Note: I create this pape for my purpose of quickly catching on what those active core people are working at. It is not an entire collection of all the system & network security researchers, but just those who has already graduated and works on the problem I am intersted in. So those who are still PhD students are not listed. I personally like program analysis; that's why I listed many PL & SE -oriented security people. Also, if it happens for me to forget listing someone, please let me know and I will be happy to add him/her. For the crypto researcher list, please refer to the page maintained by Bruno Crispo and David Wagner


Name Homepage Research Interests
Martin Abadi http://www.soe.ucsc.edu/~abadi/ Security, specification and verification, programming languages ...
Kostas G. Anagnostakis http://s3g.i2r.a-star.edu.sg/~kostas/ Malware defense, distributed systems, networking and computational markets ...
Ross Anderson http://www.cl.cam.ac.uk/~rja14/ Economics of information security, p2p system, robustness of cryptographic protocols ...
William Arbaugh http://www.cs.umd.edu/~waa/ Information systems security and privacy, security management ...
Giuseppe Ateniese http://www.cs.jhu.edu/~ateniese/ Applied cryptography and network security
Vijay Atluri http://cimic.rutgers.edu/~atluri/ Information Security, Privacy, Databases, Workflow Management,Spatial Databases ...
John Aycock http://pages.cpsc.ucalgary.ca/~aycock/ Computer security, worms, virus, trjoans, future threats and defenses ...
Michael Backes http://www.infsec.cs.uni-sb.de/~backes/ Information security and cryptography ...
Lucas Ballard http://www.cs.jhu.edu/~lucas/ Security in biometrics and VoIP, and web security ...
Michael Bailey http://www.eecs.umich.edu/~mibailey/ Security and availability of complex distributed systems ...
Paul Barford http://pages.cs.wisc.edu/~pb/ Network security, intrustion detection, network measurement and evaluation...
Adam Barth http://www.adambarth.com/ Browser security, and privacy
Lujo Bauer http://www.ece.cmu.edu/~lbauer/ Computer security, proof-carrying authorization, distributed access control ...
Steven M. Bellovin http://www.cs.columbia.edu/~smb/ Networks, security, and especially why the two don't get along ...
Emery Berger http://prisms.cs.umass.edu/emery/ Automatic error detection, toleration, and correction ...
Konstantin Beznosov http://konstantin.beznosov.net/professional/main/main.html System & network security, security usability, access control ...
Dan Boneh http://crypto.stanford.edu/~dabo/ Applied cryptography, and network security ...
Nikita Borisov http://www.hatswitch.org/~nikita/ Computer security and privacy, especially as applied to large-scale distributed systems...
Herbert Bos http://www.cs.vu.nl/~herbertb/ System and network security, intrusion detection and signature generation ...
David Brumley http://www.ece.cmu.edu/~dbrumley/ Software security, network security, and applied cryptography
Roy Campbell www.cs.uiuc.edu/~rhc Security, distributed operating systems and ubiquitous computing
Miguel Castro http://research.microsoft.com/en-us/um/people/mcastro/ Software security, network security, and distributed systems
Philip Chan http://www.cs.fit.edu/~pkc/ Adaptive systems, machine learning methods for computer security, web personalization ...
Hao Chen http://www.cs.ucdavis.edu/~hchen/ Web security, cellular network security, software security, and malware defense ...
Peter M. Chen http://www.eecs.umich.edu/~pmchen/ Virtual machine systems, speculative execution in OS & DS, fault-tolerant computing
Shuo Chen http://research.microsoft.com/en-us/um/people/shuochen/ Systems security, software security, browser security, formal verification, program analysis
Yan Chen http://www.cs.northwestern.edu/~ychen/ Computer networking and large-scale distributed systems, network measurement, diagnosis ...
Tzi-cker Chiueh http://www.ecsl.cs.sunysb.edu/~chiueh/ System & network security, malware defense ...
Stephen Chong http://www.cs.cornell.edu/w8/~schong/ Expressive and Enforceable Information Security Policies ...
Mihai Christodorescu http://pages.cs.wisc.edu/~mihai/ Computer security, malware analysis, program verification, and software engineeringe ...
Evan Cooke http://www.eecs.umich.edu/~emcooke/ Network security and distributed systems, malware analysis (defense) ...
Manuel Costa http://research.microsoft.com/en-us/people/manuelc/ Scalable and reliable systems and networks ...
