, Maria, Mikhail Gofman, Sinjini Mitra, Ali Almadan, Anoop Krishnan, and Ajita Rattani. "A survey of biometric and machine learning methods for tracking students’ attention and engagement." In  2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA) , pp. 948-955. IEEE, 2020.
  5. Ruan, Xiaojun, Haiquan Chen, Yun Tian, and Shu Yin. "Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds."  Future Generation Computer Systems  100 (2019): 380-394.

  6. Tian, Yun, Vincent Tran, and Mutalifu Kuerban. "DoS attack mitigation strategies on SDN controller." In  2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) , pp. 0701-0707. IEEE, 2019.

  7. Gofman, Mikhail, Sinjini Mitra, Yu Bai, and Yoonsuk Choi. "Security, privacy, and usability challenges in selfie biometrics." In  Selfie Biometrics , pp. 313-353. Springer, Cham, 2019.

  8. Olazabal, Oscar, Mikhail Gofman, Yu Bai, Yoonsuk Choi, Noel Sandico, Sinjini Mitra, and Kevin Pham. "Multimodal biometrics for enhanced iot security." In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), pp. 0886-0893. doi: 10.1109/CCWC.2019.8666599.  IEEE, 2019.

  9. Kim, Daniel E., and Mikhail Gofman. "Comparison of shallow and deep neural networks for network intrusion detection." In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 204-208. doi: 10.1109/CCWC.2018.8301755. IEEE, 2018.

  10. Mitra, Sinjini, Mikhail Gofman, Gregory Parsons, and Jessie Peissig. "Facial asymmetry versus facial makeup." In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 197-203. IEEE, 2018.

  11. Villa, Maria, Mikhail Gofman, and Sinjini Mitra. "Survey of biometric techniques for automotive applications." In Information Technology-New Generations, pp. 475-481. Springer, Cham, 2018.  DOI: 10.1007/978-3-319-77028-4_62

  12. Gofman, Mikhail, Narciso Sandico, Sinjini Mitra, Eryu Suo, Sadun Muhi, and Tyler Vu. "Multimodal biometrics via discriminant correlation analysis on mobile devices." In  Proceedings of the International Conference on Security and Management (SAM) , pp. 174-181. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2018.

  13. Mitra, Sinjini, and Mikhail Gofman, eds.  Biometrics in a data driven world: trends, technologies, and challenges . CRC Press, 2016.

  14. Jia, Ya-fei, Yun Tian, Yu-jian Li, and Peng-bin Fu. "Exponential Discriminative Locality Alignment for Hyperspectral Image Classification."  IEEE Geoscience and Remote Sensing Letters  14, no. 1 (2016): 33-37.

  15. Mitra, Sinjini, and Mikhail Gofman. "Towards greater integrity in online exams." (2016). aisel.aisnet.org.

  16. Gofman, Mikhail I., Sinjini Mitra, Tsu-Hsiang Kevin Cheng, and Nicholas T. Smith. "Multimodal biometrics for enhanced mobile device security."  Communications of the ACM  59, no. 4 (2016): 58-65 .

  17. Gofman, Mikhail , Sinjiji Mitra, Kevin Chang and Nicholas Smith.  "Feature-level Multimodal Biometric Authentication in Consumer Mobile Devices."The IEEE 7th International Workshop on Information Forensics and Security, Poster/Demo, 2015.

  18. Gofman, Mikhail, Sinjini Mitra, Kevin Cheng, and Nicholas Smith. "Quality-based score-level fusion for secure and robust multimodal biometrics-based authentication on consumer mobile devices." In  Proc. Int. Conf. Softw. Eng. Adv.(ICSEA) , pp. 274-276. 2015.

  19. Tian, Yun, Xiao Qin, and Yafei Jia. "Secure replica allocation in cloud storage systems with heterogeneous vulnerabilities." In  2015 IEEE International Conference on Networking, Architecture and Storage (NAS) , pp. 205-214. IEEE, 2015.

  20. Madan, Bharat B., Manoj Banik, and Doina Bein. "Securing unmanned autonomous systems from cyber threats.The Journal of Defense Modeling and Simulation  16, no. 2 (2019): 119-136.

