Leszek T. Lilien, Ph.D.

Associate Professor Emeritus



llilien@wmich.edu

https://cs.wmich.edu/llilien

Department of Computer Science

College of Engineering and Applied Sciences

Western Michigan University

1903 West Michigan Avenue
Kalamazoo, MI 49008-5466
 
  
Main Office: 269-276-3101





[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]


Note: This page shows highlights of Dr. Lilien’s activities and is not a complete record of his work.


Summary

Last update of this section: 12 August 2024

Associate Professor Emeritus of Computer Science at Western Michigan University (WMU), retired on August 31, 2020. Adjunct Associate Professor of Computer Science at Purdue University in 2015 and 2013. Visiting Faculty in the Department of Computer Science at Purdue University (sabbatical: Fall 2012-Spring 2013), and in the Air Force Research Laboratory's Information Institute (Summer 2008).

Ph.D. and M.S. in Computer Science, University of Pittsburgh. M.S. in Electronics/Computer Engineering, Wrocław University of Technology (Politechnika Wrocławska), Wrocław, Poland.

Research at Western Michigan University (WMU)—as a faculty; Purdue University—as a post doctoral researcher, a sabbatical visitor and an adjunct faculty; and University of Illinois at Chicago (UIC)—as a faculty. Teaching at WMU and UIC.  Tutorial instructor for IEEE Computer Society. Diversified R&D experience at AT&T/Lucent Bell Labs. Consultant for academic and business projects. Entrepreneurial experience in the United States and Poland.

Current research focused in two Areas: (1) opportunistic capability utilization networks or oppnets (a specialized kind of ad hoc networks); and (2) trust, privacy and security in open computing systems.  In Area 1, focus on primitives for oppnets; privacy and security in oppnets; and interoperability of oppnet helper networks and devices. In Area 2, concentration on privacy-preserving data dissemination (with focus on developing active data bundles a.k.a. active bundles —self-protecting software entities); the role of trust in open computing environments; analysis and development of computer privacy and security paradigms; authentication and privacy in healthcare; privacy and security in pervasive systems, including ad hoc sensor networks and embedded networks.

Former areas of investigation include: (a) vulnerability analysis, threat assessment, and modeling computer fraud; (b) distributed computing systems with concentration on decentralized control; (c) distributed database systems with focus on reliability, fault tolerance, recovery, concurrency control, query optimization, and database design; and (d) semantic database integrity.

Published over 20 peer-reviewed journal papers, about 60 peer-reviewed conference papers, and 10 book chapters (at least 8 peer-reviewed). Nearly 2,000 citations (h-index: 21, i10-index: 45 as of August 2024) listed by Google Scholar.

Keynote and invited speaker for national and international conferences. Editorial Board member for six journals. Technical Program Committee Co-Chair for the 15th IFIPS Wireless On-demand Network Systems and Services Conference (WONS 2019) and the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012). Organizer and Chair of the International Workshops on Specialized Ad Hoc Networks and Systems (SAHNS 2011, SAHNS 2009 and SAHNS 2007) in conjunction with IEEE International Conference on Distributed Computing Systems (ICDCS 2011, ICDCS 2009 and ICDCS 2007).

Major advisor for 5 completed Ph.D. dissertations at WMU. Member of 6 Ph.D. dissertation committees at WMU, and 3 Ph.D. dissertation committees at Purdue University. Major advisor for 3 M.S. Theses and nearly 70 M.S. Projects at WMU, as well as 4 M.S. Theses and 16 M.S. Projects at University of Illinois at Chicago.

Co-PI for a Navy grant on oppnets, and an NSF grant on vulnerability analysis and threat assessment/avoidance. Consultant for Northrop Grumman Corporation (NGC) grants at Department of Computer Science at Purdue University. Collaborator of the Center for Science of Information (CSoI) at Purdue University, an NSF Science and Technology Center. Affiliated for many years with the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.

Senior Member of the Institute of Electrical and Electronics Engineers (IEEE) and IEEE Computer Society. IEEE Golden Core Member, and recipient of the IEEE Computer Society’s Meritorious Service Award.



[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]




Research Projects

Last update of this section: 12 August 2024

Major Projects

Opportunistic resource utilization networks and systems (a.k.a. Oppnets)

Projects—mostly focusing on trust, privacy and security—include:

    • Helper privacy and oppnet privacy

    • Classic and identity-based authentication in oppnets, including authentication of helper candidates in oppnet environments, and authentication of oppnet nodes in oppnet environments

    • Security in oppnets, including malevolent hosts masquerading as oppnet member, and malevolent helpers masquerading as helpers or oppnet members

    • Software agents' role for security and privacy in oppnets

    • Routing in oppnets

Privacy-preserving data dissemination, including the original idea of Active Data Bundles a.k.a. Active Bundles

Analysis of computer security paradigms and development of new ones

Security services and privacy services

Pervasive trust foundation for privacy and security services




Hosting Visiting Scholars

Dr. Tong Wang, Associate Professor, Network Engineering Department, School of Information Engineering, Hubei University of Economics, Wuhan, China

Research on survivability enhancements of wireless network infrastructure for Oppnets.

Funded by Chinese Scholarship Council, April 2017 – April 2018.

Dr. Shubo Liu, Professor, Wuhan University, Wuhan, China

Research on privacy and security in embedded systems and computer networks, including wireless sensor networks and Internet of Thing.

Funded by Wuhan University, January 2014 – January 2015.

Dr. Daisuke Kasamatsu, Assistant Professor, Soka University, Tokyo, Japan

Research on oppnet use for emergency response applications.

Funded by Japanese Telecommunication Advancement Foundation, March 2012 – July 2013 (visiting me at WMU, then visiting Purdue University with me during my sabbatical).




Ph.D. Advisor / Ph.D. Committee Chair

  1. Ahmed A.A. Al-Gburi, “Towards an Architecture for Secure Privacy-Preserving Opportunistic Resource Utilization Networks.” Ph.D. Proposal defended in November 2017. Ph.D. degree awarded on 27 April 2019.

  2. Raed M. Salih, Using Agent-based Active Bundle Scheme for Protecting Privacy and Confidentiality in Healthcare Information Systems.” Ph.D. Proposal defended on 11 July 2014. Ph.D. degree awarded on 28 April 2018.

  3. Mai A. Alduailij, “Design of Oppnet Virtual Machine for Opportunistic Resource Utilization Networks: A Universal Standard for Application-level Resource Sharing.” Ph.D. Proposal defended on 25 April 2014. Ph.D. degree awarded on 19 December 2015.

  4. Bilal Abu Bakr, “A Decentralized Energy-Efficient Scheme to Maximize Wireless Sensor Network Lifetime.” Ph.D. Proposal defended on 22 April  2010. Ph.D. degree awarded on 25 June 2011.

  5. Lotfi Ben-Othmane, “Protecting Sensitive Data throughout Their Lifecycle.” Ph.D. Proposal defended on 26 January 2009. Ph.D. degree awarded on 18 December 2010.

 

Ph.D. Committee Member (at WMU and Purdue University, selected)

  1. WMU: Mohammed Aledhari, “A Deep Learning-Based Data Minimization Algorithm for Big Genomics Data in Support of IoT and Secure Smart Health Services.” Ph.D. Proposal defended on 29 June 2016. Ph.D. degree awarded on 16 December 2017. Chair: Prof. Fahad Saeed.

  2. Purdue University: Noor Ahmed, “Design, Implementation, and Experiments for Moving Target Defense.” Ph.D. Proposal defended on 29 June 2013. Ph.D. Dissertation defended on 18 April 2016. Chair: Prof. Bharat Bhargava.

  3. Purdue University: Rohit Ranchal, “Cross-Domain Data Dissemination and Policy Enforcement.” Ph.D. Dissertation defended on 5 June 2015. Chair: Prof. Bharat Bhargava.

  4. Purdue University: Ruchith U. Fernando, “Privacy in Social Messaging and Identity Management.” Ph.D. Dissertation defended on 3 July 2014. Chair: Prof. Bharat Bhargava.

  5. WMU: Jing Zhang, “Efficient Reinforcement Learning in Multiple-agent Systems and its Applica-tion in Cognitive Radio Networks,” Ph.D. Thesis defended on 10 February 2012; Ph.D. Committee Chair: Prof. D. Kountanis.

  6. WMU:  Mohamed El Wakil, “Debugging Support for Message-Passing Software via SMT-Based Predictive Analysis,“ Ph.D. Thesis defended on 9 May 2011; Ph.D. Committee Chair: Prof. Z. Yang.

  7. WMU: Chaoli Cai, “Anomaly Detection Techniques for Ad Hoc Networks,” Ph.D. Thesis defended on 13 November 2009; Ph.D. Committee Chair: Prof. A. Gupta.

