image005.jpg

 

Leszek T. Lilien, Ph.D.

Associate Professor

llilien@wmich.edu

http://www.cs.wmich.edu/~llilien

269-276-3116

Department of Computer Science

College of Engineering and Applied Sciences

Western Michigan University

1903 West Michigan Avenue
Kalamazoo, MI 49008-5466

Main Office: 269-276-3101   Fax: 269-276-3122

 

image006.gif

 

© 2006, WMU

 

[_Research_]  [_Teaching_]  [_Other Professional Activities_]

 

 

Note: This page shows highlights of Dr. Lilien’s activities and is not a complete record of his work.

 

 

Summary

Last update: 09 January 2014

Associate Professor of Computer Science at Western Michigan University (WMU) and Adjunct Associate Professor of Computer Science at Purdue University.

Ph.D. in Computer Science, University of Pittsburgh. Research at Western Michigan University (WMU)—as a faculty; Purdue University—as a post doctoral researcher, a sabbatical visitor and an adjunct faculty; and University of Illinois at Chicago (UIC)—as a faculty. Teaching at WMU and UIC.  Tutorial instructor for IEEE Computer Society. Diversified R&D experience at AT&T/Lucent Bell Labs. Consultant for academic and business projects. Entrepreneurial experience in the United States and Poland.

Current research focused in two Areas: (1) opportunistic capability utilization networks or oppnets (a specialized kind of ad hoc networks); and (2) trust, privacy and security in open computing systems.  In Area 1, focus on primitives for oppnets, privacy and security in oppnets, and interoperability of oppnet helper networks and devices. In Area 2, concentration on privacy-preserving data dissemination, authentication and privacy in health care, vulnerability analysis and threat assessment, the role of trust in open computing environments, analysis of computer security paradigms, modeling computer fraud, and security and privacy aspects in pervasive systems, including ad hoc sensor networks and embedded networks.

Former areas of investigation include: (a) distributed computing systems with concentration on decentralized control; (b) distributed database systems with focus on reliability, fault tolerance, recovery, concurrency control, query optimization, and database design; and (c) semantic database integrity.

Published over 60 peer-reviewed journal and conference papers, and six book chapters (at least four peer-reviewed). Keynote speaker for international conferences. Editorial Board member for seven journals. Technical Program Committee Co-Chair for the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012). Organizer and Chair of the International Workshops on Specialized Ad Hoc Networks and Systems (SAHNS 2011, SAHNS 2009 and SAHNS 2007) in conjunction with IEEE International Conference on Distributed Computing Systems (ICDCS 2011, ICDCS 2009 and ICDCS 2007).

Co-PI for a Navy grant on oppnets, and an NSF grant on vulnerability analysis and threat assessment/avoidance. Visiting Faculty in the Air Force Research Laboratory's Information Institute, and in the Department of Computer Science at Purdue University (sabbatical).

Senior Member of the Institute of Electrical and Electronics Engineers (IEEE) and IEEE Computer Society. Affiliated with Center for Science of Information (CSoI) and Center for Education and Research in Information Assurance and Security (CERIAS), both at Purdue University.

 


[_Top_]            [_Summary_]  [_Research_]  [_Teaching_]  [_Other Professional Activities_] 


 

Research

Last update: 23 November 2012

Current Projects

·         Privacy-preserving data dissemination (including the original idea of active bundles)

·         Opportunistic resource utilization networks and systems (a.k.a. oppnets)

Projects—mostly focusing on trust, privacy and security—include:

-        Helper privacy and oppnet privacy

-        Classic and identity-based authentication in oppnets, including authentication of helper candidates in oppnet environments, and authentication of oppnet nodes in oppnet environments

-        Masquerading in oppnets, including malevolent hosts masquerading as oppnet member, and malevolent helpers masquerading as helpers or oppnet members

-        Software agents' role for security and privacy in oppnets

-        Intrusion detection, honeypots and honeyfarms in oppnets

-        Semantic Web for agents’ trust in oppnets

-        Security and privacy issues for Software Defined Radio in oppnets

·         Vulnerability analysis and threat assessment/avoidance in computer systems, esp. in database systems

·         Authentication and privacy, with emphasis on authentication in healthcare systems

-         Project Authentic: Authentication Attacks and Controls

·         Using trust for entity authorization in open computing environments

·         Analysis of computer security paradigms and development of new ones

·         Modeling computer fraud and investigating types of fraudulent user behaviors

·         Security and privacy issues in ad hoc sensor networks and embedded networks                                           

 

This work has been supported in part by the National Science Foundation (NSF), Western Michigan University, the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, and DARPA.

