Digital Forensics Research Group
SoC was recently awarded a National Science Foundation grant to fund a Site as one of two sites that make up a broader Center for Advanced Forensic Science Research. Our Site has focus in Digital Forensic Research and brings together more than a dozen active researchers with a range of specialties. The intensified collaboration of an Industry-University Cooperative Research Center (I/UCRC) encourages both students and industrial partners to capitalize on faculty foundational knowledge and practical expertise to perform industrially relevant fundamental research. Broader center interaction exposes faculty, students and industrial partners to cross-cutting research issues along with presenting prospects for interdisciplinary and cross-university collaboration.
The Digital Forensics Information Intelligence (DFII) Research Group consist of academic faculty from computing science and information technology, undergraduate and post graduate students, and industry professionals. Click Here for SOC Digital Forensics Capabilities
Meeting Time: 5:15 to 6:00 pm every Wednesday
Location: Shelby Hall: Room 2121
|Spring Semester 2018 Presentation Schedule|
|1/24/2018||Dr . Mark Yampolskiy||Additive Manufacturing Forensics: Digital and Side-Channel-Based||USA|
|1/31/2018||Thanh Nguyen||IoT System Knowledge Paper||USA|
|2/7/2018||Dr. Brad Glisson||The Impact of Residual Data on Society||USA|
|2/14/2018||No Meeting - Mardi Gras!|
|2/21/2018||Steven Presley||Effective Cybersecurity Risk Management in Project Organizations||USA|
|2/28/2018||Ramya Kuppam Manikyam||Comparing Effectiveness of Commercial Obfuscators against Man-at-the-End Attacks||USA|
|3/7/2018||No Meeting - I/UCRC USA|
|3/14/2018||Dr. McDonald / Dr. Glisson||HICSS Paper||USA|
|3/21/2018||Daniel Miller||3D Printer Vox 8 - Conference Paper||USA|
|3/28/2018||No Meeting - Spring Break!|
|4/11/2018||Lynne Graves||Social Media Legal Context Impact||USA|
|4/18/2018||Daniel Miller||3D Printer Vox 8 - Journal Paper||USA|
|Fall Semester 2017 Presentation Schedule|
|9/6/2017||Maureen Van Devender||Understanding De-identification of Healthcare Big Data / AMCIS Paper||USA|
|Dr. Brad Glisson||I/UCRC Update||USA|
|9/13/2017||Dr. David Bourrie||Security Incident Recognition and Reporting (SIRR): An Industrial Perspective / AMCIS Paper||USA|
|9/20/2017||Dustin Mink||Manipulating the Five V’s in the Next Generation Air Transportation System / SecureComm Workshop||USA|
|9/27/2017||Ramya Kuppam Manikyam||Enhanced Operating System Protection to Support Digital Forensic Investigations / TrustCom Paper||USA|
|10/4/2017||Dr. Jordan Shropshire||Visualization I/UCRC Idea||USA|
|10/11/2017||No Meeting - Fall Break|
|10/18/2017||No Meeting - Fall Break|
|10/25/2017||Dr. Philip Menard||Cybersecurity Learning: Addressing the Critical Shortage of Cybersecurity Talent||USA|
|11/1/2017||Mason Mesler||Automotive App Examination||USA|
|11/8/2017||George Clark||AI Forensics Paper||USA|
|11/15/2017||Daniel Miller||The Case for Investigating Residual Data on 3D Printers - Journal Paper||USA|
|11/22/2017||No Meeting - Thanksgiving|
William Bradley Glisson, PhD
Dr. Glisson is currently an Associate Professor at the University of South Alabama.
He has a Ph.D. in Computing Science from the University of Glasgow, Scotland, 2008.
His area of research focuses on digital forensics, information assurance, software
engineering and applied computing science with specific interest in security, business
and healthcare domains. His work has been published in a wide variety of international
conferences and journals.
Mark Yampolskiy, PhD
Dr. Yampolskiy is an Assistant Professor at USA. He undertakes research in the area
of CPS Security. His main research interest lies with Security of Additive Manufacturing
(AM) also broadly known as 3D Printing. Dr. Yampolskiy has eleven years of industrial
experience in software design and development, four of which in the area of Embedded
Systems Security. Furthermore, he has nine years of experience in national and international
grade research projects, including two years as a Post-Doctoral Research Scholar at
Vanderbilt University with a focus on Security of CPS.
