Digital Forensics Research Group
The Digital Forensics Information Intelligence (DFII) Research Group consist of academic faculty from computing science and information technology, undergraduate and post graduate students, and industry professionals.
Meeting Time: 5:15 to 6:00 pm every Wednesday
Location: Shelby Hall: Room 2117
|1/18/2017||Miranda Jahn||Medical Mannequin Forensic Analysis||USA|
|1/25/2017||Brian Ledbetter||Analyzing Inherent Vulnerabilities and Associated Risk in Bluetooth Technology||USA|
|2/1/2017||Phil Menard||Competitiveness on Social Networking Sites and Its Implications on Individuals’ Security and Privacy Concerns||USA|
|2/8/2017||Adam Brown||Immunizing Organizations from Contagious Risk: The Need for Third-Party Information Security Policy Adoption||USA|
|2/15/2017||Dr. Ryan Benton||Social Media / Big Data / Data Mining||USA|
|2/22/2017||Patrick Luckett||Identifying Cyber Anomalies Using CPU Power Consumption and Learning Algorithms||USA|
|3/1/2017||No Meeting - Mardi Gras!|
|3/8/2017||Dr. Brad Glisson||The role of mobile forensics in terrorism investigations involving the use of cloud apps||USA|
|3/15/2017||No Meeting - Spring Break!|
|3/22/2017||Dr . Mark Yampolskiy||dr0wned||USA|
|8/24/2016||SoC Faculty & Students||I/UCRC 10 Minute Idea Lightening Talks||USA|
|8/31/2016||SoC Faculty & Students||I/UCRC 10 Minute Idea Lightening Talks||USA|
|9/7/2016||SoC Faculty & Students||I/UCRC 10 Minute Idea Lightening Talks||USA|
|9/14/2016||SoC Faculty & Students||I/UCRC 10 Minute Idea Lightening Talks||USA|
|9/21/16||Mr. Samuel Moore||Implications of Malicious 3D Printer Firmware||USA|
|10/5/16||Dr. Philip Menard||Training Wheels: A New Approach to Teaching Mobile Device Security||USA|
|10/12/16||Mr. Thanh Nguyen||Exploitation and Detection of a Malicious Mobile Application||USA|
|10/19/16||Mr. Patrick Luckett||Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices||USA|
|10/26/16||Dr. Brad Glisson||In-the-Wild Residual Data Research and Privacy||USA|
|11/9/16||Mr. Paul Weatherby||"Where's the Chat?"||FBI - Forensic Examiner|
|11/23/16||No Meeting - Thanksgiving!|
|1/22/16||Dr. Brad Glisson||Utilizing the Cloud to Store Hijacked Camera Images||USA|
|1/29/16||Adam Brown||Cloud Forensics: Balancing Evidence Gathering and Privacy Protections||USA|
|2/5/16||No meeting - Mardi Gras Holiday|
|2/12/16||Dr. Ryan Benton||Social Media||USA|
|2/19/16||Dr. Jordan Shropshire||Insight: Guest Integrity Monitoring for Cloud Eco-Systems||USA|
|2/26/16||Dr. Brad Glisson||The impact of Residual Data on Society - I/UCRC||USA|
|3/4/16||Clay Davidson||Feasibility of applying Moving Target Defensive Techniques in a SCADA System||USA|
|3/11/16||Doug Greene||Email Forensics||SSI Group|
|3/18/16||No meeting - Spring Break|
|3/25/16||Sam Moore||Security Analysis of Desktop 3D Printer Software||USA|
|4/1/16||Dustin Mink||Next Generation Aircraft Architecture and Digital Forensics||USA|
|4/8/16||Adam Brown||What's in your Honeypot?||USA|
|4/15/16||Maureen van Devender||Identifying Opportunities to Compromise Medical Devices||USA|
|9/04/15||Dr. Brad Glisson||CyanogenMod Anti-forensics||USA|
|9/11/15||Dr. Brad Glisson||Electronic retention: what does your mobile phone reveal about you?||USA|
|9/18/15||Dr. Brad Glisson||Investigating Information Security Risks of Mobile Device Use within Organizations||USA|
|9/25/15||Dr. Jordan Shropshire||Emerging security and privacy risks in cloud computing||USA|
|10/02/15||Professor Andrew Blyth||Solid State Drives USB Technology: The Challenges that we Face for Data- Recovery and Computer Forensics||University of South Wales|
|10/09/15||No Meeting - Fall Break!|
|10/16/15||Dr. Ryan Benton||Steganalysis: Detecting Hidden Messages||USA|
|10/23/15||Dr. Mark Yampolskiy||AM Security Issues / Opportunities||USA|
|10/30/15||Doug Greene||Digital Evidence||SSI Group|
|11/06/15||Paul Weatherby||Practical Forensics||FBI - Forensic Examiner|
|11/13/15||Dr. Ezhil Kalaimannan||Smart Device Forensics: Investigation of Digital Evidence||University of West Florida|
|11/20/15||Becky Bace||What did we learn from our Mobile Security efforts that might help us secure IOT?||USA|
|11/27/15||No Meeting - Thanksgiving!|
|12/4/15||Dr. Phil Menard||Putting the ‘Motivation’ in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means||USA|
William Bradley Glisson, PhD
Dr. Glisson is currently an Associate Professor at the University of South Alabama. He has a Ph.D. in Computing Science from the University of Glasgow, Scotland, 2008. His area of research focuses on digital forensics, information assurance, software engineering and applied computing science with specific interest in security, business and healthcare domains. His work has been published in a wide variety of international conferences and journals.