  8. WMU: Zille Huma Kamal, “On Implementing a Small Scale Opportunistic Network and Utilizing Its Resources with QoS Constraints,” Ph.D. Thesis defended on 9 November 2007; Ph.D. Committee Chair: Prof. A. Gupta.

  9. WMU: Vijay Bhuse, “Lightweight intrusion detection: A second line of defense for unguarded wireless sensor networks,” Ph.D. Thesis defended on 29 January 2007; Ph.D. Committee Chair: Prof. A. Gupta.

 

M.S. Thesis Advisor (at WMU)

  1. Bhuvaneswari Rayapuri, “A Survey of Security and Privacy in Mobile Cloud Computing,” M.S. degree awarded on 15 December 2018.

  2. Ramakrishnan Krishnan, “Security and Privacy in Cloud Computing,” M.S. degree awarded on 29 April 2017.

  3. Wassnaa Al-Mawee, Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users. A Survey,” M.S. degree awarded on 19 December 2015.

 

M.S. Project Advisor at WMU (selected)

  1. R. Alrizq, “Assessing and Evaluating the Wireless Networks on WMU Campus,” CS 5990 Independent Study, Spring 2016.

  2. P. Hassan Paramashivaiah,New Lab Assignments for the CS 5700 Security Lab,” CS 7100 Independent Research, Fall 2015.

  3. R. Krishnan and S. Korukanti, “Verification and Update of CS 5700 Lab Assignments,” CS 7100 Independent Research, Fall 2015.

  4. E. Garikimukkula, R. Malay, and B. Rayapuri, continuation of the Summer I 2015 project, CS 7100 Independent Research, Fall 2015.

  5. S. Tyagi, “Unified communication (UC)” CS 7100 Independent Research, Fall 2015.

  6. D. Doddapaneni and M. Gowdar Sarveswara, continuation of the Summer I 2015 project, CS 7100 Independent Research, Summer II 2015.

  7. A. Al-Gburi, continuation of the Spring 2015 CS 7350 project, CS 7100 Independent Research, Summer I 2015.

  8. A. Al-Hasnawi, continuation of the Spring 2015 CS 7350 project, CS 7100 Independent Research, Summer I 2015.

  9. R. Almalki, “Solitaire Program with Hint Option for Kids/Elderly. (Highlighted Hint, Multiple Language & Redo Functionality)” CS 7100 Independent Research, Summer I 2015.

  10. D. Doddapeneni and M. Gowdar Sarveswara, “Solitaire for the kids and the elderly,” CS 7100 Independent Research, Summer I 2015.

  11. E. Garikimukkula, R. Malay, and B. Rayapuri “Tally Thresholds Experiments for Trust Base Oppnet Routing (TAIRO),” CS 7100 Independent Research, Summer I 2015.

  12. M. Gujjari, “Solitaire Program with Hint Option for kids/elderly. Final Report” (Language menu option and Timeout option), CS 7100 Independent Research, Spring 2015. 

  13. S. Ponnam, “Solitaire Program with Hint Option for kids/elderly. Final Report” (Hint menu option), CS 7100 Independent Research, Spring 2015.

  14. S. Samudrala, “[Klondike Solitaire] Solitaire Program with Hint Option for kids/elderly. Final Report” (Undo menu option), CS 7100 Independent Research, Spring 2015.

  15. A. Al-Gburi, “Security and Privacy in Internet of Things: Vision and Challenges,” CS 7350 Graduate Research, Spring 2015.

  16. A. Al-Hasnawi, “TFSC: Trust Foundation for Security and Cooperation in Opportunistic Resource Utilization Networks,” CS 7350 Graduate Research, Spring 2015.

  17. W. AL-mawee, “Privacy and Security Issues in IoT Applications for Healthcare- A Survey,” CS 7100 Independent Research, Fall 2014.

  18. T. Mamillapalli, “Klondike Solitaire” (implementation), CS 7100 Independent Research, Fall 2014.

  19. J S.K. Vojjala, “Developing Software Modules in Java for Resiliency Simulator,” CS 7100 Independent Research, Summer II 2014.

  20. J. Mitnala, “GUI Development for [Oppnet] Resiliency Simulator,” CS 7100 Independent Research, Summer I 2014.

  21. D. Chaturvedi, “Updating Lab Assignments for the Computer Security and Information Assurance Lab,” CS 7100 Independent Research, Spring 2014.

  22. S. Vepuri, “Coding Java Programs for a Study of Resiliency Based on Opportunistic Systems,” CS 7100 Independent Research, Spring 2014.

  23. S. Ethakota Krishnamurthi, “Developing a simulator for a study of resiliency based on opportunistic systems,” CS 7100 Independent Research, Fall 2013.

  24. A. Sarhan, “Updating the paper: Protecting Confidentiality of Mobile Agents Providing Output to Visited Hosts,” CS 7100 Independent Research, Fall 2013.

  25. A. Bantu, “Investigating the Service Location and Planning (SLP) problem,” CS 7100 Independent Research, Summer II 2013.

  26. S. Deval, “Application of [the Network Simulator] NeSSi2,” CS 7100 Independent Research, Summer I 2013.

  27. M. Garika, “Overview of [the Network Simulator] NeSSi2,” CS 7100 Independent Research, Summer I 2013.

  28. R. Sreeramaneni, “Graphical Use Interface in [the Network Simulator] NeSSi2,” CS 7100 Independent Research, Summer I 2013.

  29. S.C. Kovi, “Security and Privacy Challenges in Oppnets,” CS 7100 Independent Research, Spring 2013.

  30. R.R. Pasham, “Security and Privacy Challenges and the General Security Scheme for

  31. 55.    Emergency Rescue and Recovery Operations,” CS 7100 Independent Research, Spring 2013.

  32. C.S. Guduru, “Verifying pseudo code for seed nodes, helpers and lites in Oppnets for a provided application scenario. Developing pseudo code for OVM [Oppnet] primitives for seed nodes, helper and lites,” CS 5990 Independent Study, Summer II 2012.

  33. Srikanth R. Bala, “Using Oppnets for Emergency Response Operations. Simulation Study,” CS 7100 Independent Research, Summer I 2012.

  34. Shilpa Shree Jagannatha Rao, on simulation scenarios for using opportunistic resource recovery systems (oppnets) for emergency rescue and recovery operations, CS 7100 Independent Research, Fall 2011.

  35. Raviteja Veeramallu, on simulation scenarios for using opportunistic resource recovery systems (oppnets) for emergency rescue and recovery operations, CS 5990 Independent Study, Fall 2011.

  36. Chia-Lin Liu, ”Investigation of Identity-Based Security/Trust for Open Computing Environments,”CS 7100 Independent Research, Summer I 2011.

  37. Yang Sun, ”A Survey of Probability of Cracking Existing Security Algorithms in Wireless Networks,” CS 5990 Independent Study, Spring 2011.

  38. Raed M. Salih, on privacy in healthcare monitoring in pervasive computing environments, CS 7350 Graduate Research, Fall 2010. 

  39. Sandesh A. Kangondi, “Using Oppnets for Emergency Response Operations," (a simulation study),  5990 Independent Study, Fall 2010. 

  40. Padmini Nagaraj, “Using Oppnets for Emergency Response Operations – Simulation Study for Advanced Scenario," CS 5990 Independent Study, Summer II 2009.

  41. Nirupa Rajagopal, “Using Oppnets for Emergency Response Operations – Simulation Study for Advanced Scenario,” CS7100 Independent Research, Summer I 2009.

  42. V.C. Makali Kempegowda, “Authentication of Helper Candidates in Opportunistic Networks,” CS 5990 Independent Study, Fall 2008. 

  43. Vishwas B. Shivarudra Setty, “MicroOppnet 3.0,” CS 7100 Independent Research, Summer II 2008.

  44. Vikash Achutaramaiah, on MicroOppnet v.2.4, CS 5990 Independent Study, Summer II 2008. 

  45. Kruthika M. Kumar, “Resource and Service Discovery of Neighbors in Oppnets,” CS 5990 Independent Study, Summer II 2008.

  46. Joseph W. Baird, on routing in MANETs/oppnets, CS 7350 Graduate Research, Summer I 2008.

  47. Joseph W. Baird, on routing in MANETs/oppnets, CS 7350 Graduate Research, Spring 2008.

  48. Adawia Al-Alawneh, on privacy in oppnets, CS 7100 Independent Research, Spring 2008.

  49. Nirupa Rajagopal, “Malevolent Helper Masquerading in an Oppnet,” CS 5990 Independent Study, Spring 2008.

  50. Joseph W. Baird, on routing in MANETs/oppnets, CS 7350 Graduate Research, Fall 2007.

  51. Vikash Achutaramaiah, “MicroOppnet v.2.3,” CS 7100 Independent Research, Fall 2007. 

  52. Rajesh N. Balekai, “Simulation of Oppnets,” CS 5990 Independent Study, Fall 2007.

  53. VarunKrishna Kundoor, on MicroOppnet v.2.3, CS 7100 Independent Research, Summer II 2007.

  54. Joseph W. Baird, on routing in MANETs/oppnets,” CS 7350 Graduate Research, Summer I 2007.

  55. Harbir Singh, “Survey of Wireless Mesh Networks,” CS 7100 Independent Research, Spring 2007.

  56. Rajasekhar R. Dondati Venkata Durga, “Feasibility Study of Honeypot Architecture for Oppnets,” CS 5990 Independent Study, Spring 2007.

