Header with Image and Search Bar
   Florida International University

Research


CIERTA’s affiliated faculty have a wide array of individual expertise and experience in different research areas in cybersecurity and privacy.

Research Areas

CIERTA has excellent faculty members who are internationally renowned faculty conducting research almost on all sub-areas of cybersecurity spanning different fields. These sub-areas are listed below along with the covered topics and corresponding faculty names.

Technical Areas

Name of AreaCovered TopicsFaculty
IoT/CPS SecuritySmart grid, drones, smart homes, vehicles, and smart cities.Raju Rangaswami, Ruimin Sun, Xuyu Wang, Hadi Amini, Christian Poellabauer, Mohammad Ashiqur Rahman, Kemal Akkaya, Selcuk Uluagac, Amin Kharraz, S. S. Iyengar.
Network SecurityDoS attacks, protocol security, wireless security, social engineering, APTs, key management, Internet security, and zero-trust networking.Kemal Akkaya, Jason Liu, Xuyu Wang, Selcuk Uluagac, Niki Pissinou, Fahrad Shirani, Mohammad Ashiqur Rahman, S. S. Iyengar, Julio Ibarra
System SecurityOperating systems security, malware analysis, and web security.Amin Kharraz, Selcuk Uluagac,Kemal Akkaya, Mark Finlayson,Ruimin Sun, Christian Poellabauer, Raju Rangaswami,S. S. Iyengar
AI SecurityAdversarial machine learning, LLM security, Model Protection, Explainability, Ethics, and regulation.Ruimin Sun, Selcuk Uluagac, Fahrad Shirani, Yanzhao Wu, Xuyu Wang, Hadi Amini, Christian Poellabauer, Kemal Akkaya, Raju Rangaswami, Mohammad Ashiqur Rahman, Tauhidur Rahman, Niki Pissinou, S. S. Iyengar
Hardware SecurityTamper Proof Devices, Trojans, and PUFs.Tauhidur Rahman, Mohammad Ashiqur Rahman
Software and Application SecuritySoftware testing, secure programming, malware/ransomware, and software reverse engineering.Amin Kharraz, Selcuk Uluagac,Ruimin Sun, Christian Poellabauer, S. S. Iyengar
Theory / CryptographyInformation theory, formal methods, trust models, and post-quantum crypto.Farhad Shirani,S. S. Iyengar
Data/Storage SecurityAccess control, data anonymization, database security, and cloud security.Raju Rangaswami, Ruimin Sun, Xuyu Wang, Hadi Amini,Christian Poellabauer
Privacy Theory & TechnologiesHomomorphic encryption, multi-party computation, differential privacy, and zero-knowledge proofs.Kemal Akkaya, Xuyu Wang, Hadi Amini, Yanzhao Wu, Fahrad Shirani

Interdisciplinary Areas

Name of AreaCovered TopicsFaculty
Usable Security & PrivacySecurity and privacy policies, user perspectives, usability, protection against ML, anonymity, privacy-preserving protocols, and privacy-preserving ML.Selcuk Uluagac, Kemal Akkaya, Bogdan Carbunar, Mohammad Ashiqur Rahman, Ruimin Sun, Aslihan (Akkaya) Hahn, Xuyu Wang, Hadi Amini, Christian Poellabauer, Yanzhao Wu, Fahrad Shirani, Niki Pissinou
Misinformation / DisinformationNLP/data mining, threat intelligence, online media security, and discourse analysis.Amin Kharraz, Selcuk Uluagac, Aslihan (Akkaya) Hahn, Mark Finlayson, Sukumar Ganapati, Bogdan Carbunar, S. S. Iyengar, Donavon A. Johnson
Digital ForensicsNetwork forensics, multimedia forensics, deepfakes, cyber-crime, investigation process, and provenance.Alexander Pons, Selcuk Uluagac, Kemal Akkaya, Kenneth G. Furton, S. S. Iyengar, Raju Rangaswami, Amin Kharraz
Blockchain / FintechBlockchain security, cryptocurrencies, DAOs, incentives, and fintech apps.Mohammad Ashiqur Rahman, Hannibal Travis, Donavon A. Johnson, Kemal Akkaya, Selcuk Uluagac, Sukumar Ganapati, Bogdan Carbunar, S. S. Iyengar
Security PoliciesPolicy development, security governance, GDPR, security and society, regulation, and compliance.Sukumar Ganapati, Kemal Akkaya, Selcuk Uluagac, Donavon A. Johnson
Cybersecurity RiskRisk management, cyber insurance, and risk assessment.Yan Chen, Hadi Amini, Mohammad Ashiqur Rahman, Sukumar Ganapati,S. S. Iyengar, Donavon A. Johnson
Cybersecurity EducationLearning models, game-based cybersecurity, workforce development, and cybersecurity leadership.Hadi Amini, Yanzhao Wu, Kemal Akkaya, Selcuk Uluagac, Jason Liu, Mohammad Ashiqur Rahman, Sukumar Ganapati, Tauhidur Rahman, Amin Kharraz, S. S. Iyengar, Donavon A. Johnson