Crispin Cowan http://crispincowan.com/ System & network security, survivability ...
Jedidiah R. Crandall http://www.cs.unm.edu/~crandall/ VM systems, software security, and malware defense ...
Weidong Cui http://research.microsoft.com/en-us/um/people/wdcui/ Systema & network security, malware analysis
Marc Dacier http://www.eurecom.fr/people/dacier.en.htm Attack attribution, underground economy, trustworthy infrastructure, cloud computing ...
George Danezis http://research.microsoft.com/en-us/um/people/gdane/ Computer security and privacy, traffic analysis, statistical inference, & P2P security ...
Anupam Datta http://www.andrew.cmu.edu/user/danupam/ Information security and privacy, Security Analysis of Network Protocols ...
Saumya Debray http://www.cs.arizona.edu/people/debray/ Software security, binary rewriting and link-time code optimization, code compression
Rachna Dhamija http://people.deas.harvard.edu/~rachna/ Security Usability, Authentication, Anti-phishing, Privacy, Security, ...
Sven Dietrich http://home.adelphi.edu/~spock/ Computer security, applied cryptography, anonymity, privacy ...
George Dinolt http://faculty.nps.edu/gwdinolt/ Security policies, secure systems architectures and design ...
Wenliang (Kevin) Du http://www.cis.syr.edu/~wedu/ Security in wireless Ad hoc and sensor networks, distributed computing and grid Computing ...
Dawson Engler http://www.stanford.edu/~engler/ Software security, program analysis, bug finding...
Ulfar Erlingsson http://www.ru.is/faculty/ulfar/ Dependable, distributed software systems ...
David Evans http://www.cs.virginia.edu/~evans/ System security, software engineering, programming languages, cryptography, networking ...
Nick Feamster http://www.cc.gatech.edu/~feamster/ Networked computer systems: network operations, architecture, protocol design ...
Edward W. Felten http://www.cs.princeton.edu/~felten/ Computer security and privacy, and technology policy ...
Jeff Foster http://www.cs.umd.edu/~jfoster/ Programming languages, software engineering, program analysis ...
Cedric Fournet http://research.microsoft.com/en-us/um/people/fournet/ Concurrent programming, distributed systems, and security ...
Michael Franz http://www.ics.uci.edu/~franz/ Security and efficiency aspects of mobile-code systems and on VM technology ...
Michael J. Freedman http://www.cs.princeton.edu/~mfreed/ Distributed systems, security, networking, and applied cryptography ...
Kevin Fu http://www.cs.umass.edu/~kevinfu/ Security and privacy for pervasive computation ...
Vinod Ganapathy http://www.cs.rutgers.edu/~vinodg/ Computer security and reliability,software engineering, program analysis, OS ...
Tal Garfinkel http://www.stanford.edu/~talg/ VM systems, computer security, networks ...
Virgil D. Gligor http://www.ece.cmu.edu/~virgil/ Network and distributed systems security, applied cryptography ...
Jonathon Giffin http://www.cc.gatech.edu/~giffin System and software security, intrusion detection, program analysis, virtualization ...
Patrice Godefroid https://research.microsoft.com/en-us/um/people/pg/ Program specification, analysis, testing and verification, model checking
Steven D. Gribble http://www.cs.washington.edu/homes/gribble/ OS, DS, scalable Internet services, systems security, malware defense
Debin Gao http://www.sis.smu.edu.sg/faculty/infosys/debingao.asp System & Network security, intrusion detection ...
Carrie Gates http://flame.cs.dal.ca/~gates/ Network security and traffic analysis, network situational awareness ...
Ian Goldberg http://www.cs.uwaterloo.ca/~iang/ Security and privacy, creating security and privacy technologies for Internet transactions...
Philippe Golle http://crypto.stanford.edu/~pgolle/ Network security, privacy ...
Guofei Gu http://faculty.cs.tamu.edu/guofei/ System & Network security, malware detection, defense, and analysis, Web security ...
Yong Guan http://home.eng.iastate.edu/~guan/ Computer and network forensics, wireless and sensor network security, privacy-enhancing ...
Fanglu Guo http://www.ecsl.cs.sunysb.edu/~fanglu/ System & network security, wireless network, network performance and dependability ...
Peter Gutmann http://www.cs.auckland.ac.nz/~pgut001/ Design and analysis of security techniques and systems ...