  57. Sahil Behl, “Survey of Wireless Mesh Networks” (an internship at Toyota Financial Services), CS 7100 Independent Research, Fall 2006.

  58. Venkata Naga V. Naraharisetti, “Survey of Wireless Mesh Networks,” CS 5990 Independent Study, Fall 2006.

  59. Rajesh N. Balekai, an internship at Great Lakes Soil and Environment Consultants (GLSEC), CS 7120 Professional Field Experience, Summer II 2006.

  60. Sahil V. Behl, an internship at Toyota Financial Services, CS 7120 Professional Field Experience, Summer II 2006.

  61. Nitin Bhargava, “Bulk Email Management,” CS 6970 Master’s Project, Summer II 2006.

  62. Arun K. Rudra, “Helper Privacy and Oppnet Privacy in Opportunistic Networks,”CS 5990 Independent Study, Summer II 2006.

  63. Nitin Bhargava, “Online Order Shipment Application” and “Web-based (Hotel) Guest Feedback Application,” CS 6970 Master’s Project, Summer I 2006.

  64. Sahil Behl, “Semantic Web Technologies” and “Policies for Securing Web-Services,” CS 5990 Independent Study, Summer I 2006.

  65. Zill-E-Huma Kamal, “Wireless Network Security: A Survey,” CS 7350 Graduate Research, Spring 2006.

  66. Sahil Behl, “Semantic Web Technologies” and “Policies for Securing Web-Services,” CS 6970 Master’s Project, Spring 2006.

  67. Venkat R. Kalvala, “Wireless Network Security: A Survey,” CS 5990 Independent Study, Spring 2006.

 

Supervised Undergraduate Projects in Computer Security (selected)

Including the following non-credit research in the Research Experience for Undergraduates (REU) program via a subcontract for an NSF grant Vulnerability Analysis and Threat Assessment/Avoidance, May 2009.

  1. Lyth Alobiedat (Computer Science), “Opportunistic Networks – New Ad Hoc [Networking] Paradigm” 

  2. Edward J. Brabandt (Industrial and Manufacturing Engineering), “Study of Pervasive Trust in Distributed Systems”

  3. Torri S. Garland (Mechanical Engineering; a minority female student), “Learning and Understanding Opportunistic Networks”

  4. Scott Keller (Electrical Engineering), “Privacy and Trust in Online Interactions”

 

Major Students’ Awards

  1. Winner in a poster competition: Abduljaleel Al Hasnawi for the poster “Protecting Sensitive Data in VANETs Using Active Data Bundles,” by A. Al Hasnawi (adviser: L. Lilien), 10th Annual Research and Creative Activities Poster and Performance Day, Western Michigan University, 14 April 2016.

  2. Winner in a poster competition: Akram Sarhan for the poster “Protection of Sensitive Data in Clouds Using Active Privacy Bundles and Agent-based Multi-Party Computation” by A. Sarhan (adviser: L. Lilien),  Ninth Annual Research and Creative Activities Poster and Performance Day, Western Michigan University, 24 April 2015.

  3. Department Graduate Research and Creative Scholar Award for R.M. Salih, The Graduate College, WMU, April 2012 (a university-wide award based on a nomination by the Department of Computer Science).

  4. All-University Graduate Research and Creative Scholar Award for L. Ben Othmane, The Graduate College, WMU, 2011  (the highest university-wide award at WMU).

  5. Selected for the Trusted Infrastructure Workshop 2010 (TIW 2010) for L. Ben Othmane, Carnegie Mellon University, Pittsburgh, 2010 (full travel/accommodations grant included).

  6. Dissertation Completion Fellowship for L. Ben Othmane, The Graduate College, WMU, 2009 (only 7 fellowships awarded for the entire university).

  7. Best Student Symposium Paper Award for L. Ben OthmaneGraduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, 2008

  8. Scholarly Endeavor Award for Z.H. Kamal ‘s poster at Research and Creative Activities Day, Western Michigan University, 2006.

  9. Honorable Mention in a student poster competition for V.  Bhuse at The Seventh Annual CERIAS Information Security Symposium - “Negotiating Trust: Security, Privacy, Risk,” Center for Education and Research in Information Assurance and Security, Purdue University, 2006.



Consulting

Purdue University, Department of Computer Science, 2013 – 2018

End-to-End Security in Service-oriented Architecture (SOA),” a project for Northrop Grumman Corporation (NGC)

PI: Prof. Bharat Bhargava

Consulting topics included design/architecture for the development of software modules for the project, developing scenarios for demos, policy languages, and the trust module

Provided expertise (incl. evaluation and feedback) on using my invention, Active Data Bundles (a.k.a. Active Bundles), for the end-to-end security auditing and enforcement in trusted and untrusted SOA

Contributed to writing reports and papers (incl. feedback to Ph.D. students on their related research). Participated in discussions with NGC and Purdue researchers, managers, and students

Purdue University, Department of Computer Science. Academic Years 2010-2011 and 2009-2010

Consulting on privacy and the active bundles scheme

Purdue University, Department of Computer Science. Academic Years 2008-2009 and 2007-2008

Consulting a research project, esp. consulting on privacy, trust, security and vulnerabilities in advanced computing systems

[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]



Selected Publications

Last update of this section: 12 August 2024

Book Chapters (since 2003) - names of students and former students underlined

  1. J. Son, V. Bhuse, L. Ben Othmane, and L. Lilien, “Lab Experience in Computer Security,” Chapter 12 in: S. Kesharwani, D.K. Dhusia (ed.), Sustainable Business and IT, Routledge, Taylor & Francis Group, London and New York, 2023, pp. 129-150.

  2. M. Alduailij and L. Lilien, “Opportunistic Resource Utilization Networks and Related Technologies,” Chapter 2 in: N. I. Udzir et al., Opportunistic Networks: Mobility Models, Protocols, Security & Privacy, CRC Press, Taylor & Francis, Boca Raton, FL, 2019, pp. 11-24.

  3. A. Al-Gburi, A. Al-Hasnawi, R. Salih, and L. Lilien, “Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization Networks,” Chapter 11 in: N. I. Udzir et al., Opportunistic Networks: Mobility Models, Protocols, Security & Privacy, CRC Press, Taylor & Francis, Boca Raton, FL, 2019, pp. 213-227.

  4. A. Al-Gburi, A. Al-Hasnawi, and L. Lilien, “Differentiating Security from Privacy in Internet of Things — A Survey of Selected Threats andzzzz Controls,” Chapter 9 in: K. Daimi et al., Computer and Network Security Essentials, Springer International Publishing, Cham, Switzerland, 2018, pp. 153-172.

  5. L. Lilien, Z.H. Kamal, A. Gupta, I. Woungang, and E. Bonilla Tamez, “Quality of Service in an Opportunistic Capability Utilization Network,” Chapter 7 in: M. Denko et al. (Eds.), Mobile Opportunistic Networks: Architectures, Protocols and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, 2011, pp. 173-204 (peer reviewed).

  6. L. Lilien and B. Bhargava, "Privacy and Trust in Online Interactions," Chapter V in: K. Chen and A. Fadlalla (Eds.), Online Consumer Protection: Theories of Human Relativism, Idea Group, Hershey, Pennsylvania, 2008, pp. 85-122 (peer reviewed).

  7. Z.H. Kamal, L. Lilien, A. Gupta, Z. Yang, M. Batsa,  “A New UMA Paradigm: Class 2 Opportunistic Networks,”  Chapter 17 in: Y. Zhang, L.T. Yang, and J. Ma (Eds.), Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, 2008, pp. 349-392  (peer reviewed).

  8. L. Lilien, Z.H. Kamal, V. Bhuse, and A. Gupta, “The Concept of Opportunistic Networks and Their Research Challenges in Privacy and Security,” Chapter 5 in: S.K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki (Eds.), Mobile and Wireless Network Security and Privacy, Springer Science+Business Media, Norwell, Massachusetts, 2007, pp. 85-117 (based on a peer-reviewed conference paper).

