中国专业的国际教育交流服务机构
留学e网客服电话

当前位置:老首页 > 院校申请 > 美国留学 > 美国留学资讯

美国留学 网络安全方向教授列表

  本文转自Warald博文,作者:Warald iamxiaoning@gmail.com http://iamxiaoning1980.spaces.live.com)

  近年来留学美国申请计算机专业网络安全方向的学生逐年增加,本文主要为学生们整理了一份网络安全圈中的prof的list,方便学生了解一下圈内都有啥人。入选的prof都是主攻security或有这方面大项目的教授们,而不是偶尔去security打打酱油的那些。如果有遗漏了啥,或者别的同学对某个教授有内部消息的话,欢迎补充。

  HC-专攻security的教授

  Busy-大牛,但现在当官了,或者在搞别的玩意。

  CMU卡内基梅陇大学

  好多教授居然都不在faculty list里。只有通过cylab站点才能找到,十分诡异。

  Lorrie Faith Cranor (HC)

  http://lorrie.cranor.org/

  Privacy, usable privacy andsecurity software, computers and society, technology policy, voting

  Greg Ganger

  http://www.ece.cmu.edu/~ganger/

  Operating systems, security,storage/file systems, networking, and distributed systems

  Peter Lee (busy)

  http://www-2.cs.cmu.edu/~petel/

  Programming languages,compilers, proof-carrying code, educational technology, network security,operating systems

  Frank Pfenning

  http://www.cs.cmu.edu/~fp/

  Programming languages, logic,type theory, automated deduction, security

  Jeannette M. Wing (HC)

  http://www-2.cs.cmu.edu/~wing/

  Trustworthy computing, security, privacy, formal methods,distributed and concurrent systems, programming languages, softwareengineering.

  Bruce MacDowell Maggs (AJ)

  http://www.cs.cmu.edu/~bmm/

  Adjunct Professor, Computer Science Department, CarnegieMellon

  Professor, Department of Computer Science, Duke University

  Vice President, Research Akamai Technologies

  Hui Zhang (busy)

  http://www-2.cs.cmu.edu/~hzhang/

  ADRIAN PERRIG

  http://www.ece.cmu.edu/~adrian/

  David Brumley (HC)

  http://www.ece.cmu.edu/~dbrumley/index.html

  bug finding, program analysis, etc

  http://www.cylab.cmu.edu/research/projects/current/index.html

  Berkeley加州伯克利分校

  Anthony D. Joseph (missing?)

  http://bnrg.cs.berkeley.edu/~adj/

  OperatingSystems Networking (OSNT)

  Security(SEC)

  Computer and Network Security; Distributed systems; Mobilecomputing; Wireless networking; Software engineering, and operating systems

  Vern Paxson (HC)

  http://www.icir.org/vern/

  botnet master ;p

  Dawn Song (HC)

  http://www.cs.berkeley.edu/~dawnsong/

  Computer security, privacy, and applied cryptography,including security and privacy issues in systems, software, networking, anddatabases. Analysis of and defense against malicious code. Using programanalysis, algorithms design, and machine learning for security and privacy.

  Doug Tygar (busy)

  http://www.cs.berkeley.edu/~tygar/

  Privacy, computer security, electronic commerce

  David Wagner (HC)

  http://www.cs.berkeley.edu/~daw/

  Computer security, especially security of large-scalesystems and networks. Applications of static and dynamic program analysis tocomputer security. I am currently working on software security, electronic voting, and other topics.

  MIT麻省理工大学

  http://www.eecs.mit.edu/sup-faculty.html

  Srini Devadas (HC?)

  http://people.csail.mit.edu/devadas/

  Computer-aided design. Computer security. Computerarchitecture.

  Ronald L. Rivest (HC)

  http://people.csail.mit.edu/rivest/

  Cryptography. Computer/network security. Algorithms. Votingtechnology.

  check out his last name!

  Nickolai Zeldovich (HC)

  http://people.csail.mit.edu/nickolai/

  Building practical secure systems. Operating systems,hardware design, networking, and distributing systems. Programming languagesand tools, security analysis and verification.

