Florida Center for Cybersecurity

April 3 & 4 at USF Tampa's Patel Center for Global Solutions

Thank you to everyone who made this year's Research Symposium a great success! We are happy to report a 40% increase in registrations over last year's event. We hope you found it enlightening and valuable. See you next year!

View the event agenda here.

Keynote Speakers

Dr. Thomas Holt


Thomas J. Holt, PhD
Professor, School of Criminal Justice, Michigan State University

Understanding the Market and Operations of
RDDoS Service Providers: Booters and Stressers in Action
Reflected-distributed-denial-of-service (rDDoS) attacks are a recent addition to the cybercrime-as-a-service scene. Available on an hourly or subscription basis, rDDoS attacks use legitimate third-party websites to amplify the attack. Thomas Holt, PhD, professor in the School of Criminal Justice at Michigan State University, will explore this emerging threat from both technical and sociological perspectives. Dr. Holt will examine a series of rDDoS attacks to determine if they delivered as advertised, who makes up the customer base for this malicious service, the motives behind an rDDoS attack, and implications for our understanding of the social factors underlying cyberattacks.

Dr. Holt is a professor in the School of Criminal Justice at Michigan State University whose research focuses on computer hacking, malware, and the role of the internet in facilitating all manner of crime and deviance. His work has been published in various journals, including Crime and Delinquency, Deviant Behavior, the Journal of Criminal Justice, and Youth and Society.

Dr. Ravi Sandhu


Ravi Sandhu, PhD
Executive Director and Chief Scientist, Institute for Cyber Security (ICS), University of Texas at San Antonio

Attribute-Based Access Control: Insights and Challenges
Since about 2010, interest in attribute-based access control (ABAC) among cybersecurity researchers and practitioners has grown considerably. Ravi Sandhu, PhD, Executive Director and Chief Scientist for the Institute of Cyber Security (ICS) at the University of Texas at San Antonio, will share his take on insights gathered by his team's intensive research on the subject as well as those of other ABAC researchers. Dr. Sandhu will examine some of the challenges in his research as well as in practical deployments of ABAC.

Dr. Sandhu is Professor of Computer Science and Executive Director of the Institute for Cyber Security at the University of Texas at San Antonio, where he holds the Lutcher Brown Endowed Chair in Cyber Security. Previously he served on the faculty at George Mason University (1989-2007) and Ohio State University (1982-1989). He holds BTech and MTech degrees from IIT Bombay and Delhi, and MS and PhD degrees from Rutgers University. He is a Fellow of IEEE, ACM, and AAAS, and has received numerous awards from IEEE, ACM, NSA, NIST, and IFIP. A prolific and highly cited author, his research has been funded by NSF, NSA, NIST, DARPA, AFOSR, ONR, AFRL, ARO, and private industry. His seminal papers on role-based access control established it as the dominant form of access control in practical systems. His numerous other models and mechanisms have also had considerable real-world impact. He served as Editor-in-Chief of the IEEE Transactions on Dependable and Secure Computing, and previously as founding Editor-in-Chief of ACM Transactions on Information and System Security. He was Chairman of ACM SIGSAC and founded the ACM Conference on Computer and Communications Security, the ACM Symposium on Access Control Models and Technologies, and the ACM Conference on Data and Application Security and Privacy. He has served as General Chair, Steering Committee Chair, Program Chair, and as a committee member for numerous security conferences. He has consulted for leading industry and government organizations and has lectured all over the world. He is an inventor on 30 security technology patents and has accumulated over 39,000 Google Scholar citations for his papers. At the Institute for Cyber Security, his research projects include attribute-based access control, secure cloud computing, secure Internet of Things, secure information sharing, social computing security, and secure data provenance. His website is at www.profsandhu.com.

Post-Quantum Cryptography Panel

As we make strides in quantum computing, we face the reality that our most popular cryptographic systems will be crushed under the sheer computing power of these massive systems. How do we advance cryptography to meet demands for usability and flexibility without sacrificing confidence?


Ed GiorgioEd Giorgio is the founder of Bridgery Technologies and was the co-founder and CEO of Ponte Technologies. He has nearly thirty years of security experience with the National Security Agency (NSA), where he was the only person to have served as both Chief U.S. Codemaker and, subsequently, as Chief U.S. Codebreaker.

Jean-Francois BiasseDr. Jean-François Biasse is an assistant professor of mathematics at the University of South Florida. He graduated from the École Normale Superieure and the École Polytechnique in Paris with degrees in mathematics, computer science and engineering. Prior to joining USF, he was a cryptography expert with the French Ministry of Defense and a postdoctoral fellow at the Institute for Quantum Computing, University of Waterloo.

Dr. John PetroDr. John Petro has a PhD in mathematics from the University of Pennsylvania. For the past 10 years, John has been the Senior Cryptographer at Envieta Systems. Before that, he served 21 years in the U.S. Air Force, including six years on the faculty of the U.S. Air Force Academy. Post Air Force, he spent 15 years as an NSA crypto-mathematician. John's mathematical background in algebraic number theory influenced his cryptographic focus toward public key.