 


Journal Papers (since 2003) - names of students and former students underlined

  1. T. Wang and L. Lilien, “Opportunistic topology control for ad hoc wireless network survivability enhancement based on LIMOS model,” Journal of Network and Computer Applications, vol. 134, May 2019, pp. 1-12. https://www.sciencedirect.com/science/article/pii/S1084804519300542

  2. J. Son, V. Bhuse, L. Ben Othmane, L. Lilien, “Incorporating Lab Experience into Computer Security Courses: Three Case Studies,” Global Journal of Enterprise Information System, vol. 7(2), April-June 2015, pp. 69-80, DOI10.15595/gjeis/2015/v7i2/78240

  3. L.T. Lilien, L. ben Othmane, P. Angin, A. DeCarlo, R.M. Salih, and B. Bhargava, “A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks,”
    Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 3-15, Elsevier. Available at: http://dx.doi.org/10.1016/j.jnca.2013.05.003

  4. B. Panja, B. Bhargava, S. Pati, D. Paul, L.T. Lilien and P. Meharia, “Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance,”  Recent Patents on Computer Science, Vol. 6 (1), April 2013, pp. 73-81. Available at: http://eurekaselect.com/108832/article

  5. L. Lilien, A. Gupta, Z. Kamal, and Z. Yang, “Opportunistic Resource Utilization Networks—A New Paradigm for Specialized Ad Hoc Networks,” Computers and Electrical Engineering, Special Issue: “Wireless ad hoc, Sensor and Mesh Networks,” Vol.36(2), Elsevier, March 2010, pp. 328–340. Available online at: http://dx.doi.org/10.1016/j.compeleceng.2009.03.010

  6. S. Behl and L. Lilien, “Privacy-preserving Transactions on the Web” The Hilltop Review: A Journal of Western Michigan University Graduate Research, Vol. 3(1), Western Michigan University, Kalamazoo,   Michigan,  Fall 2009,  pp. 14-38 (reviewed by WMU faculty and graduate students). Available online at:    http://www.wmich.edu/gsac/Hilltop%20Review/Fall%202009/Hilltop%20Review%20Fall%202009%20Complete%20Journal.pdf

  7. B. Bhargava, Y. Zhang, N. Idika, L. Lilien, and M. Azarmi, “Collaborative Attacks in WiMAX Networks,” Security and Communication Networks, special issue on “WiMAX Security and Applications,” Vol.2(5), Wiley, September/October 2009, pp373-391; available online at: http://dx.doi.org/10.1002/sec.127

  8. L. Lilien, A. Bhargava, and B. Bhargava, “From Fraud Vulnerabilities and Threats to Fraud Avoidance and Tolerance,” IPSI Transactions on Internet Research, Vol.5(1), January 2009, pp. 16-24.

  9. Z.H. Kamal, A. Gupta, A. Khokhar, and L. Lilien, “Power Consumption Analysis of Maximum A Posterior Classifier (MAP) for Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 19(11), November 2008, pp. 1473-1483.

  10. L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and Cybernetics Cybernetics, Part A: Systems and Humans, Vol. 36(3), May 2006, pp. 503-506.

  11. B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, "Pervasive Trust," IEEE Intelligent Systems, vol. 19(5), September/October 2004, pp. 74-77.

 


Papers in Peer-reviewed Conferences (since 2003) - names of students and former students underlined

  1. W. Fadheel, R. Salih and L. Lilien, “PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles ,” 17th IEEE Intl. Conf. On Trust, Security and Privacy in Computing and Communications/ (TrustCom-18), New York, August 2018 , pp. 1187-1195, https://ieeexplore.ieee.org/abstract/document/8456033

  2. A. Al-Hasnawi and L. Lilien, “Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module,” 3rd Intl. Symp. on Real-time Data Processing for Cloud Computing (RTDPCC 2017 – II), in conjunction with the 10thIEEE/ACM Intl. Conf. on Utility and Cloud Computing (UCC 2017), Austin, TX, December 5-8, 2017.

  3. A. Al Hasnawi, A. Al-Gburi, and L. Lilien, “Protecting Sensitive Data in IoT Using Active Data Bundles,” Trans. of the 12th Western Michigan University IT ForumBig Data and Internet of Things: Opportunities, Challenges and Trends,” Western Michigan University, Kalamazoo, Michigan, 04 November 2016, pp. 17-28.

  4. C. QuD.A. Ulybyshev, B.K. Bhargava, R. Ranchal, and L.T. Lilien, “Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems,6th Intl. Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2015), in conjunction with 34th IEEE Intl. Symp. on Reliable Distributed Systems  (SRDS 2015), Montreal, Quebec, Canada, 28 September – 01 October 2015, pp. 47-51, DOI: 10.1109/SRDSW.2015.22

  5. L.T. Lilien,  L. ben OthmaneP. Angin,  B. Bhargava,  R.M. Salih, and A. DeCarlo, Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks,” 6th Intl. Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2015), in conjunct-tion with 34th IEEE Intl. Symp. on Reliable Distributed Systems  (SRDS 2015), Montreal, Quebec, Canada, 28 September – 01 October 2015, pp. 57-61, DOI: 10.1109/SRDSW.2015.11

  6. M.A. Alduailij and L.T. Lilien, “A Collaborative Healthcare Application Based on Opportunistic Resource Utilization Networks with OVM Primitives,” Third Intl. W. on Collaborative Technologies and Systems in Healthcare and Biomedical Fields (CoHeB 2015), Atlanta, Georgia, 04 June 2015, pp. 426-433, DOI: 10.1109/CTS.2015.7210461.

  7. R.M. Salih and L.T. Lilien, “Protecting Users' Privacy in Healthcare Cloud Computing with AB-TTP,” Seventh Annual PhD Forum on Pervasive Computing and Communications (PerCom 2015), 23-27 March 2015, pp. 236-238, DOI: 10.1109/PERCOMW.2015.7134034

  8. A.Y. Sarhan and L.T. Lilien, “An Approach to Identity Management in Clouds without Trusted Third Parties,” Trans of the 11th Western Michigan IT Forum, vol. 1(1), Kalamazoo, Michigan, 07 November 2014, pp. 18-27.

  9. B. Abu Bakr and L.T. Lilien, “Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” 9th Intl. Conf. on Future Networks and Communications (FNC 2014), Niagara Falls, Ontario, Canada, 19 August 2014, pp. 180-187, DOI: 10.1016/j.procs.2014.07.084

  10. B. Abu Bakr and L. T. Lilien, “Extending Lifetime of Wireless Sensor Networks by Management of Spare Nodes,” 2nd Intl. Workshop on Communications and Sensor Networks (ComSense 2014), Niagara Falls, Ontario, Canada, 18 August 2014, pp. 493-498, DOI: 10.1016/j.procs.2014.07.053

  11. L.T. Lilien, M.W. Elbes, L. ben Othmane, and R.M. Salih, “Simulation of Emergency Response Operations for a Static Chemical Spill within a Building using an Opportunistic Resource Utilization Network,” IEEE Intl. Conf. on Technologies for Homeland Security (HST’13), Waltham, MA, 12-14 November 2013, pp. 408-413, DOI: 10.1109/THS.2013.6699039

  12. L. ben Othmane, V. Bhuse, and L.T. Lilien, “Incorporating Lab Experience Into Computer Security Courses,” Intl. Conf. on Education & E-Learning Innovations (ICEELI 2013), Sousse, Tunisia, 24 June 2013, 4 pages, DOI: 10.1109/WCCIT.2013.6618731

  13. J.W. Baird (advisor: L. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks,” Ph.D. Forum, 31st IEEE Intl. Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 8-11 October 2012, 2 pages, CD ROM.

  14. R.M. Salih, L.T. Lilien and L. Ben Othmane, “Protecting Patients’ Electronic Health Records Using Enhanced Active Bundles,” 6th International ICST Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2012), San Diego, CA, 21–24 May 2012, 4 pages, CD ROM, DOI: 10.4108/icst.pervasivehealth.2012.248719

  15. R. Salih and L. Lilien, “The Active Bundle Scheme for Protecting Electronic Medical Records,” Transactions of the International Conference on Health Information Technology Advancement, Vol. 1(1), Western Michigan University, Kalamazoo, MI, October 2011, pp. 109-115.

  16. B. Abu Bakr and L. Lilien, “Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection,” Proc. The First Intl. Workshop on Advanced Communication Technologies and Applications to Intelligent Transportation Systems, Cognitive Radios and Sensor Networks (ACTICS 2011), in conjunction with IMIS 2011, Seoul, Korea, June-July 2011, pp. 277-282, DOI: 10.1109/IMIS.2011.142

  17. B. Abu Bakr and L. Lilien, “A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” Proc. The Fourth Intl. Workshop on Sensor Networks (SN 2011), in conjunction with ICDCS 2011, Minneapolis, MN, June 2011, pp. 182-191, http://doi.ieeecomputersociety.org/10.1109/ICDCSW.2011.55

  18. R.M. Salih, L. Ben Othmane, and L. Lilien, “Privacy Protection in Pervasive Healthcare Monitoring Systems with Active Bundles,” Proc. Ninth IEEE Intl. Symp.on Parallel and Distributed Processing with
    Applications Workshops (ISPAW 2011)
    , Busan, Korea, May 2011, pp. 311-315, DOI:  10.1109/ISPAW.2011.60

  19. B. Abu Bakr and L. Lilien, “LEACH-SM: A Protocol for Extending Wireless Sensor Network Lifetime by Management of Spare Nodes,” Proc. 3S Workshop (Wireless of the Student, by the Student, for the Student) in conjunction with WiOpt 2011, Princeton, NJ, May 2011, p. 375, http://dx.doi.org/10.1109/WIOPT.2011.5930046, (extended abstract; peer-reviewed).