J. Alex Halderman http://www.cse.umich.edu/~jhalderm/ Software security, data privacy, electronic voting, digital rights management, cybercrime ...
Michael Hicks http://www.cs.umd.edu/~mwh/ Software reliability and security ...
Thorsten Holz http://honeyblog.org/ Malware collection (honeypot), analysis, detection, prevention ...
Yih-Chun Hu http://users.crhc.illinois.edu/yihchun/ Security and systems -- secure systems and mobile communications ...
Cynthia Irvine http://faculty.nps.edu/irvine/ High assurance systems and multilevel security...
Angelos Keromytis http://www1.cs.columbia.edu/~angelos/ Computer security, cryptography, and networking
Emre Kiciman http://research.microsoft.com/en-us/people/emrek/ Large-scale systems (mostly Internet services) reliability and operations ...
Yongdae Kim http://www-users.cs.umn.edu/~kyd/ Practical security mechanisms in file systems, p2p systems, sensor and ad-hoc network ...
Engin Kirda http://www.iseclab.org/people/ek/ Software and network security, web vulnerability detection and prevention, binary analysis...
Negar Kiyavash http://users.crhc.illinois.edu/kiyavash/ Timing Channels, Digital Fingerprinting, Biometrics and Cryptography ...
Christian Kreibich http://www.icir.org/christian/ Network architecture, distributed systems, and network security ...
Shriram Krishnamurthi http://www.cs.brown.edu/~sk/ Computer-aided verification, computer security, and software engineering ...
Christopher Kruegel http://www.cs.ucsb.edu/~chris/ Computer & network security, malware analysis, web security, and vulnerability analysis...
Peng Liu http://ist.psu.edu/s2/pliu/ Survivable systems, systems & network Security, privacy ...
Collin Jackson http://www.collinjackson.com/ Securing the Web Platform, Security for Mashups, Privacy in the Browser ...
Trent Jaeger http://www.cse.psu.edu/~tjaeger/ VM systems, Linux security, source code analysis ...
Farnam Jahanian http://www.eecs.umich.edu/~farnam/ Distributed computing, network security, and network protocols & architecture...
Sushil Jajodia http://csis.gmu.edu/faculty/jajodia.html Information systems security, survivability and information warfare, watermarking ...
Somesh Jha http://pages.cs.wisc.edu/~jha/ Computer security, software engineering, program analysis ...
Xuxian Jiang http://www.csc.ncsu.edu/faculty/jiang/ Virtual machines (VMs) and OS security, malware analysis
Markus Jakobsson http://www.informatics.indiana.edu/markus/ Netwrok security, phishing and counter-measures, click-fraud, cryptography ...
Rob Johnson http://www.cs.sunysb.edu/~rob/ Software security, system and network security, cryptography s...
Anthony D. Joseph http://bnrg.cs.berkeley.edu/~adj/ Internet security, mobile/distributed computing, and wireless communications ...
Jaeyeon Jung http://www2.seattle.intel-research.net/~jjung/ Intrusion detecion, network forensic analysis ...
Sam King http://www.cs.uiuc.edu/homes/kingst/Home.html VMs, OS & user level application code security ...
Tadayoshi Kohno http://www.cs.washington.edu/homes/yoshi/ Computer security, privacy, and applied cryptography ...
Arun Lakhotia http://www.cacs.louisiana.edu/~arun/ Program analysis, program visualization and understanding, software evolution/protection ...
Adam J. Lee http://www.cs.pitt.edu/~adamlee/ Protocol design and optimization, privacy-preserving policy evaluation ...
Wenke Lee http://www.cc.gatech.edu/~wenke/ Systems and network security, applied cryptography, network management, and data mining
Brian Neil Levine http://prisms.cs.umass.edu/brian/ Mobile networks, security, and the Internet ...
Ninghui Li http://www.cs.purdue.edu/homes/ninghui/ Cmputer security, access control, privacy, applied cryptography ...
Zhuowei Li http://zhuowei.net/default.aspx Malware/spyware analysis, defense and containment, Intrusion detection ...
Zhenkai Liang http://www.comp.nus.edu.sg/~liangzk/ Software security, program analysis
David Lie http://www.eecg.toronto.edu/~lie/ OS, computer architecture, formal verification and networking ...