 

Visiting Scholars

Current

1.       Dr. Daisuke Kasamatsu from Soka University in Tokyo

Research on oppnet use for emergency response applications. Funded by Japanese Telecommunication Advancement Foundation, March 2012 – July 2013 (visiting me at WMU, then visiting Purdue University with me during my sabbatical).

 

Ph.D. Students

Current

1.       Mai A. Alduailij, research on the opportunistic resource utilization systems with focus on the MicroOppnet testbed/pilot system.

2.       Joe Baird, “Trust-Aware Automatic Incremental Routing for Oppnets (TAIRO),” Ph.D. Proposal defended in July 2012.

3.       Raed M. Salih, research on using active bundles for privacy protection in healthcare.

Alumni

1.        Bilal Abu Bakr, “A Decentralized Energy-Efficient Scheme to Maximize Wireless Sensor Network Lifetime,” Ph.D. Proposal defended on 22 April  2010. Ph.D. degree awarded on 25 June 2011.

2.        Lotfi Ben-Othmane, “Protecting Sensitive Data throughout Their Lifecycle,” Ph.D. Proposal defended on 26 January 2009. Ph.D. degree awarded on 18 December 2010.

 

Major Students’ Awards

1.       All-University Graduate Research and Creative Scholar Award for L. Ben Othmane, The Graduate College, WMU, 2011  (the highest university-wide award at WMU).

2.       Selected for the Trusted Infrastructure Workshop 2010 (TIW 2010) for L. Ben Othmane, Carnegie Mellon University, Pittsburgh, 2010 (full travel/accommodations grant included).

3.       Dissertation Completion Fellowship for L. Ben Othmane, The Graduate College, WMU, 2009 (only 7 fellowships awarded for the entire university).

4.       Best Student Symposium Paper Award for L. Ben Othmane,  Graduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, 2008

5.       Scholarly Endeavor Award for Z.H. Kamal ‘s poster at Research and Creative Activities Day, Western Michigan University, 2006.

6.       Honorable Mention in a student poster competition for V.  Bhuse at The Seventh Annual CERIAS Information Security Symposium - “Negotiating Trust: Security, Privacy, Risk,” Center for Education and Research in Information Assurance and Security, Purdue University, 2006.

 

Hosting Visiting Scholars

 

Selected Publications (names of students and former students underlined)

Book Chapters (since 2007)

                      1.          L. Lilien, Z.H. Kamal, A. Gupta, I. Woungang, and E. Bonilla Tamez, “Quality of Service in an Opportunistic Capability Utilization Network,” Chapter 7 in: M. Denko et al. (Eds.), Mobile Opportunistic Networks: Architectures, Protocols and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, 2011, pp. 173-204 (peer reviewed).

                      2.          L. Lilien and B. Bhargava, "Privacy and Trust in Online Interactions," Chapter V in: K. Chen and A. Fadlalla (Eds.), Online Consumer Protection: Theories of Human Relativism, Idea Group, Hershey, Pennsylvania, 2008, pp. 85-122 (peer reviewed).

                      3.          Z.H. Kamal, L. Lilien, A. Gupta, Z. Yang, M. Batsa,  “A New UMA Paradigm: Class 2 Opportunistic Networks,”  Chapter 17 in: Y. Zhang, L.T. Yang, and J. Ma (Eds.), Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, 2008, pp. 349-392  (peer reviewed).

                      4.          L. Lilien, Z.H. Kamal, V. Bhuse, and A. Gupta, “The Concept of Opportunistic Networks and Their Research Challenges in Privacy and Security,” Chapter 5 in: S.K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki (Eds.), Mobile and Wireless Network Security and Privacy, Springer Science+Business Media, Norwell, Massachusetts, 2007, pp. 85-117 (based on a peer-reviewed conference paper).