  20. R. Ranchal, B. Bhargava, L. Ben Othmane, L. Lilien, A. Kim, M. Kang, and M. Linderman, “Protection of Identity Information in Cloud Computing without Trusted Third Party,” Proc. Third International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2010) at 29th IEEE Symposium on Reliable Distributed Systems, New Delhi, India, October 31, 2010, pp. 368-372.

  21. P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. Ben Othmane, L. Lilien, “An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing,” 29th IEEE Symposium on Reliable Distributed Systems (SRDS), New Delhi, India, Oct.-Nov. 2010, pp. 177-183 (short paper; acceptance rate incl. short papers: 34%).

  22. L. Lilien, A. Al-Alawneh and L. Ben Othmane, “The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper),” Proc.  The New Security Paradigms Workshop (NSPW 2010), Concord, Massachusetts, September 21-23, 2010, pp. 129-142.

  23. L. Ben Othmane and L. Lilien, “Protecting Privacy of Sensitive Data Dissemination Using Active Bundles,” Proc. Seventh Annual Conference on Privacy, Security and Trust (PST 2009) at The World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, New Brunswick, Canada, August 2009, pp. 202-213 (acceptance rate: 56%).

  24. E. Bonilla Tamez, I. Woungang, L. Lilien, and M.K. Denko, “Trust Management in Opportunistic Networks: A Semantic Web Approach,” Proc. PST 2009 Graduate Student Symposium, Seventh Annual Conference on Privacy, Security and Trust (PST 2009) at The World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, New Brunswick, Canada, August 2009, pp. 235-238 (short paper).

  25. [Best Student Symposium Paper Award] L. Ben Othmane and L. Lilien, “Preservation of Sensitive Data throughout Its Life Cycle,” Proc. PST 2008 Graduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, October 2008, pp. 12-13 (short paper).

  26. T. Mehjabeen, I. Woungang, L. Lilien, M. Denko, F. Rashid, and G. Ma, “Intrusion Detection in Opportunistic Capability Utilization Networks,” Proc. PST 2008 Graduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, October 2008, pp. 14-15 (short paper).

  27. Z.H. Kamal, A. Gupta, L. Lilien, and Z. Yang, “The MicroOppnet Tool for Collaboration Experiments with Class 2 Opportunistic Networks,” Proc. The 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007),  White Plains, New York, November 2007, CD-ROM, 10 pages.

  28. L. Lilien, “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” Proc. The First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007, CD-ROM, 8 pages (invited).

  29. L. Lilien, A. Gupta, and Z. Yang “Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework,” Proc. The First International Workshop on Next Generation Networks for First Responders and Critical Infrastructure (NetCri07), New Orleans, Louisiana, April 2007,  pp. 588-593 (acceptance rate: 27%).

  30. Z.H. Kamal, A. Gupta, L. Lilien and A. Khokhar, “An Efficient MAP Classifier for Sensornets,” Proc. 13th Annual IEEE International Conference on High Performance Computing (HiPC 2006), Bangalore, India, December 2006, pp. 560 – 571.

  31. V. Bhuse, A. Gupta and L. Lilien, “Research challenges in lightweight intrusion detection for wireless sensor networks,” Proc. 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 2006, CD ROM, 6 pages.

  32. L. Lilien, Z.H. Kamal and A. Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 2006, pp. 722 –726.

  33. Z.H. Kamal, A. Gupta, L. Lilien and A. Khokhar, “Classification using Efficient LU Decomposition in Sensornets,” Proc. the IASTED International Conference on Wireless Sensor Networks (WSN 2006), Banff, Alberta, Canada, July 2006, CD ROM, Paper No. 538-026, 6 pages.

  34. L. Lilien, Z.H. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 2006, pp. 134-147 (acceptance rate: 47%).

  35. V. Bhuse, A. Gupta, and L. Lilien, “DPDSN: Detection of packet-dropping attacks for wireless sensor networks,” Proc. 4th International Trusted Internet Workshop (TIW), Goa, India, December 2005, CD ROM, 5 pages.

  36. B. Bhargava and L. Lilien, "Vulnerabilities and Threats in Distributed Systems," in: Distributed Computing and Internet Technology : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 2004, Springer-Verlag, Lecture Notes in Computer Science, Vol. 3347, 2004, pp. 146-157 (invited).

  37. B. Bhargava and L. Lilien, "Private and Trusted Collaborations," Proc. Secure Knowledge Management (SKM 2004): A Workshop (an NSF/NSA/AFRL workshop), Amherst, NY, September 2004, pp. 27-32 (invited).

  38. M. Jenamani, L. Lilien, and B. Bhargava, "Anonymizing Web Services Through a Club Mechanism with Economic Incentives," Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795.

  39. L. Lilien, "Developing Pervasive Trust Paradigm for Authentication and Authorization," Proc. Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited).

  40. L. Lilien and A. Bhargava, "From Vulnerabilities to Trust: A Road to Trusted Computing," Proc. International Conference on Advances in Internet, Processing, Systems, and Interdisciplinary Research (IPSI-2003), Sv. Stefan, Serbia and Montenegro, October 2003, CD ROM, 4 pages.

  41. I. Chung, B. Bhargava, M. Mahoui, and L. Lilien, "Autonomous Transaction Processing Using Data Dependency in Mobile Environments,"  Proc. The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '2003), San Juan, Puerto Rico, May 2003, pp. 138-144.



[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]



Selected Presentations

Last update of this section: 12 August 2024


Keynote/Invited Talks (since 2003)

  1. Keynote talk: “Towards Measuring Security and Privacy via Their Services and Mechanisms - A Position Statement,” 11th Central Area Networking and Security Workshop (CANSec 2017), Missouri University of Science and Technology, Rolla, MO, October 2017.

  2. Declined to be Invited Speaker (timing conflict): Intl. Conf. on Applied Computer Science, Istanbul, Turkey, April 2016.

  3. Missed deadline for Keynote Speaker invitation: Confluence-2016: Global Technology, Innovation & Entrepreneurship Summit—6th  Intl. Conf. on “Cloud System and Big Data Engineering,” Noida, Uttar Pradesh, India, January 2016; in association with University of Massachusetts , Lowell, MA, Memorial University of Newfoundland, Canada, and University of Cape Town, South Africa.

  4. Declined to be Invited Speaker (timing conflict): 2nd Annual World Congress of Outsourcing Service-2014, Dalian, China, June 26-29, 2014.

  5. Keynote talk: “Oppnets - Opportunistic Resource Utilization Networks,” Intl. Conf. on High-Performance Architecture and Grid Computing (HPAGC-2011)Rajpura, Punjab, India, July 2011 (teleconferencing), cf.: http://hpagc2011.chitkara.edu.in/experttalks.html.

  6. Declined to be Invited Speaker (timing conflict): The Third International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2010), held in conjunction with the IEEE 29th IEEE Intl. Symp. on Reliable Distributed Systems, New Delhi, India, 31 October  2010.

  7. Invited talk: “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” The First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007.

  8. Invited talk: “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003.

 

Conference Talks and University Seminars (since 2003)

  1. A Simulation Study of Ad Hoc Networking of UAVs  with Opportunistic Resource Utilization Networks,” Department of Computer Science Seminar, Purdue University, West Lafayette, IN, 27 January 2017.

  2. Simulation of Emergency Response Operations for a Static Chemical Spill within a Building using an Opportunistic Resource Utilization Network," IEEE Intl. Conf. on Technologies for Homeland Security (HST’13), Waltham, MA, 14 November 2013.

  3. Active Bundles for Protecting Privacy During Sensitive Data Dissemination,” Computer Science Faculty Talk, Purdue University, West Lafayette, IN, 17 January 2013.

  4. TPC Co-Chair’s welcome and Symposium statistics presentation, 31st IEEE Intl. Symp. on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 9 October  2012.

  5. A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” The Fourth Intl. Workshop on Sensor Networks (SN 2011), in conjunction with ICDCS 2011, Minneapolis, MN, 22 June 2011.

  6. The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper),” The New Security Paradigms Workshop (NSPW 2010), Concord, Massachusetts, September 23, 2010.

  7. Active Bundles for Protecting Privacy during Sensitive Data Dissemination,” Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan, June 16, 2010.