Ulf Lindqvist http://www.csl.sri.com/people/lindqvist/ Computer misuse analysis, modeling, categorization, and automatic real-time detection ...
Alex X. Liu http://www.cse.msu.edu/~alexliu/ Networking and security, distributed computing, dependable and high-assurance systems ...
Benjamin Livshits http://research.microsoft.com/en-us/um/people/livshits/ Software security, bug finding, vulnerability analysis ....
Michael E. Locasto http://www.cpsc.ucalgary.ca/~locasto/ System Security, with a focus on automatic, correct, and efficient defense mechanism ...
Javier Lopez http://www.cis.upenn.edu/~stevez/ Network security, security Services and cryptographic protocols for network applications ...
Jonathan M. McCune http://www.ece.cmu.edu/~jmmccune/ Trusted Computing, Operating system and virtualization security, ...
Sergio Maffeis http://www.doc.ic.ac.uk/~maffeis/ Web application security, JavaScript, security protocols, types, ...
Mohammad Mannan http://people.scs.carleton.ca/~mmannan/ Authentication and passwords, malicious software, software security, identity fraud ...
Lorenzo Martignoni http://martignlo.greyhats.it/ Malware analysis and detection, Vulnerability analysis, VM, Computer forensics ...
Roy A. Maxion http://www-2.cs.cmu.edu/afs/cs.cmu.edu/user/maxion/www/ Fault/intrusion detection, attacker/defender testbed, reliable hardware/software ...
David Mazieres http://www.scs.stanford.edu/~dm/ Computer system and security
David Molnar http://www.dmolnar.com/ Cryptography, privacy, and computer security
Z. Morley Mao http://www.eecs.umich.edu/~zmao/ Network security/forensics, network systems/applications, and network management
Patrick McDaniel http://www.patrickmcdaniel.org/ Systems & network security, language-based security ...
John C. Mitchelll http://theory.stanford.edu/people/jcm/ Access control, network protocols, privacy, software systems, and web security ...
George Mohay http://sky.fit.qut.edu.au/~mohayg/ Computer security, intrusion detection, computer forensics ...
Fabian Monrose http://www.cs.unc.edu/~fabian/ Malware classification and modeling, traffic analysis, applied crypto and privacy ...
Greg Morrisett http://www.eecs.harvard.edu/~greg/ Applications of programming language technology for building secure and reliable systems. ...
Andrew Myers http://www.cs.cornell.edu/andru/ Computer security, programming languages, and distributed and persistent objects ...
George Necula http://www.cs.berkeley.edu/~necula/ Security in distributed systems, programming language theory, design and implementation ...
Peng Ning http://discovery.csc.ncsu.edu/ Software and systems security, and security in Ad-hoc & WSN ...
Paul C. Van Oorschot http://www.scs.carleton.ca/~paulv/ Authentication, network security, software security, applied cryptography ...
Bryan Parno http://www.ece.cmu.edu/~bparno/ Network and host-based security, applied cryptography ...
Vern Paxson http://www.icir.org/vern/ System & Network Security, malware defense ...
Marco Pistoia http://www.research.ibm.com/people/p/pistoia/ Mobile-code security, component software, and static program analysis of OO ...
Adrian Perrig http://www.ece.cmu.edu/~adrian/ Networking and systems security, security for mobile computing and sensor networks ...
Radha Poovendran http://www.ee.washington.edu/research/nsl/faculty/radha/ Security of critical networks and network components ...
Phillip Porras http://www.csl.sri.com/people/porras/ Intrusion detection, high assurance computing, security evaluation, network management ...
Atul Prakash http://www.eecs.umich.edu/~aprakash/ Security and privacy, cyber-physical systems ...
Neils Provos http://www.citi.umich.edu/u/provos/ Web-Based Malware, distributed DoS, intrusion detection & prevention ...
Feng Qin http://www.cse.ohio-state.edu/~qin/ Software dependability, operating systems, and security ...
Moheeb Rajab http://www.cs.jhu.edu/~moheeb/ networking and network security ...
Michael Reiter http://www.cs.unc.edu/~reiter/ System & network security, distributed system, applied crypto ...
William Robertson http://wilrobertson.com/ Web security, anomaly detection, malware analysis, and electronic voting ...
Cristina Nita-Rotaru http://homes.cerias.purdue.edu/~crisn/ DS, network protocols and applications, security in wireless ad hoc network ...