Mark Yampolskiy, PhD
Dr. Yampolskiy is an Assistant Professor at USA. He undertakes research in the area of CPS Security. His main research interest lies with Security of Additive Manufacturing (AM) also broadly known as 3D Printing. Dr. Yampolskiy has eleven years of industrial experience in software design and development, four of which in the area of Embedded Systems Security. Furthermore, he has nine years of experience in national and international grade research projects, including two years as a Post-Doctoral Research Scholar at Vanderbilt University with a focus on Security of CPS.
Jordan Shropshire, PhD
Dr. Jordan Shropshire is an Associate Professor of CIS at the University of South Alabama. His research centers on the technical and strategic aspects of information security. His research is funded by organizations such as the National Science Foundation and the National Security Agency. Dr. Shropshire has published articles in journals such as European Journal of Information Systems, Computers & Security, and Journal of Computer Information Systems. He has served as reviewer and ad hoc associate editor for journals such as MIS Quarterly, European Journal of Information Systems, Decision Support Systems, and Information Systems Research. He has completed external reviewers for the National Science Foundation. He has presented research and provides reviews for conferences such as America’s Conference on Information Systems (AMCIS), International Conference on Information Systems (ICIS), and Hawaiian International Conference on Systems Science (HICSS). Dr. Shropshire completed his PhD in Management Information Systems from Mississippi State University and his Bachelors of Science in Business Administration at the University of Florida.
Phil Menard, PhD
Dr. Menard is an Assistant Professor of Information Systems at the University of South Alabama. He is also a past recipient of the CyberCorps Scholarship for Service (SFS), earning certification as an Information Assurance Professional. He is particularly interested in the impacts of security measures on organizational end users, security education training and awareness (SETA) programs, and the impact of espoused cultural values on individuals' performance of secure behaviors. He has published at the Journal of Computer Information Systems (JCIS) and has presented at the IFIP Dewald Roode Workshop on Information Systems Security Research and the Americas Conference on Information Systems (AMCIS). He has served as a reviewer for several IS conferences.
Ryan Benton, PhD
Dr. Benton is an Assistant Professor in the School of Computing at the University of South Alabama. Prior to joining USA, Dr. Benton was a research scientist at the University of Louisiana at Lafayette (UL Lafayette). While at UL Lafayette, he served within the Informatics Research Institute (IRI) and the Center for Advanced Computer Studies (CACS); he was also a founding member of the Center for Visual and Decision Informatics (CVDI), the only Nation Science Foundation Industry/University Collaborative Research Center in Louisiana. Dr. Benton, while associated with UL Lafayette, also served as Director of Research for Star Software Systems Corporation from 2001 to 2005. He received his B.S. degree in Computer Information Systems (1995) from Loyola University New Orleans and his M.S. (1997) and Ph.D. (2001) in Computer Science at UL Lafayette. His research interest lies in the fields of data mining and machine learning, with a current focus upon advanced pattern mining methods, novel graph mining algorithms, and applied applications.
Maureen Van Devender
Maureen Van Devender is currently an instructor in the School of Computing at the University of South Alabama. She has a BS in Computer and Information Sciences from the University of South Alabama and an MBA from Spring Hill College. She is currently pursuing a Ph.D. in Computing at the University of South Alabama. Her research focuses on health informatics.
Ms. Lucas is currently an Instructor at the University of South Alabama. She has a Master's in Information Systems from the University of South Alabama. She also has a Bachelor's in Management Information Systems with a minor in Computer Science from the University of South Alabama. Her research areas include Big Data, data governance, privacy, cyber assurance, cyber security, and forensics with specific interest in business, education, and non-profit organizations.
David Keeler has worked as a consultant in several different client industries. David's areas of specialty include expertise in a variety of PC and web-based programming languages; data modeling, management and organization; and forensic data analysis. He is also a Certified Public Accountant (CPA) licensed in the states of Alabama and Texas. In addition to his diverse technology knowledge and experience, David has also been an organizational leader, holding management positions in the areas of accounting, finance, operations and marketing.
He has served as an expert witness on technology matters, and has worked extensively with Patent and Intellectual Property issues as they apply to telecommunications and related technologies. He holds a baccalaureate degree in Computer Science and a Master’s in Business Administration.
Les Barnett is the Director of the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama. He brings over 30 years of business management experience, most of which was in the information technology industry. Mr. Barnett was a founder of Omniphone, Inc. and operated that company as president and CEO for twenty years, retiring in 2008. While there, his company developed and provided embedded systems to telephone service providers, including BellSouth, Ameritech, Southwestern Bell, AT&T, Cincinnati Bell and others. In addition to billing, data mining operations were provided as a service, with the emphasis on fraud control, forensics and IT security.
Darren Martin is an seasoned IT professional with experience in managing a large IT organization.
Ms. Tang earned her undergraduate degree in Information Technology at the University of South Alabama School of Computing, where she specialized in Digital Forensics and Networking. Current working on a masters in Software Engineering with Penn State. Ms. Tang is currently a Software/Applications Developer at AM/NS Calvert.
Michael Black, PhD
Michael Black is the lead investigator, bringing several years of forensic experience. Michael has done significant research in data carving, and on discovery of new tools that can be used to locate and retrieve and recover data, and enable forensic experts to succeed in data recovery and establishment of the chain of evidence satisfactory for the courts.