  8. A Mechanism for Lifecycle Data Privacy Protection in Cloud Computing,” Midwest University-Industry Summit, West Lafayette, Indiana, March 2010.

  9. Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A Position Presentation,” CERIAS Security Seminar, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, November 11, 2009.

  10. Benefits and pitfalls of specialized ad hoc networks and systems,” at the panel under the same title at the Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009), Montreal, Canada, Friday, June 26, 2009.

  11. Computer Networks as Tools for Enlarging Social Networks in Our Civilization,” 40th International Conference of the International Society for the Comparative Study of Civilizations (ISCSC 2009), Kalamazoo, Michigan, June 5, 2009.

  12. Class 2 Opportunistic Networks – a New Paradigm for Specialized Ad Hoc Networks,” Department of Computer Sciences, Purdue University, West Lafayette, Indiana, February 7, 2008.

  13. The MicroOppnet Tool for Collaboration Experiments with Class 2 Opportunistic Networks,” The 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007),  White Plains, New York, November 13, 2007.

  14. Do we need specialized ad hoc networks and systems?” at the panel under the same title at the First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007), Toronto, Canada, Friday, June 29, 2007.

  15. Opportunistic Networks —  A New Paradigm and Technology for Service Oriented Architecture,” at the panel: “Web 2.0 and Service Oriented Architecture,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

  16. "Is Security without Trust Feasible?" panel presentation, 3rd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus'06), Kraków, Poland, September 4-8, 2006.

  17. "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006.

  18. "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications,"  Distributed Systems Research Group, Department of Computer Science, AGH University of Science and Technology, Kraków, Poland, May 22, 2006.

  19. "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications,"  Section of Information Technology, Institute of Telecomputing, Faculty of Electrical and Computer Engineering, Cracow University of Technology, Kraków, Poland, May 23, 2006.

  20. Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks,” Workshop on Distributed Systems and Networks (in conjunction with WWIC’06), Bern, Switzerland, May 9, 2006.

  21. "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 15-16, 2006.

  22. (In cooperation with N. Bhargava), “Attack Prevention, Detection, and Recovery in Optical Networks,” Michigan Academy of Science, Arts, & Letters—Annual Meeting, Oakland University, Rochester, Michigan, March 3, 2006.

  23. (With Z. Huma Kamal and A. Gupta, and  in cooperation with V. Bhuse and Z Yang), "Opportunistic Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9, 2006.

  24. P2D2: A Mechanism for Privacy-Preserving Data Dissemination,”Academic Computer Center CYFRONET AGH and Department of Computer Science, AGH University of Science and Technology, Kraków, Poland, December 21, 2005.

  25. P2D2: A Mechanism for Privacy-Preserving Data Dissemination,”Institute of Computing Science, Faculty of Mechanical Engineering, Cracow University of Technology, Kraków (Cracow), Poland, June 9, 2005.

  26. P2D2: A Mechanism for Privacy-Preserving Data Dissemination,”Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 8, 2005.

  27. Asymmetric Trust Relationships: Trading Privacy for Trust,” Panel: “Locating Credentials: Trusted Communities and Controlled Access,” The 6th Annual Information Security Symposium “Security in Motion,” Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 24, 2005.

  28. Trusted and Private Interactions,” Networking and Distributed Systems Seminar, Department of Computer Sciences, Purdue University, January 25, 2005.

  29. Trust, Privacy and Security. Breakout Session summary,” Plenary Session, NSF Information and Data Management (IDM) Workshop, Boston, Massachusetts, October 2004.

  30. Private and Trusted Interactions,” the 5th Annual Information Security Symposium "Energizing the Enterprise: Cyber Security in Context," Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, March 23, 2004.

  31. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, January 2004.

  32. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Distributed Information Systems Laboratory, School for Computer and Communication Science, EPFL (Federal Institute of Technology Lausanne), Lausanne, Switzerland, November 2003.

  33. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Network Security and Cryptography Research Group, IBM Zurich Research Laboratory, Zurich, Switzerland, November 2003.

  34. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Institute of Computing Science, Faculty of Mechanical Engineering, Cracow University of Technology, Kraków (Cracow), Poland, October 2003.

  35. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Distributed Systems Group, Information Systems Institute, Technical University of Vienna, Vienna, Austria, October 2003.

  36. Developing Pervasive Trust Paradigm for Authentication and Authorization,” Computer Networks and Distributed Systems Research Group, Institute of Computer Science and Applied Mathematics, University of Bern, Bern, Switzerland, October 2003.

  37. Developing Pervasive Trust Paradigm for Authentication and Authorization,” MIDLAB Middleware Laboratory, Department of Computer and Systems Science, University of Rome "La Sapienza," Rome, Italy, October 2003.

  38. A Grand Challenge: Using Trust to Improve Data Quality,” Panel: "Grand Challenges in Data Integrity and Quality", Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland, November 2003.

  39. (With C. Farkas) “Trust, Privacy and Security. Breakout Session summary,” Plenary Session, NSF Information and Data Management (IDM) Workshop, Seattle, Washington, September 2003.

  40. Quasi-partitioning in Distributed Database Systems,” Center for Information Systems, Cracow University of Technology, Kraków (Cracow), Poland, January 2003.

 

Posters (since 2003) - names of students and former students underlined

  1. [Award-winning]  A. Al Hasnawi (adviser: Dr. L. Lilien), “Protecting Sensitive Data in VANETs Using Active Data Bundles,” 10th Annual Research and Creative Activities Poster and Performance Day, Western Michigan University, Kalamazoo, Michigan, 14 April 2016.

  2. [Award-winning]  A. Sarhan (adviser: Dr. L. Lilien), “Protection of Sensitive Data in Clouds Using Active Privacy Bundles and Agent-based Multi-Party Computation,” Ninth Annual Research and Creative Activities Poster and Performance Day, Western Michigan University, Kalamazoo, Michigan, 24 April 2015.

  3. R. Salih (adviser: Dr. L. Lilien), “Protecting Users’ Privacy in Electronic Prescribing Systems with Active Privacy Bundles,” Ninth Annual Research and Creative Activities Poster and Performance Day, Western Michigan University, Kalamazoo, Michigan, 24 April 2015.

  4. J. Baird  (adviser: L.T. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks,” Ph.D. Forum, 31st IEEE Intl. Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 10 October 2012.

  5. R.M. Salih (adviser: L.T. Lilien), “Protecting Privacy of Patients’ Electronic Health Records with the ABTTP Scheme,” 6th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 20 April 2012.

  6. J. Baird  (adviser: L.T. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Oppnets,” 6th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 20 April 2012.

  7. B. Abu Bakr and L. Lilien, “LEACH-SM: A Protocol for Extending Wireless Sensor Network Lifetime by Management of Spare Nodes,” 5th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 15 April 2011.

  8. J. Baird and  L.Lilien, “TARCO- A Trust-Aware Routing Capability for Oppnets,” 5th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 15 April 2011.

  9. L. Lilien, “Using Oppnets for Emergency Applications,” WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, April 9, 2010 (poster presentation to fulfill requirements of the FRACAA award from WMU).

  10. Z.H. Kamal, A. Gupta and L. Lilien, “MicroOppnet—Small-Scale Testbed for Class 2 Opportunistic Networks,” The 8th Annual WMU IT Forum “IT Education and Careers 2.0,” Western Michigan University, Kalamazoo, Michigan, April 3, 2009.

  11. L. Ben Othmane  and L. Lilien, “Preserving Data Privacy by Active Bundle Dissemination,” The 8th Annual WMU IT Forum “IT Education and Careers 2.0,” Western Michigan University, Kalamazoo, Michigan, April 3, 2009.

  12. L. Lilien, “Providing Feedback and Quality-of-information Mechanisms in Shared Information Space Environments via Opportunistic Capability Utilization,” Airborne Network Technology Expo 2008, Utica, New York, August 6, 2008.

  13. L. Lilien, “Applying Oppnets for Opportunistic Resource Utilization in the Joint Battlespace Infosphere (JBI) Program,” Info Challenges 2008 Conference and Exposition, Utica, New York, June 3, 2008.

  14. A. Al-Alawneh and L. Lilien, “Privacy Issues and Challenges in Opportunistic Networks,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

  15. L. Ben Othmane  and L. Lilien, “Preserving Data Privacy by Active Bundle Dissemination,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

  16. V. Kundoor, V. Achutaramaiah, L. Lilien, Z.H. Kamal and A. Gupta, “The MicroOppnet Testbed for Trust, Security, and Privacy Experiments in Heterogeneous Environments,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

  17. V. Kundoor, V. Achutaramaiah, L. Lilien, Z.H. Kamal and A. Gupta, “The MicroOppnet Testbed for Trust, Security, and Privacy Experiments in Heterogeneous Environments,” The Ninth Annual CERIAS Information Security Symposium," CERIAS, Purdue University, West Lafayette, Indiana, March 18, 2008.