Avi Rubin http://www.avirubin.com/ Systems and networking security, with special attention to computer privacy ...
Hassen Saidi http://www.csl.sri.com/users/saidi/ Intrusion detection, and static analysis, computer-aided verification, logic ...
Reiner Sailer http://www.research.ibm.com/people/s/sailer/ Security services for virtualized environments, security analysis, malware prevention ...
Pierangela Samarati http://www.dti.unimi.it/samarati/ Data security, information system security, access control policies, models and systems ...
Ravi Sandhu http://profsandhu.com/ Information security, privacy, authorization models, protocols and mechanisms ...
Stefan Savage http://www-cse.ucsd.edu/~savage/ System & networking (esp availability, security, and occasionally performance) ...
Stuart Schechter http://research.microsoft.com/en-us/people/stus/ Computer security ...
R. Sekar http://seclab.cs.sunysb.edu/sekar/ Intrusion detection, software security, and OS enhancements ...
Hovav Shacham http://www.cs.ucsd.edu/~hovav/ Applied cryptography, systems security, and tech policy ...
Umesh Shankar http://www.umeshshankar.com/ Browser security and privacy, intrusion detection, program analysis ...
Micah Sherr http://www.cs.georgetown.edu/~msherr/ Privacy, e-voting, OS security, network and protocol security, and NIDS ...
Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/ Computer security and privacy, formal methods for analysis of secure systems ...
Stelios Sidiroglou http://www1.cs.columbia.edu/~ss1759 OS, network and software security and software survivability ...
Radu Sion http://www.cs.sunysb.edu/~sion/ Information assurance, applied cryptography and network security
Sean W. Smith http://www.cs.dartmouth.edu/~sws/ System security, PKI, applied crypto ...
Anil Somayaji http://www.scs.carleton.ca/~soma/ Computer security, OS, artificial life, and complex adaptive systems ...
Robin Sommer http://www.icir.org/robin/ Network security, high-performance network intrusion detection in operational settings ...
Dawn Song http://www.cs.berkeley.edu/~dawnsong/ Software security, network security, and applied cryptography ...
Eugene Spafford http://spaf.cerias.purdue.edu/ Information security, computer crime investigation and information ethics ...
Angelos Stavrou http://cs.gmu.edu/~astavrou/ Large systems security & survivability, secure P2p and overlay networking, privacy ...
Salvatore J. Stolfo http://www1.cs.columbia.edu/~sal/ Intrusion detection system ...
Zhengdong Su http://www.cs.ucdavis.edu/~su/ Programming languages, software engineering, and computer security ...
G. Edward Suh http://www.csl.cornell.edu/~suh/ Computer Architecture, computer security, reliability ...
Paul Syverson http://www.syverson.org/ Onion routing; Protocols, security, anonymity, and privacy in Ad-hoc & WSN ...
Peter Szor http://www.peterszor.com/ Computer virus detection, and intrusion prevention...
Patrick Traynor http://www.cc.gatech.edu/~traynor/ Security in cellular networks
Gene Tsudik http://www.ics.uci.edu/~gts/ Privacy, computer and network security, applied cryptography ...
Doug Tygar http://www.cs.berkeley.edu/~tygar/ Privacy, computer security and electronic commerce
Shambhu J. Upadhyaya http://www.cse.buffalo.edu/~shambhu Information assurance, computer security, fault diagnosis, fault tolerant computing ...
Alfonso Valdes http://www.csl.sri.com/users/valdes/ Probabilistic alert correlation, dependable intrusion tolerance ...
V.N. Venkatakrishnan http://www.cs.uic.edu/~venkat/ Web & browser security, privacy and information flow policies ...
Giovanni Vigna http://www.cs.ucsb.edu/~vigna/ Web Security, intrusion detection, vulnerability analysis, malware and badware analysis
Jan Vitek http://www.cs.purdue.edu/homes/jv/ Programming languages, VM, program analysis and optimization, information security
Geoffrey M. Voelker http://www-cse.ucsd.edu/~voelker/ Network and systems security ...
David Wagner http://www.cs.berkeley.edu/~daw/ Systems & networks, applications of static and dynamic program analysis to computer security
Dan Wallach http://www.cs.rice.edu/~dwallach/ Mobile code security, p2p networking security, wireless security, security in evoting systems
Michael Waidner http://www.zurich.ibm.com/~wmi/ Computer and network security, privacy ...