  Stanford斯坦福大学

  http://cs.stanford.edu/research/faculty

  http://forum.stanford.edu/research/profiles.php

  Dan Boneh (HC)

  http://crypto.stanford.edu/~dabo/

  applied cryptography, network security

  Dawson Engle (HC)

  http://www.stanford.edu/~engler/

  Source code analysis; software quality and security

  Monica S. Lam (missing??)

  http://suif.stanford.edu/~lam/

  compilers, program analysis, operating systems, security,computer architecture, high-performance computing

  John C. Mitchell (HC)

  http://theory.stanford.edu/people/jcm/

  computer security: access control, network protocols,privacy, software systems, web security

  Cornell康奈尔大学

  JOSEPH Y. HALPERN

  http://www.cs.cornell.edu/home/halpern/

  distributed computing, AI, security, and game theory

  Andrew Myers (HC?)

  http://www.cs.cornell.edu/andru/

  It is too hard to build trustworthy software systems usingconventional systems APIs. I work on higher-level, language-based abstractionsfor programming that better address important cross-cutting concerns: security,extensibility, persistence, distribution.

  Rafael Pass

  http://www.cs.cornell.edu/~rafael/

  Cryptography and its interplay with Computational Complexityand Game Theory.

  Fred B. Schneider (HC??)

  http://www.cs.cornell.edu/fbs/index.htm

  My research is intended to support the construction ofconcurrent and distributed systems for high-integrity and mission-criticalsettings. Fault-tolerance and security are critical in such settings.

  UIUC伊利诺伊香槟分校

  Nikita Borisov (HC)

  http://www.hatswitch.org/~nikita/

  computer security and privacy, especially as applied tolarge-scale distributed systems

  Carl Gunter

  http://cs.illinois.edu/people/faculty/carl-gunter

  programming languages, formal analysis of networks andsecurity, and privacy

  Sam King (HC)

  http://www.cs.uiuc.edu/homes/kingst/Home.html

  security, OS, virtual machines

  Roy H. Campbell

  http://www.iti.illinois.edu/people/researchers/roy-h-campbell

  engineering and construction techniques of complex systemsoftware

  University of Washington华盛顿大学

  David Wetherall

  http://djw.cs.washington.edu/index.htm

  Networks, wireless, ubiquitous computing, security

  Steven D. Gribble (HC)

  http://www.cs.washington.edu/homes/gribble/index.html

  Operating systems, distributed systems, scalable systems,browser architecture, system security

  Tadayoshi Kohno (Yoshi Kohno) (HC)

  http://www.cs.washington.edu/homes/yoshi/

  Computer security and privacy

  Henry M. Levy (HC)

  http://www.cs.washington.edu/homes/levy/

  Operating systems, architecture, security, internetmeasurement

  Princeton普林斯顿大学

  Andrew W. Appel (HC)

  http://www.cs.princeton.edu/~appel/

  computer security, compilers, programming languagesemantics, machine-checked proofs, and election technology

  Edward W.Felten (HC)

  http://www.cs.princeton.edu/~felten/

  computer security and privacy, and public policy issuesrelating to information technology

  Michael J. Freedman

  http://www.cs.princeton.edu/~mfreed/

  distributed systems, security, and networking

  U Texas德州大学

  Yin Zhang (HC)

  http://userweb.cs.utexas.edu/users/yzhang/

  networkmanagement, networkmeasurement, networksecurity, wirelessoptimization, overlayrouting and multihoming, and datastream computation

  Fred Chang (?)

  http://userweb.cs.utexas.edu/~chang/

  He is the former Director of Research at the NationalSecurity Agency.

  Mike Dahlin (HC)

  http://userweb.cs.utexas.edu/users/dahlin/

  Internet- and large-scale services, fault tolerance,security, operating systems, distributed systems, and file systems.

  Mohamed G. Gouda (HC)

  http://userweb.cs.utexas.edu/users/gouda/

  Programming Methodology, Concurrent and DistributedComputing, Fault-tolerant Computing, Secure Computing, Network Protocols,Sensor Networks, Formal Methods.

  Simon S. Lam

  http://userweb.cs.utexas.edu/users/lam/

  Vitaly Shmatikov (HC)

  http://userweb.cs.utexas.edu/users/shmat/

  computer security and privacy, formal methods for analysisof secure systems and network protocols

  Michael Walfish (HC?)

  http://userweb.cs.utexas.edu/users/mwalfish/

  Brent Waters (HC)

  http://userweb.cs.utexas.edu/users/bwaters/

  cryptography and network security

  (编辑:Ada)

英国留学签证攻略 

澳洲初高中留学攻略 

CCTV央视网牵手留学e... 

新西兰地图,新西兰大... 

英国G5精英大学Offer...