  18. L. Lilien and B. Bhargava  (in collaboration with A. Gupta, I. Woungang, and Z. Yang), “Opportunistic Networks: Finding and Using Helpers Dynamically,” National Science Foundation NeTS Wireless Networks Principal Investigators Meeting, Illinois Institute of Technology, Chicago, Illinois, July 12, 2007.

  19. [Scholarly Endeavor Award] Z.H. Kamal (advisors: A. Gupta and L. Lilien), ”MicroOppnet: Small-Scale Testbed for Class 2 Opportunistic Networks,” Research and Creative Activities Day, The Graduate College, Western Michigan University, Kalamazoo, Michigan, April 20, 2007.

  20. C. Cai, A. Gupta and L. Lilien, “BANBAD: Bayesian-Network-Based Anomaly Detection for MANETs,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

  21. Z.H. Kamal, A. Gupta, and L. Lilien, “MicroOppnet—Small-Scale Testbed for Class 2 Opportunistic Networks,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

  22. B. Bhargava and L. Lilien, “Vulnerabilities and Threats in Distributed Systems,” The Eights Annual CERIAS Information Security Symposium," CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007 (due to an omission, not included in the online proceedings).

  23. B. Bhargava and L. Lilien, “P2D2: A Scheme for Privacy-preserving Data Dissemination,”
    The Eights Annual CERIAS Information Security Symposium,” CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007 (due to an omission, not included in the online proceedings).

  24. C. Cai, A. Gupta and L. Lilien, “BANBAD: Bayesian-Network-Based Anomaly Detection for MANETs,” The Eights Annual CERIAS Information Security Symposium,” CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007.

  25. B. Bhargava and L. Lilien, “Vulnerabilities and Threats in Distributed Systems,” NSF Cyber Trust Principal Investigators Meeting, Atlanta, Georgia, January 28-30, 2007.

  26. B. Bhargava and L. Lilien, “P2D2: A Scheme for Privacy-preserving Data Dissemination,”
    NSF Cyber Trust Principal Investigators Meeting, Atlanta, Georgia, January 28-30, 2007.

  27. V. Bhuse, A. Gupta, and L. Lilien, “Research Challenges in Lightweight Intrusion Detection (ID) for Wireless Sensor Networks (WSN),” 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006 (also a conference paper).

  28. L. Lilien, Z.H. Kamal, A. Gupta, V. Bhuse and Z. Yang, “Opportunistic Networks,” Third International Conference on Networked Sensing Systems (INSS 2006), Chicago, Illinois, June 1, 2006.

  29. [Honorable Mention in student poster competition] V. Bhuse, A. Gupta and L. Lilien, “Lightweight Intrusion Detection for Sensornets,” The Seventh Annual CERIAS Information Security Symposium  - "Negotiating Trust: Security, Privacy, Risk," Center  for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 21, 2006.

  30. L. Lilien, Z.H. Kamal, V. Bhuse and A. Gupta, “Opportunistic Networks and Their Privacy and Security Challenges,” The Seventh Annual CERIAS Information Security Symposium  - "Negotiating Trust: Security, Privacy, Risk," Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 21, 2006.

  31. L. Lilien and A. Gupta, “Opportunistic Networks for Emergency Preparedness and Response,” 4th Annual e-Enterprise Conference, Purdue Homeland Security Institute (PHSI) and Regenstrief Center for Healthcare Engineering (RCHE), Purdue University, West Lafayette, Indiana, March 20, 2006.

  32. B. Bhargava and L. Lilien, “A Scheme for Privacy-preserving Data Dissemination,” NSF Cyber Trust Annual Principal Investigator Meeting,  Newport Beach, California, September 26, 2005.

  33. B. Bhargava, L. Lilien and Y. Zhong, “Security and Privacy in Healthcare Environments,“  The 6th Annual Information Security Symposium: ”Security in Motion,” Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 23, 2005.

  34. B. Bhargava, S. Cain, L. Lilien, Pankaj, M. Skibniewski, and M. Tawarmalani, “Vulnerability Analysis and Threat Assessment/Avoidance,” Cyber-Infrastructure Workshop, School of Science, Purdue University, West Lafayette, Indiana, August 2003.

  35. B. Bhargava, S. Cain, L. Lilien, Pankaj, M. Skibniewski, and M. Tawarmalani, “Vulnerability Analysis and Threat Assessment/Avoidance,” Energizing the Enterprise: Technology Connecting Science, Business, Manufacturing and Service, e-Enterprise Center, Discovery Park, Purdue University, West Lafayette, Indiana, May 2003.

  36. B. Bhargava, S. Cain, L. Lilien, Pankaj, M. Skibniewski, and M. Tawarmalani, “Vulnerability Analysis and Threat Assessment/Avoidance,” Cyber Security & Safety for the 21st Century, 4th Annual CERIAS Research Symposium, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, April 2003

  37. B. Bhargava, S. Cain, L. Lilien, Pankaj, M. Skibniewski, and M. Tawarmalani, “Vulnerability Analysis and Threat Assessment/Avoidance,” e-Enterprise Center Research Colloquium and Poster Session, e-Enterprise Center, Discovery Park, Purdue University, West Lafayette, Indiana, January 2003.


[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]



Teaching

Last update of this section: 12 August 2024

Academic Teaching

Western Michigan University

Graduate Courses

  1. CS 6700—Advanced Computer and Information Security, Spring 2020

  2. CS 6580— Pervasive Computing, Spring 2020

  3. CS 6910—Trust and Privacy in Computing, Fall 2019

  4. CS 6580— Pervasive Computing, Spring 2019

  5. CS 6910—Trust and Privacy in Computing, Fall 2018

  6. CS 6700—Advanced Computer and Information Security, Spring 2018

  7. CS 6580— Pervasive Computing, Spring 2017

  8. CS 6700—Advanced Computer and Information Security, Fall 2016

  9. CS 6910—Trust and Privacy in Computing, Fall 2016 (developed)

  10. CS 6580— Pervasive Computing, Fall 2015

       --- Course material for offerings since Fall 2015 are on the WMU Elearning website ---

  1. CS 6700—Advanced Computer and Information Security, Spring 2015

  2. CS 6580—Pervasive Computing, Spring 2014 (developed)

  3. CS 6700—Advanced Computer and Information Security, Fall 2013

       --- Not teaching in Fall 2012 - Spring 2013 due to a sabbatical at Purdue ---

  1. CS 6700—Advanced Computer and Information Security, Spring 2011 (developed)

  2. CS 6030—Pervasive Computing, Spring 2010

  3. CS 6030—Advanced Computer and Information Security, Spring 2009

  4. CS 6030—Pervasive Computing, Fall 2008

  5. CS 6030—Advanced Computer and Information Security, Fall 2007

  6. CS 6910—Pervasive Computing, Spring 2007

  7. CS 6910—Advanced Computer and Information Security, Fall 2006

  8. CS 6030—Computer Security and Information Assurance, Spring 2006 (crosslisted as CS 5950)

  9. CS 6030—Network Security, Fall 2005 (crosslisted as CS 5950)

 

Undergraduate Courses

  1. CS 5700Computer Security and Information Assurance, Fall 2019

  2. CS 1120—Computer Science II  (with Java), Spring 2019

  3. CS 5700Computer Security and Information Assurance, Fall 2018

  4. CS 5700Computer Security and Information Assurance, Spring 2018

  5. CS 1120—Computer Science II  (with Java), Fall 2017 (2 sections)

  6. CS 5700Computer Security and Information Assurance, Spring 2017

  7. CS 4540Operating Systems, Spring 2016

  8. CS 5700Computer Security and Information Assurance, Spring 2016

  9. CS 4540Operating Systems, Fall 2015

--- Course material for course offerings since Fall 2015 are on the WMU Elearning website ---

  1. CS 4540—Operating Systems, Spring 2015

  2. CS 4540—Operating Systems, Fall 2014

  3. CS 5700—Computer Security and Information Assurance, Fall 2014

  4. CS 1120—Computer Science II  (with Java), Spring 201

--- Not teaching in Fall 2012 - Spring 2013 due to a sabbatical at Purdue ---

  1. CS 1120—Computer Science II  (with Java), Spring 2012

  2. CS 5700—Computer Security and Information Assurance, Spring 2012

  3. CS 1120—Computer Science II  (with C#)–18:30 Section, Fall 2011

  4. CS 1120—Computer Science II  (with C#) –10:00 Section, Fall 2011

  5. CS 1120—Computer Science II  (with C#), Spring 2011

  6. CS 1120—Computer Science II  (with C#), Fall 2010

  7. CS 5700—Computer Security and Information Assurance, Fall 2010 (developed)

  8. CS 1120—Computer Science II  (with C#), Spring 2010

  9. CS 1120—Computer Science II  (with C#), Fall 2009

  10. CS 5950—Computer Security and Information Assurance, Fall 2009

  11. CS 1120—Computer Science II  (with C#), Spring 2009

  12. CS 5950—Computer Security and Information Assurance, Fall 2008

  13. CS 1110—Computer Science I  (with C#), Spring 2008

  14. CS 5950—Computer Security and Information Assurance, Spring 2008

  15. CS 1120—Computer Science II  (with C#), Fall 2007

  16. CS 5950—Computer Security and Information Assurance, Spring 2007

  17. CS 1120—Computer Science II  (with C#), Fall 2006

  18. CS 5950—Computer Security and Information Assurance, Spring 2006 (crosslisted as CS 6030)

  19. CS 5950—Network Security, Fall 2005 (crosslisted as CS 6030)

 

University of Illinois at Chicago

Graduate Courses

Database Management Systems (developed),  Distributed Computing Systems (developed), Advanced Database Systems (updated)

Undergraduate Courses

Database Systems, File and Communication Systems, Computer Graphics I, Data Structures, Digital System Design, Microprocessors

 

Non-academic Instruction

IEEE Computer Society

Presenting tutorials on reliability and performance of distributed database systems.