Jordan Shropshire, PhD
Dr. Jordan Shropshire is an Associate Professor of CIS at the University of South
Alabama. His research centers on the technical and strategic aspects of information
security. His research is funded by organizations such as the National Science Foundation
and the National Security Agency. Dr. Shropshire has published articles in journals
such as European Journal of Information Systems, Computers & Security, and Journal
of Computer Information Systems. He has served as reviewer and ad hoc associate editor
for journals such as MIS Quarterly, European Journal of Information Systems, Decision
Support Systems, and Information Systems Research. He has completed external reviewers
for the National Science Foundation. He has presented research and provides reviews
for conferences such as America’s Conference on Information Systems (AMCIS), International
Conference on Information Systems (ICIS), and Hawaiian International Conference on
Systems Science (HICSS). Dr. Shropshire completed his PhD in Management Information
Systems from Mississippi State University and his Bachelors of Science in Business
Administration at the University of Florida.
Phil Menard, PhD
Dr. Menard is an Assistant Professor of Information Systems at the University of South
Alabama. He is also a past recipient of the CyberCorps Scholarship for Service (SFS),
earning certification as an Information Assurance Professional. He is particularly
interested in the impacts of security measures on organizational end users, security
education training and awareness (SETA) programs, and the impact of espoused cultural
values on individuals' performance of secure behaviors. He has published at the Journal
of Computer Information Systems (JCIS) and has presented at the IFIP Dewald Roode
Workshop on Information Systems Security Research and the Americas Conference on Information
Systems (AMCIS). He has served as a reviewer for several IS conferences.
Ryan Benton, PhD
Dr. Benton is an Assistant Professor in the School of Computing at the University
of South Alabama. Prior to joining USA, Dr. Benton was a research scientist at the
University of Louisiana at Lafayette (UL Lafayette). While at UL Lafayette, he served
within the Informatics Research Institute (IRI) and the Center for Advanced Computer
Studies (CACS); he was also a founding member of the Center for Visual and Decision
Informatics (CVDI), the only Nation Science Foundation Industry/University Collaborative
Research Center in Louisiana. Dr. Benton, while associated with UL Lafayette, also
served as Director of Research for Star Software Systems Corporation from 2001 to
2005. He received his B.S. degree in Computer Information Systems (1995) from Loyola
University New Orleans and his M.S. (1997) and Ph.D. (2001) in Computer Science at
UL Lafayette. His research interest lies in the fields of data mining and machine
learning, with a current focus upon advanced pattern mining methods, novel graph mining
algorithms, and applied applications.
Maureen Van Devender
Maureen Van Devender is currently an instructor in the School of Computing at the
University of South Alabama. She has a BS in Computer and Information Sciences from
the University of South Alabama and an MBA from Spring Hill College. She is currently
pursuing a Ph.D. in Computing at the University of South Alabama. Her research focuses
on health informatics.
Ms. Lucas is currently an Instructor at the University of South Alabama. She has a
Master's in Information Systems from the University of South Alabama. She also has
a Bachelor's in Management Information Systems with a minor in Computer Science from
the University of South Alabama. Her research areas include Big Data, data governance,
privacy, cyber assurance, cyber security, and forensics with specific interest in
business, education, and non-profit organizations.
David Keeler has worked as a consultant in several different client industries. David's areas of specialty include expertise in a variety of PC and web-based programming languages; data modeling, management and organization; and forensic data analysis. He is also a Certified Public Accountant (CPA) licensed in the states of Alabama and Texas. In addition to his diverse technology knowledge and experience, David has also been an organizational leader, holding management positions in the areas of accounting, finance, operations and marketing.
He has served as an expert witness on technology matters, and has worked extensively with Patent and Intellectual Property issues as they apply to telecommunications and related technologies. He holds a baccalaureate degree in Computer Science and a Master’s in Business Administration.
Les Barnett is the Director of the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama. He brings over 30 years of business management experience, most of which was in the information technology industry. Mr. Barnett was a founder of Omniphone, Inc. and operated that company as president and CEO for twenty years, retiring in 2008. While there, his company developed and provided embedded systems to telephone service providers, including BellSouth, Ameritech, Southwestern Bell, AT&T, Cincinnati Bell and others. In addition to billing, data mining operations were provided as a service, with the emphasis on fraud control, forensics and IT security.
Darren Martin is an seasoned IT professional with experience in managing a large IT organization.
Ms. Tang earned her undergraduate degree in Information Technology at the University of South Alabama School of Computing, where she specialized in Digital Forensics and Networking. Current working on a masters in Software Engineering with Penn State. Ms. Tang is currently a Software/Applications Developer at AM/NS Calvert.
Michael Black, PhD
Michael Black is the lead investigator, bringing several years of forensic experience.
Michael has done significant research in data carving, and on discovery of new tools
that can be used to locate and retrieve and recover data, and enable forensic experts
to succeed in data recovery and establishment of the chain of evidence satisfactory
for the courts.