  21. Yang, Ping, Mikhail I. Gofman, Scott D. Stoller, and Zijiang Yang. "Policy analysis for administrative role based access control without separate administration."  Journal of Computer Security  23, no. 1 (2015): 1-29.

  22. Gofman, Mikhail I., Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, and Kartik Gopalan. "Privacy-preserving virtual machine checkpointing mechanism.International Journal of Cloud Computing 10  3, no. 3 (2014): 245-266.

  23. Gofman, Mikhail I., and Ping Yang. "Efficient Policy Analysis for Evolving Administrative Role Based Access Control."  Int. J. Softw. Informatics  8, no. 1 (2014): 95-131.

  24. Yang, Ping, Mikhail I. Gofman, Scott D. Stoller, and Zijiang Yang. "Policy analysis for administrative role based access control without separate administration."  Journal of Computer Security  23, no. 1 (2015): 1-29.

  25. Kenneth John Faller II, Garrett Kinum, and Aaron Elkins. "Automatic Filled-Pause Detection Based on Prosodic Vocal Features." 44th Hawaii International Conference on System Sciences (HICSS), 2014.

Extended Database of Biometrics Research for Automotive Applications Sources

This database contains the sources listed in the survey and additional sources that were not listed with additional works relevant in the field  that address other topics such as using biometrics in VANET security and privacy protocols.