 

Journal Papers (since 2004)

1.       L.T. Lilien, L. ben Othmane, P. Angin, A. DeCarlo, R.M. Salih, and B. Bhargava, “A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks,”
Journal of Network and Computer Applications, Elsevier, (to appear).

2.       B. Panja, B. Bhargava, S. Pati, D. Paul, L.T. Lilien and P. Meharia, “Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance,”  Recent Patents on Computer Science, Vol. 6 (1), April 2013, pp. 73-81. Available at: http://eurekaselect.com/108832/article

3.       L. Lilien, A. Gupta, Z. Kamal, and Z. Yang, “Opportunistic Resource Utilization Networks—A New Paradigm for Specialized Ad Hoc Networks,” Computers and Electrical Engineering, Special Issue: “Wireless ad hoc, Sensor and Mesh Networks,” Vol.36(2), Elsevier, March 2010, pp. 328–340. Available online at: http://dx.doi.org/10.1016/j.compeleceng.2009.03.010

4.       S. Behl and L. Lilien, “Privacy-preserving Transactions on the Web” The Hilltop Review: A Journal of Western Michigan University Graduate Research, Vol. 3(1), Western Michigan University, Kalamazoo,   Michigan,  Fall 2009,  pp. 14-38 (reviewed by WMU faculty and graduate students). Available online at:    http://www.wmich.edu/gsac/Hilltop%20Review/Fall%202009/Hilltop%20Review%20Fall%202009%20Complete%20Journal.pdf

5.       B. Bhargava, Y. Zhang, N. Idika, L. Lilien, and M. Azarmi, “Collaborative Attacks in WiMAX Networks,” Security and Communication Networks, special issue on “WiMAX Security and Applications,” Vol.2(5), Wiley, September/October 2009, pp. 373-391; available online at: http://dx.doi.org/10.1002/sec.127

6.       L. Lilien, A. Bhargava, and B. Bhargava, “From Fraud Vulnerabilities and Threats to Fraud Avoidance and Tolerance,” IPSI Transactions on Internet Research, Vol.5(1), January 2009, pp. 16-24.

7.       Z.H. Kamal, A. Gupta, A. Khokhar, and L. Lilien, “Power Consumption Analysis of Maximum A Posterior Classifier (MAP) for Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 19(11), November 2008, pp. 1473-1483.

8.       L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and Cybernetics Cybernetics, Part A: Systems and Humans, Vol. 36(3), May 2006, pp. 503-506.

9.       B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, "Pervasive Trust," IEEE Intelligent Systems, vol. 19(5), September/October 2004, pp. 74-77.

 

Papers in Peer-reviewed Conferences (since 2003)

1.       J.W. Baird (advisor: L. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks,” Ph.D. Forum, 31st IEEE Intl. Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 8-11 October 2012, 2 pages, CD ROM.

2.       R.M. Salih, L.T. Lilien and L. Ben Othmane, “Protecting Patients’ Electronic Health Records Using Enhanced Active Bundles,” 6th International ICST Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2012), San Diego, CA, 21–24 May 2012, 4 pages, CD ROM, DOI: 10.4108/icst.pervasivehealth.2012.248719

3.       R. Salih and L. Lilien, “The Active Bundle Scheme for Protecting Electronic Medical Records,” Transactions of the International Conference on Health Information Technology Advancement, Vol. 1(1), Western Michigan University, Kalamazoo, MI, October 2011, pp. 109-115.