Rainer SteinwandtDr. Rainer Steinwandt serves as director of Florida Atlantic University's Center for Cryptology & Information Security. He is general chair of the 9th International Conference on Post-Quantum Cryptography, co-organized multiple meetings on quantum cryptanalysis, and co-authors an upcoming report for the German Federal Office for Information Security on the feasibility of quantum computers and their cryptographic impact.

Session Topics

Defensive & Resilient Cyberspace with Threat Tracking & Prediction Based on Temporal-Spatial Network/Data Activity Profiling
presented by Dr. Shigang Chen, University of Florida, and
Dr. Patrick Kreidl, University of North Florida

FraudHunt: Online Crowdsourced Fraud Attribution 
presented by Dr. Bogdan Carbunar, Florida International University 

Securing the Internet of Things from the Hardware and Deep-Learning Perspectives
presented by Dr. Xiaolin Li, University of Florida

Detecting Cognitive Hacking in the U.S. Financial Market: A Social Media Study
presented by Dr. Wingyan Chung, University of Central Florida, and
Dr. Xinlin Tang, Florida State University

Utility-Based Approach to Detecting Compromised Machines
presented by Dr. Zhenhai Duan, Florida State University

Helmet: Deep Neural Network Protection Against Adversarial Attacks
presented by Dr. Yier Jin, University of Central Florida, and
Dr. Wujie Wen, Florida International University

Resilient Smart Grid Control for Load-Switching Cyber Attacks
presented by Dr. My T. Thai, University of Florida

Cybersecurity Protection for Software-Defined Networking Applying Machine Learning
presented by Dr. Nasir Ghani, University of South Florida, and
Dr. Alexander Perez-Pons, Florida International University

Proactive Defense Against Cyber-Physical Smart Grid Attacks
presented by Dr. Zhuo Lu, University of South Florida, and
Dr. Yufei Tang, Florida Atlantic University

Software-Defined Overlay Virtual Networks: Enforcing Private Device-to-Device Communication Through Social Contexts
presented by Dr. Adriana Iamnitchi, University of South Florida, and 
Dr. Renato Figueiredo, University of Florida

Resilience and Mission Assurance of Intelligent Machines for Secure Internet of Things
presented by Dr. Zhihua Qu, University of Central Florida

Collaborative Authentication for the Internet of Things
presented by Dr. Jay Ligatti, University of South Florida

Student Posters

Development of a Hands-on Security Lab for Internet of Things
Cyber Physical Systems Lab, Florida International University

Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Systems
Florida International University

Trojan Attacks and Defenses on Deep-Neural-Network-Based Intelligent Computing Systems
Florida International University

Honey Trap: An Analysis of Cybersecurity Threats Through the Eyes of the Honeypot
Florida State University

Crime Online: Evaluating Business Typologies that Increase the Vulnerability to Cybercrime
Florida State University

Cyberbullying and Law
Florida State University College of Law

A Temporal Recurrent Neural Network for Detecting Abnormal Stock Movement: The Case of U.S. Financial Cybersecurity
University of Central Florida

Identifying Cyber Threats from Financial Social Media: A Hybrid Feature Selection Approach
University of Central Florida

Attacks and Vulnerability Analysis of Email as a Password Reset Point
University of North Florida

Detection and Classification of Attacks on IoT Networks
University of South Florida

A New Profile of Cybercrime: An Application of Statistical Profiling on Computer-Related Crime
University of South Florida

High-Level Synthesis of Key-Based Obfuscated RTL Datapaths
University of South Florida

SDN-Based Kernel Modular Countermeasure for Intrusion Detection
University of South Florida

Toward Implementing Security-as-a-Service for NoSQL Databases
University of South Florida

A Typology of Cybercrime Data Sources
University of South Florida

Learning to Succeed While Training to Fail: A Utility-Aware Privacy-Preserving Machine Learning Data Publishing Framework
University of South Florida

A Machine Learning Model for Classifying Unsolicited IoT Devices using Network Telescopes
University of South Florida

Architectural Support for Mitigating Buffer-Overflow Software Attack
University of South Florida

University of South Florida

JADE-Based Multi-Agent Control Testbed for Distributed Optimal Power Flow
University of South Florida

PoCo: Composition of Atomic-Obligation Security Policies
University of South Florida

Software-Defined-Network-Based Emulation of Cyberattacks and Detection in Smart Grid State Estimation
University of South Florida

SDN-based Hardware Testbed for EV Control
University of South Florida

Privacy Leakage over Shared Data in Smart City
University of South Florida

A Key-Based Obfuscation and Anonymization of Behavioral VHDL Models
University of South Florida

An SR-Flip-Flop-Based PUF for Hardware Security
University of South Florida

Cybervandalism: An Analysis
University of South Florida

Refund Policy
  • Your registration fee permits attendance at the two-day event and includes parking and lunch for both days.
  • No prorated tickets or single-day tickets will be offered.
  • Cancellations and requests for reimbursement of registration fees must be received no later than 5:00 pm EST, Monday, March 19. Registrants canceling their registration after that time are not eligible for refunds.