Cliff Wang http://www.csc.ncsu.edu/directories/faculty_info.php?id=2324 Network security, Secure protocols and algorithms for sensor networks and wireless...
Haining Wang http://www.cs.wm.edu/~hnw/ Network security, network QoS, computer Security, wireless and mobile computing ...
Helen J. Wang http://research.microsoft.com/en-us/um/people/helenw/ System security, malware defense, web security, wireless location privacy ...
Jia Wang http://www.research.att.com/~jiawang/ Internet routing, network measurement and management, and network security ...
Lingyu Wang http://users.encs.concordia.ca/~wang/ Data privacy, vulnerability analysis, intrusion detection, security metrics ...
Ke Wang http://www1.cs.columbia.edu/~kewang/ Intrusion detection, user behavior modeling, spam blocking ...
Xinyuan (Frank) Wang http://ise.gmu.edu/~xwangc/ Network-based intrusion source tracing, botnet, VoIP security, information hiding ...
XiaoFeng Wang http://www.informatics.indiana.edu/xw7/ Automatic program Analysis, DoS containment, incentive engineering
Yi-Min Wang https://research.microsoft.com/en-us/um/people/ymwang/ Cybersecurity & systems management ...
Brent Waters http://userweb.cs.utexas.edu/~bwaters/ Network security and applied cryptography ...
Nicholas C Weaver http://www.icsi.berkeley.edu/~nweaver/ Network and systems security ...
Westley Weimer http://www.cs.virginia.edu/~weimer/ Software quality, program analysis, designing languages and language features ...
Tara Whalen http://sites.google.com/site/tjwhalen/ Usable security, computer and network security, human-computer interaction, privacy ...
William H. Winsborough http://www.cs.utsa.edu/~winsboro/ Computer security and privacy in distributed systems and networks ...
Rebecca N. Wright http://www.cs.rutgers.edu/~rebecca.wright/ Computer and communications security ...
S. Felix Wu http://www.cs.ucdavis.edu/~wu/ Vulnerability analysis, IPSec/VPN policy management, routing protocol security ...
Yinglian Xie http://research.microsoft.com/en-us/people/yxie/ Network security, privacy, distributed systems, and networking ...
Dongyan Xu http://www.cs.purdue.edu/homes/dxu/ Virtualization in system security, and distributed computing
Jun Xu http://research.google.com/pubs/author857.html System and network security, software security ...
Shouhuai Xu http://www.cs.utsa.edu/~shxu/ Provably survivable/trustworthy systems ...
Junfeng Yang http://www.cs.columbia.edu/~junfeng/ OS, software error detection, security, and storage systems ...
Danfeng (Daphne) Yao http://www.cs.rutgers.edu/~danfeng/ Computer and information security and applied cryptography ...
Vinod Yegneswaran http://www.csl.sri.com/people/yegneswaran/ System & network security, malware defense ...
Heng Yin http://lcs.syr.edu/faculty/yin/ Binary analysis, malware detection ...
Haifeng Yu http://www.comp.nus.edu.sg/~yuhf/ Distributed Systems Security, Distributed Algorithms, Distributed Systems Availability ...
Ting Yu http://www4.ncsu.edu/~tyu/ Trust management and privacy preservation in open systems, and database management systems...
Nickolai Zeldovich http://people.csail.mit.edu/nickolai/ System and Network Security, software security, information flow ...
Steve Zdancewic http://www.cis.upenn.edu/~stevez/ Language-based security, access control and authorization logic ...
Xiangyu Zhang http://www.cs.purdue.edu/homes/xyzhang/ Software debugging, program analysis, dynamic slicing ...
Xiaolan (Catherine) Zhang http://www.google.com/search?q=Catherine+Zhang Secure software technology ...
Sheng Zhong http://www.cse.buffalo.edu/~szhong/ Wireless networks, data privacy and applied cryptography, theory and algorithms ...
Yuanyuan Zhou http://www.cs.uiuc.edu/homes/yyzhou/ Computer architecture, OS, software reliability, software debugging ...
Sencun Zhu http://www.cse.psu.edu/~szhu/ Network and systems security, and security in Ad-hoc & WSN ...
Cliff C. Zou http://www.cs.ucf.edu/~czou/ Computer and network security, network modeling and performance evaluation ...


HOME SOURCE