  1. M. Gofman and M. Villa, “Extended database of biometrics research for automotive applications.” http://www.fullerton.edu/cybersecurity/research/Extended-Database-of-Biometrics-Research-for-Automotive-Applications.php, Oct 2017.
  2. NHTSA, “Drunk driving.” https://www:nhtsa:gov/riskydriving/drunk-driving, Jan 2017.
  3. N. H. T. S. Administration et al., “Early estimate of motor vehicle traffic fatalities for the first 9 months of 2016.” https://crashstats:nhtsa:dot:gov/Api/Public/ViewPublication/812358, Jan 2017.
  4. R. Ivers, T. Senserrick, S. Boufous, M. Stevenson, H.-Y. Chen, M. Woodward, and R. Norton, “Novice drivers’ risky driving behavior, risk perception, and crash risk findings from the drive study.” https://www:ncbi:nlm:nih:gov/pmc/articles/PMC2724457/, Sep 2009.
  5. M. Gutmann, P. Grausberg, and K. Kyamakya, “Detecting human driver’s physiological stress and emotions using sophisticated one-person cockpit vehicle simulator,” in Information Technologies in Innovation Business Conference (ITIB), 2015, pp. 15–18, IEEE, 2015.
  6. H. B. Lee, J. M. Choi, J. S. Kim, Y. S. Kim, H. J. Baek, M. S. Ryu, R. H. Sohn, and K. S. Park, “Nonintrusive biosignal measurement system in a vehicle,” in Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE, pp. 2303–2306, IEEE, 2007.
  7. J. Pan and W. J. Tompkins, “A real-time qrs detection algorithm,” IEEE transactions on biomedical engineering, no. 3, pp. 230–236, 1985.
  8. R. Rathore and C. Gau, “Integrating biometric sensors into automotive internet of things,” in Cloud Computing and Internet of Things (CCIOT), 2014 International Conference on, pp. 178–181, 2014.
  9. “Our automotive air quality sensors —.” https://www:sgxsensortech:com/products-services/indoorautomotiveair-quality/automotive-air-quality-sensors/.
  10. Gestigon, “The future of mobility is not about cars.” http://www:gestigon:com/automotive-industry/.
  11. “The power to stop drunk driving is now in the palm of your hand.” http://sobersteering:com/how-it-works/.
  12. R. Chen, M. She, J.Wang, X. Sun, and L. Kong, “Driver verification based on handgrip recognition on steering wheel,” in Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp. 1645–1651, IEEE, 2011.
  13. K. Young, M. Regan, and M. Hammer, “Driver distraction: A review of the literature,” Distracted driving, pp. 379–405, 2007.
  14. O. Dehzangi and C. Williams, “Towards multi-modal wearable driver monitoring: Impact of road condition on driver distraction,” in Wearable and Implantable Body Sensor Networks (BSN), 2015 IEEE 12th International Conference on, pp. 1–6, IEEE, 2015.
  15. O. Omeni, A. C. W. Wong, A. J. Burdett, and C. Toumazou, “Energy efficient medium access protocol for wireless medical body area sensor networks,” IEEE Transactions on biomedical circuits and systems, vol. 2, no. 4, pp. 251–259, 2008.
  16. http://www:scienceservingsociety:com/ts/text/ch09:htm.
  17. M. I. World, “Keeping drivers safe with pupil biometrics.”https://findbiometrics:com/keeping-drivers-safe-with-pupilbiometrics-301058/, Jan 2016.
  18. “Artificial intelligence helps to keep tired drivers awake.” http://www:digitaljournal:com/tech-and-science/technology/artificialintelligence-helps-to-keep-tired-drivers-awake/article/499369, Aug 2017.
  19. J. Lee, “Omron integrating facial recognition into autonomous driving system.” http://www:biometricupdate:com/201610/omron-integrating-facial-recognition-into-autonomous-drivingsystem, Oct 2016.
  20. “Automotive.” http://www:optalert:com/automotive.
  21. “Vigo the science.” https://www:wearvigo:com/science.
  22. A. Meschtscherjakov, H. Scharfetter, S. P. Kernjak, N. M. Kratzer, and J. Stadon, “Adaptive digital sunshade: blocking the sun from blinding the driver,” in Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, pp. 78–83, ACM, 2015.
  23. C. Endres, T. Schwartz, and C. A. M¨ uller, “Geremin: 2d microgestures for drivers based on electric field sensing,” in Proceedings of the 16th international conference on Intelligent user interfaces, pp. 327–330, ACM, 2011.
  24. G. A. ten Holt, M. J. Reinders, and E. Hendriks, “Multidimensional dynamic time warping for gesture recognition,” in Thirteenth annual conference of the Advanced School for Computing and Imaging, vol. 300, 2007.
  25.  F. Althoff, R. Lindl, L. Walchshausl, and S. Hoch, “Robust multimodal hand-and head gesture recognition for controlling automotive infotainment systems,” VDI BERICHTE, vol. 1919, p. 187, 2005.
  26. M. Billinghurst and B. Buxton, “Gesture based interaction,” Haptic Input, vol. 24, 2011.
  27. A. Reyes-Mu˜ noz, M. C. Domingo, M. A. L´opez-Trinidad, and J. L. Delgado, “Integration of body sensor networks and vehicular adhoc networks for traffic safety,” Sensors, vol. 16, no. 1, p. 107, 2016.