4.       B. Abu Bakr and L. Lilien, “Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection,” Proc. The First Intl. Workshop on Advanced Communication Technologies and Applications to Intelligent Transportation Systems, Cognitive Radios and Sensor Networks (ACTICS 2011), in conjunction with IMIS 2011, Seoul, Korea, June-July 2011, pp. 277-282, DOI: 10.1109/IMIS.2011.142

5.       B. Abu Bakr and L. Lilien, “A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” Proc. The Fourth Intl. Workshop on Sensor Networks (SN 2011), in conjunction with ICDCS 2011, Minneapolis, MN, June 2011, pp. 182-191, http://doi.ieeecomputersociety.org/10.1109/ICDCSW.2011.55

6.       R.M. Salih, L. Ben Othmane, and L. Lilien, “Privacy Protection in Pervasive Healthcare Monitoring Systems with Active Bundles,” Proc. Ninth IEEE Intl. Symp.on Parallel and Distributed Processing with
Applications Workshops (ISPAW 2011)
, Busan, Korea, May 2011, pp. 311-315, DOI:  10.1109/ISPAW.2011.60

7.       B. Abu Bakr and L. Lilien, “LEACH-SM: A Protocol for Extending Wireless Sensor Network Lifetime by Management of Spare Nodes,” Proc. 3S Workshop (Wireless of the Student, by the Student, for the Student) in conjunction with WiOpt 2011, Princeton, NJ, May 2011, p. 375,

8.       http://dx.doi.org/10.1109/WIOPT.2011.5930046, (extended abstract; peer-reviewed).

9.       R. Ranchal, B. Bhargava, L. Ben Othmane, L. Lilien, A. Kim, M. Kang, and M. Linderman, “Protection of Identity Information in Cloud Computing without Trusted Third Party,” Proc. Third International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2010), New Delhi, India, October 31, 2010, pp. 368-372.

10.    N. Singh, R. Ranchal, B. Bhargava, P. Angin, M. Azarmi, L. Ben Othmane, and L. Lilien, “A User-centric Approach for Privacy and Identity Management in Cloud Computing,Proc. 29th International Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, India, October 31 - November 3, 2010, pp. 177-183 (short paper; acceptance rate incl. short papers: 34%).

11.    L. Lilien, A. Al-Alawneh and L. Ben Othmane, The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper),Proc.  The New Security Paradigms Workshop (NSPW 2010), Concord, Massachusetts, September 21-23, 2010, pp. 129-142.

12.    L. Ben Othmane and L. Lilien, “Protecting Privacy in Sensitive Data Dissemination with Active Bundles,” Proc. Seventh Annual Conference on Privacy, Security and Trust (PST 2009), Saint John, New Brunswick, Canada, August 2009, pp. 202-213 (acceptance rate: 56%).

13.    E. Bonilla Tamez, I. Woungang, L. Lilien, and M.K. Denko, “Trust Management in Opportunistic Networks: A Semantic Web Approach,” Proc. PST 2009 Graduate Student Symposium, Seventh Annual Conference on Privacy, Security and Trust (PST 2009), Saint John, New Brunswick, Canada, August 2009, pp. 235-238 (short paper).

14.     [Best Student Symposium Paper Award] L. Ben Othmane and L. Lilien, “Preservation of Sensitive Data throughout Its Life Cycle,” Proc. PST 2008 Graduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, October 2008, pp. 12-13 (short paper).

15.    T. Mehjabeen, I. Woungang, L. Lilien, M. Denko, F. Rashid, and G. Ma, “Intrusion Detection in Opportunistic Capability Utilization Networks,” Proc. PST 2008 Graduate Student Symposium, Sixth Annual Conference on Privacy, Security and Trust (PST 2008), Fredericton, New Brunswick, Canada, October 2008, pp. 14-15 (short paper).

16.    Z.H. Kamal, A. Gupta, L. Lilien, and Z. Yang, “The MicroOppnet Tool for Collaboration Experiments with Class 2 Opportunistic Networks,” Proc. The 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007),  White Plains, New York, November 2007, CD-ROM, 10 pages.

17.    L. Lilien, “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” Proc. The First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007, CD-ROM, 8 pages (invited).

18.    L. Lilien, A. Gupta, and Z. Yang “Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework,” Proc. The First International Workshop on Next Generation Networks for First Responders and Critical Infrastructure (NetCri07), New Orleans, Louisiana, April 2007,  pp. 588-593 (acceptance rate: 27%).

19.    Z.H. Kamal, A. Gupta, L. Lilien and A. Khokhar, “An Efficient MAP Classifier for Sensornets,” Proc. 13th Annual IEEE International Conference on High Performance Computing (HiPC 2006), Bangalore, India, December 2006, pp. 560 – 571.