Affiliated Faculty Expertise

CIERTA’s affiliated faculty has the following specific technical expertise to collaborate in research and offer their contributions.

Research Expertise Faculty
Protocol Security AnalysisKemal Akkaya, Jason Liu, S. S. Iyengar
Systems Security AnalysisRuimin Sun, Selcuk Uluagac, Raju Rangaswami, Mohammad Ashiqur Rahman, Amin Kharraz, S. S. Iyengar
Formal MethodsRuimin Sun, Jason Liu, Mohammad Ashiqur Rahman, S. S. Iyengar
Malware AnalysisRuimin Sun, Amin Kharraz, S. S. Iyengar, Selcuk Uluagac, Alexander Pons
CryptographyHadi Amini, Tauhidur Rahman, S. S. Iyengar
Information TheoryFahrad Shirani, Sukumar Ganapati, Tauhidur Rahman, S. S. Iyengar
Coding TheoryFahrad Shirani, S. S. Iyengar
AuthenticationKemal Akkaya, Selcuk Uluagac, Xuyu Wang, Christian Poellabauer, Amin Kharraz, Bogdan Carbunar, S. S. Iyengar
Machine / Deep LearningKemal Akkaya, Selcuk Uluagac, Ruimin Sun, Xuyu Wang, Hadi Amini, Christian Poellabauer, Jason Liu, Mark Finlayson, Yanzhao Wu, Fahrad Shirani, Mohammad Ashiqur Rahman, Bogdan Carbunar, S. S. Iyengar, Julio Ibarra
Game TheoryKemal Akkaya, Xuyu Wang, Mohammad Ashiqur Rahman, S. S. Iyengar
Social EngineeringAmin Kharraz, Selcuk Uluagac
Reverse EngineeringRuimin Sun, Tauhidur Rahman, Amin Kharraz, S. S. Iyengar, Alexander Pons
Digital Forensics ProcessKemal Akkaya, Selcuk Uluagac, Alexander Pons, Raju Rangaswami, Amin Kharraz, S. S. Iyengar
Hardware Security AnalysisMohammad Ashiqur Rahman, Tauhidur Rahman
Differential PrivacyXuyu Wang, Hadi Amini, Yanzhao Wu, Fahrad Shirani
Secure Multi-party ComputationKemal Akkaya, Fahrad Shirani
Homomorphic EncryptionKemal Akkaya
Zero-Knowledge proofsS. S. Iyengar
LLMsRuimin Sun, Xuyu Wang, Mark Finlayson, Yanzhao Wu, Raju Rangaswami, Mohammad Ashiqur Rahman
Consensus AlgorithmsHadi Amini, Fahrad Shirani, S. S. Iyengar
Graph TheoryKemal Akkaya, Hadi Amini, Fahrad Shirani, Amin Kharraz, S. S. Iyengar
Usable Security/Privacy, User studies / surveysKemal Akkaya, Selcuk Uluagac, Ruimin Sun, Mark Finlayson, Sukumar Ganapati, S. S. Iyengar
Organizational BehaviorSukumar Ganapati, S. S. Iyengar, Donavon A. Johnson
Natural Language ProcessingMark Finlayson
Network Traffic Flow AnalysisJulio Ibarra