  28. RMIIA, “U.s. auto theft statistics.” http://www:rmiia:org/auto/auto theft/statistics:asp.
  29. “Sense holdings acquires exclusive sales, marketing and purchase rights for biometric patent to secure vehicles.” http://www:theautochannel:com/news/2004/03/18/185331:html.
  30.  K. A. Ishak, S. A. Samad, and A. Hussain, “A face detection and recognition system for intelligent vehicles,” Information Technology Journal, vol. 5, no. 3, pp. 507–515, 2006.
  31. S. Ben-Yacoub and B. Fasel, “Fast multi-scale face detection,” IDIAP, Switzerland, 1998.
  32.  M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of cognitive neuroscience, vol. 3, no. 1, pp. 71–86, 1991.
  33.  P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. fisherfaces: Recognition using class specific linear projection,” IEEE Transactions on pattern analysis and machine intelligence, vol. 19, no. 7, pp. 711–720, 1997.
  34. W. Zhao, R. Chellappa, and A. Krishnaswamy, “Discriminant analysis of principal components for face recognition,” in Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on, pp. 336–341, IEEE, 1998.
  35. H. A. Rowley, S. Baluja, and T. Kanade, “Human face detection in visual scenes,” in Advances in Neural Information Processing Systems, pp. 875–881, 1996.
  36.  Z. Liu, “A new embedded car theft detection system,” in Embedded Software and Systems, 2005. Second International Conference on, pp. 6–pp, IEEE, 2005.
  37. M. Oravec and J. Pavlovicova, “Face recognition methods based on principal component analysis and feedforward neural networks,” in Neural Networks, 2004. Proceedings. 2004 IEEE International Joint Conference on, vol. 1, pp. 437–441, IEEE, 2004.
  38. X. Chen, P. J. Flynn, and K. W. Bowyer, “Pca-based face recognition in infrared imagery: Baseline and comparative studies,” in Analysis and Modeling of Faces and Gestures, 2003. AMFG 2003. IEEE International Workshop on, pp. 127–134, IEEE, 2003.
  39.  A. Pentland, B. Moghaddam, T. Starner, et al., “View-based and modular eigenspaces for face recognition,” in CVPR, vol. 94, pp. 84–91, 1994.
  40. Z. Liu and G. He, “Research on vehicle anti-theft and alarm system using facing recognition,” in Neural Networks and Brain, 2005. ICNN&B’05. International Conference on, vol. 2, pp. 925–929, IEEE, 2005.
  41. A. Leonardis and H. Bischof, “Dealing with occlusions in the eigenspace approach,” in Computer Vision and Pattern Recognition, 1996. Proceedings CVPR’96, 1996 IEEE Computer Society Conference on, pp. 453–458, IEEE, 1996.
  42. J. Kang, D. V. Anderson, and M. H. Hayes, “Face recognition in vehicles with near infrared frame differencing,” in Signal Processing and Signal Processing Education Workshop (SP/SPE), 2015 IEEE, pp. 358–363, IEEE, 2015.
  43. T. Sim, S. Baker, and M. Bsat, “The cmu pose, illumination, and expression (pie) database,” in Automatic Face and Gesture Recognition, 2002. Proceedings. Fifth IEEE International Conference on, pp. 53–58, IEEE, 2002.
  44. S. Padmapriya and E. A. KalaJames, “Real time smart car lock security system using face detection and recognition,” in Computer Communication and Informatics (ICCCI), 2012 International Conference on, pp. 1–6, IEEE, 2012.
  45. Y. Freund and R. E. Schapire, “A desicion-theoretic generalization of on-line learning and an application to boosting,” in European conference on computational learning theory, pp. 23–37, Springer, 1995.
  46. K. W. Bowyer, K. Chang, and P. Flynn, “A survey of approaches and challenges in 3d and multi-modal 3d+ 2d face recognition,” Computer vision and image understanding, vol. 101, no. 1, pp. 1–15, 2006.
  47. “Cbcl face recognition database.” http://cbcl:mit:edu/softwaredatasets/heisele/facerecognition-database:html.
  48. Z. Zhu and F. Chen, “Fingerprint recognition-based access controlling system for automobiles,” in Image and Signal Processing (CISP), 2011 4th International Congress on, vol. 4, pp. 1899–1902, IEEE, 2011.
  49. N. SUSHMITHA, B. SUPRIYA, and R. PRAJEESHAN, “Bio-metric automobile security,” 2015.
  50. 3pixelart.com. http://www:apexengineeringproject:com/display-product:php?id=AP106.
  51.  “libfprint api reference.” http://www:reactivated:net/fprint/api/.
  52. C. Folorunso, L. Akinyemi, A. Ajasa, and K. Oladipupo, “Design and development of fingerprint based car starting system,”
  53. J. B. Jadav, K. Wandra, and R. Dabhi, “Innovative automobile security system using various security modules,”
  54. N. Kiruthiga, S. Thangasamy, et al., “Real time biometrics based vehicle security system with gps and gsm technology,” Procedia Computer Science, vol. 47, pp. 471–479, 2015.
