Close
X
 

ITSD Featured Authors

Dr. Arun Maiya

Dr. Arun Maiya - ITSDDr. Arun Maiya’s research broadly focuses on the study of computational methods to extract meaning from raw data and includes the areas of data mining, network science (e.g., social network analysis), natural language processing, machine learning, and social computing. Prior to joining IDA, Dr. Maiya held various research and development positions across a variety of industries from telecommunications to Web hosting and analytics. He holds a Ph.D. in Computer Science from the University of Illinois at Chicago, an M.S. in Computer Science from DePaul University, and a B.S. in Psychology from the University of Illinois at Urbana-Champaign.

Mining Measured Information from Text

A Framework for Comparing Groups of Documents

Topic Similarity Networks: Visual Analytics for Large Document Sets

Exploratory Analysis of Highly Heterogeneous Document Collections

Supervised Learning in the Wild: Text Classification for Critical Technologies

Dr. David Wheeler

Dr. David Wheeler - ITSDDr. David A. Wheeler’s research focuses on software and system security (including software and system assurance and supply chain risk management), collaborative development (including open source software and software standards), and software development techniques and technologies. He is a recognized expert in both security and open-source software and is active in evaluating and improving security practices for open-source software. He holds a Ph.D. in Information Technology, an M.S. in Computer Science, a B.S. in Electronics Engineering, and a certificate in Information Systems Security from George Mason University.

Using an Open Source Software Approach for CyberSecurity Technology Transition

Open Source Software Projects Needing Security Investments

What is Open Security?

Open Source Software (OSS or FLOSS) and the U.S. Department of Defense

Dr. Randy Simpson

Dr. Randy SimpsonDr. William R. Simpson is an award-winning cybersecurity architect for high-assurance information technology systems. Prior to joining IDA, he held industry positions at the U.S. Naval Air Test Center, the Center for Naval Analyses, and the ARINC Research Corporation. He has held academic positions at George Mason University, Old Dominion University, the University of Maryland, and Ohio State University. He holds a B.S. in aerospace engineering from Virginia Polytechnic Institute and State University, an M.S. and a Ph.D. in aeronautical and astronautical engineering from Ohio State University, and an M.S in administration from George Washington University. 

Maintaining High Assurance in Asynchronous Messaging

Sharing Smart Card Authenticated Sessions Using Proxies

Enterprise Level Security: Securing Information Systems in an Uncertain World

Cloud Forensics Issues

Cryptography for a High-Assurance Web-Based Enterprise

Claims-Based Authentication for a Web-Based Enterprise

Use Case Based Access Control

A SAML Framework for Attribution, Delegation and Least Privilege

A Persona Framework for Attribution, Delegation and Least Privilege

Enterprise High Assurance Scale-Up

Distributed Versus Centralized Protection Schema for the Enterprise