AT&T Bell Labs, Naperville, Illinois

Co-trainer for the "Kelley-Caplan Productivity Enhancement Group" seminar.



[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]



Other Professional Activities

Last update of this section: 23 May 2018 (partial update)

Recent Awards

IEEE Golden Core Member, 2013

IEEE Computer Society’s Meritorious Service Award, March 2013

For contributions to the Symposia on Reliable Distributed Systems (SRDS), IEEE Computer Society

IEEE Advancing Technology for Humanity, 2012

 

Membership in Professional and Research Organizations

Collaborator, Center for Science of Information (CSoI), an NSF Science and Technology Center, Purdue University, http://soihub.org/collaborators, 2010 -

Member, Medical/Bio Engineering Research Working Group, CEAS, WMU, 2009 -

Senior Member, Institute of Electrical and Electronics Engineers (IEEE) and IEEE Computer Society, 2005 -

Affiliated Faculty, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, 2002 -

 


Recent Service to Scientific Community

Journal Editorial Board Member (selected)

International Journal of Computing and Digital Systems (IJCDS), 2012 -

International Journal of Computer Science: Theory, Technology and Applications (IJCS), 2011 -

International Journal of Next Generation Computing (IJNGC), 2010 –

Journal of Wireless Mobile Networks, Ubiquitous Computing and Applications (JoWUA), 2007 -

International Journal of Communication Networks and Distributed Systems (IJCNDS), 2012 –

Recent Patents on Computer Science, 2007 –

The Open Cybernetics & Systemics Journal, 2007 – end date unknown

 

Other Journal Editorial Duties (selected)

Guest Editor (with Pelin Angin and Tong Wang) for a Special Issue “AI and Distributed Ledger Technologies for IoT Security, Privacy, and Trust,” Frontiers in the Internet of Things, 2024

Guest Editor (with Ganapathy Mani) for a Special Issue “Artificial Intelligence for Security and Privacy in Ad Hoc and Sensor Networks (AI-SPASN),Sensors, 2022


Conference/Workshop Organizer/Chair

Co-Chair, Technical Program Committee, 15th IFIPS Wireless On-demand Network Systems and Services Conference (WONS 2019), Wengen, Switzerland, January 2019

Co-Chair, Technical Program Committee, 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012),  Irvine, California, October 2012

Organizer and Chair, The Third International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2011). Held in conjunction with the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Minneapolis, Minnesota, June 2011

Organizer and Chair, The Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009). Held in conjunction with the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Montreal, Canada, June 2009

Organizer and Chair, The First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007). Held in conjunction with the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Toronto, Canada, June 2007

 

Other Conference Functions

Publicity Co-Chair, 35th IEEE Intl. Symposium on Reliable Distributed Systems (SRDS 2016), Budapest, Hungary, 26 - 29 September 2016

Publicity Chair, 6th Intl. W. on Dependable Network Computing and Mobile Systems (DNCMS 2015), in conjunction with IEEE SRDS 2015, Montreal, Quebec, Canada, 28 September – 01 October 2015

Publicity Co-Chair, Seventh IEEE Intl. Conference on Semantic Computing (ICSC 2013), IEEE Computer Society, Irvine, CA, 16 – 18 September  2013

Publicity Co-Chair, 33rd IEEE Intl. Conference on Distributed Computing Systems (ICDCS 2013), IEEE Computer Society, Philadelphia, PA, 8 – 11 July 2013

Session Chair, Session: “Security, Dependability, and Fault Tolerance,” 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 10 October 2012

Workshops Co-Chair, 30th Intl. Symposium on Reliable Distributed Systems, IEEE Computer Society, Madrid, Spain, October 4-7, 2011

Publicity Co-Chair, 29th Intl. Symposium on Reliable Distributed Systems, IEEE Computer Society, Delhi, India, November 1-3, 2010

Publicity Co-Chair, 29th Intl. Symposium on Reliable Distributed Systems, IEEE Computer Society, Delhi, India, November 1-3, 2010

Awards Co-Chair, 28th Intl. Symposium on Reliable Distributed Systems, Niagara Falls, NY, September 27-30, 2009

Organizer and Moderator of the panel “Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS)” at the Second Intl. Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009), Montreal, Canada, June 26, 2009

Organizing Committee Member, Workshop on Research Directions in Situational-aware Self-managed Proactive Computing in Wireless Adhoc Networks (including CRA-W Workshop on Pervasive Computing), St. Louis, Missouri, March 2-3, 2009

Session Chair, Session 1, The First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications  (MUBICA 2007), Philadelphia, Pennsylvania, August 6, 2007

Organizer and Moderator of the panel “Do we need specialized ad hoc networks and systems?” at the First Intl. Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007), Toronto, Canada, June 29, 2007

Organizer and Moderator of the panel “Is Security without Trust Feasible?” at the 3rd Intl. Conference on Trust, Privacy, and Security in Digital Business (TrustBus'06), Kraków, Poland, September 2006

Session Chair, Session 4: Privacy Enhancing Technologies and Privacy Management, The 3rd International Conference on Trust and Privacy  in Digital Business (TrustBus’06), Krakow, Poland, September 6, 2006

Session Chair, Session 2B: Distributed Programming, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), San Juan, Puerto Rico, May 2003


Technical Program Committee (TPC) Member at International Conferences

For over 75 international conferences since 2003

 

Reviewer 

National Science Foundation programs, including Computer and Information Science and Engineering (CISE), Cyber Trust, Small Business Innovation Research, Database Management, and Distributed Systems and Compilers (2002 – 2018)

Foreign counterparts to the National Science foundation:

Switzerland: Swiss National Science Foundation (requested: May 2008)

Luxembourg: National Research Fund or FNR (requested: June 2008)

Journal reviews since 2010: IEEE Transactions on Mobile Computing (6 Jun. 2018), Springer’s  EURASIP J. on Wireless Communications and Networking, (17 Aug. 2014), Intl. J. of Next Generation Computing (3 July 2014, 4 Nov. 2011, 2 Mar. 2011), IEEE Communications Magazine (12 July 2013), Inderscience’s Intl. J. of Sensor Networks (19 Feb. 2013), Elsevier’s Computers and Electrical Engineering (15 Jan. 2011), Springer’s Transactions on Computational Science (29 Jul. 2010), The Open Cybernetics & Systemics Journal (22 Jul. 2010)

Journal reviews between 2003 and 2009:  International Journal of Communication Networks and Distributed Systems (2009), IEEE Transactions on Instrumentation & Measurement (2008), International Journal of Computers and Applications (2008, 2005), IEEE Transactions on Systems, Man and Cybernetics (2005), International Journal of Cooperative Information Systems (2004), Automation in Construction (2004), IEEE Transactions on Mobile Computing (2003)

Book reviews: two chapters for: K. Chen and A. Fadlalla (Eds.), Online Consumer Protection: Theories of Human Relativism, IGI Global, Hershey, Pennsylvania (2008); a Springer Verlag book based on papers from the Fourth IEEE ICDM (International Conference on Data Mining) Workshop on Foundations of Data Mining (at Brighton, UK, November 2004)

Tenure/promotion and internal proposal reviewer for American universities (2015, 2013)

 

Service for Department, College, and University Committees (selected)

CS Graduate Committee, 2008 – 2020

CS Ad Hoc Committee on M.S. in Cybersecurity, 2016

CS Undergraduate Committee, 2008 – 2009

WMU IP Management and Commercialization Faculty Advisory Committee



[_Top_]         [_Research_]  [_Publications_]  [_Presentations _]  [_Teaching_]  [_Professional Activities_]


Note: This page is not a complete record of L. Lilien’s work.

For dates of partial updates see individual sections.

<
>