  55. A. B. A. L. KR, “Smart automobile security,”
  56. S. K. Kopparapu, “A robust speech biometric system for vehicle access,” in Vehicular Electronics and Safety (ICVES), 2009 IEEE International Conference on, pp. 174–177, IEEE, 2009.
  57. D. Nosowitz, “A car seat that authenticates the driver with butt recognition.” https://www:popsci:com/cars/article/2011-12/car-seat-recognizes-your-butt-security-and-fun, Dec 2011.
  58.  K. Igarashi, C. Miyajima, K. Itou, K. Takeda, F. Itakura, and H. Abut, “Biometric identification using driving behavioral signals,” in Multimedia and Expo, 2004. ICME’04. 2004 IEEE International Conference on, vol. 1, pp. 65–68, IEEE, 2004.
  59. I. D. Markwood and Y. Liu, “Vehicle self-surveillance: Sensorenabled automatic driver recognition,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 425–436, ACM, 2016.
  60. H. C. Tijms, Stochastic models: an algorithmic approach, vol. 303. John Wiley & Sons Inc, 1994.
  61. J. A. Adell and P. Jodr´a, “Exact kolmogorov and total variation distances between some familiar discrete distributions,” Journal of Inequalities and Applications, vol. 2006, no. 1, p. 64307, 2006.
  62. H. Samet, “The quadtree and related hierarchical data structures,” ACM Computing Surveys (CSUR), vol. 16, no. 2, pp. 187–260, 1984.
  63. “Future jaguar cars may recognize approaching drivers.” http://findbiometrics:com/jaguar-cars-face-biometrics-311247/, Nov
    2016.
  64. “Jaguar files patent for vehicle access system with facial recognition and gait analysis.”
  65. S. Mayhew, “Ford granted patent for keyless biometric system for vehicles.” http://www:biometricupdate:com/201502/fordgranted-patent-for-keyless-biometric-system-for-vehicles, Feb 2015.
  66. C. Lupu and V. Lupu, “Multimodal biometrics for access control in an intelligent car,” in Computational Intelligence and Intelligent Informatics, 2007. ISCIII’07. International Symposium on, pp. 261–267, IEEE, 2007.
  67. W. Yuan and Y. Tang, “The driver authentication device based on the characteristics of palmprint and palm vein,” in Hand-Based Biometrics (ICHB), 2011 International Conference on, pp. 1–5, IEEE, 2011.
  68.  L. Yao, C. Lin, J. Deng, F. Deng, J. Miao, K. Yim, and G. Wu, “Biometrics-based data link layer anonymous authentication in vanets,” in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on, pp. 182–187, IEEE, 2013.
  69. “Real-time physiological signals - e4 eda/gsr sensor.” 
  70.  “Scott Brave and Clifford Nass. Emotion in human–computer interaction. Human-Computer Interaction, page 53, 2003.
  71. “David E Dass Jr, Alex Uyttendaele, and Jacques Terken. Haptic inseat feedback for lane departure warning. In Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, pages 258–261. ACM, 2013.
  72. “Benjamin H Detenber and Byron Reeves. A bio-informational theory of emotion: Motion and image size effects on viewers. Journal of Communication, 46(3):66–84, 1996.
  73. “Lori Grisham. Child deaths in hot cars: 10 key facts, Jul 2014.
  74. “Kenji Hagita and Kenji Mori. The effect of sun glare on traffic accidents in chiba prefecture, japan. Asian transport studies, 3(2):205–219, 2014.
  75. “Hannes Hartenstein and LP Laberteaux. A tutorial survey on vehicular ad hoc networks. IEEE Communications magazine, 46(6), 2008.
  76. Gisela Labouvie-Vief and Marshall Medler. Affect optimization and affect complexity: modes and styles of regulation in adulthood. Psychology and aging, 17(4):571, 2002.
  77. Clifford Nass, Ing-Marie Jonsson, Helen Harris, Ben Reaves, Jack Endo, Scott Brave, and Leila Takayama. Improving automotive safety by pairing driver emotion and car voice emotion. In CHI’05 Extended Abstracts on Human Factors in Computing Systems, pages 1973–1976. ACM, 2005.
  78. C Pickering. Gesture recognition could improve automotive safety. Asian Engineer-Automotive-Design, 2006.
  79. Andre B Reis, Susana Sargento, Filipe Neves, and Ozan K Tonguz. Deploying roadside units in sparse vehicular networks: What really works and what does not. IEEE Transactions on Vehicular Technology, 63(6):2794–2806, 2014.
  80. Ghassan Samara, Wafaa AH Al-Salihy, and R Sures. Security analysis of vehicular ad hoc nerworks (vanet). In Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on, pages 55–60. IEEE, 2010.
  81. Gongjun Yan, Stephan Olariu, and Michele C Weigle. Providing vanet security through active position detection. Computer communications, 31(12):2883–2897, 2008.
right col
 
left col
right col
 
left col
right col
 
left col
right col
 
left col

Below you will find information about the various security research groups hosted at the center:

ajax space
right col
 
left col
right col