20.    V. Bhuse, A. Gupta and L. Lilien, “Research challenges in lightweight intrusion detection for wireless sensor networks,” Proc. 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 2006, CD ROM, 6 pages.

21.    L. Lilien, Z.H. Kamal and A. Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 2006, pp. 722 –726.

22.    Z.H. Kamal, A. Gupta, L. Lilien and A. Khokhar, “Classification using Efficient LU Decomposition in Sensornets,” Proc. the IASTED International Conference on Wireless Sensor Networks (WSN 2006), Banff, Alberta, Canada, July 2006, CD ROM, Paper No. 538-026, 6 pages.

23.    L. Lilien, Z.H. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 2006, pp. 134-147 (acceptance rate: 47%).

24.    V. Bhuse, A. Gupta, and L. Lilien, “DPDSN: Detection of packet-dropping attacks for wireless sensor networks,” Proc. 4th International Trusted Internet Workshop (TIW), Goa, India, December 2005, CD ROM, 5 pages.

25.    B. Bhargava and L. Lilien, "Vulnerabilities and Threats in Distributed Systems," in: Distributed Computing and Internet Technology : First International Conference, ICDCIT 2004, Bhubaneswar, India, December 2004, Springer-Verlag, Lecture Notes in Computer Science, Vol. 3347, 2004, pp. 146-157 (invited).

26.    B. Bhargava and L. Lilien, "Private and Trusted Collaborations," Proc. Secure Knowledge Management (SKM 2004): A Workshop (an NSF/NSA/AFRL workshop), Amherst, NY, September 2004, pp. 27-32 (invited).

27.    M. Jenamani, L. Lilien, and B. Bhargava, "Anonymizing Web Services Through a Club Mechanism with Economic Incentives," Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795.

28.    L. Lilien, "Developing Pervasive Trust Paradigm for Authentication and Authorization," Proc. Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited).

29.    L. Lilien and A. Bhargava, "From Vulnerabilities to Trust: A Road to Trusted Computing," Proc. International Conference on Advances in Internet, Processing, Systems, and Interdisciplinary Research (IPSI-2003), Sv. Stefan, Serbia and Montenegro, October 2003, CD ROM, 4 pages.

30.    I. Chung, B. Bhargava, M. Mahoui, and L. Lilien, "Autonomous Transaction Processing Using Data Dependency in Mobile Environments,"  Proc. The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '2003), San Juan, Puerto Rico, May 2003, p. 138-144.

 

Selected Presentations

Keynote/Invited Talks

1.       Keynote talk: “Oppnets - Opportunistic Resource Utilization Networks,” Intl. Conf. on High-Performance Architecture and Grid Computing (HPAGC-2011)Rajpura, Punjab, India, July 2011 (teleconferencing), cf.: http://hpagc2011.chitkara.edu.in/experttalks.html.

2.       Invited talk: “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” The First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007.

3.       Invited talk: “Developing Pervasive Trust Paradigm for Authentication and Authorization, Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003.

 

Keynote Speaker

1.       Invited to be a keynote speaker at the IEEE International Advance Computing and Creating Entrepreneurs Conference (ACCE-2013)‏.

2.       “Oppnets—Opportunistic Resource Utilization Networks,” (in collaboration with A. Gupta, Z.H. Kamal, and Z.J. Yang), The Intl. Conf. on High-Performance Architecture and Grid Computing (HPAGC-2011), Rajpura, Punjab, India, 19 July 2011 (teleconferencing), cf.: http://hpagc2011.chitkara.edu.in/experttalks.html.

 

Conference Talks and University Seminars

3.       "A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” The Fourth Intl. Workshop on Sensor Networks (SN 2011), in conjunction with ICDCS 2011, Minneapolis, MN, 22 June 2011.

4.       The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper),The New Security Paradigms Workshop (NSPW 2010), Concord, Massachusetts, September 23, 2010.

5.       Active Bundles for Protecting Privacy during Sensitive Data Dissemination,” Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan, June 16, 2010.

6.       “A Mechanism for Lifecycle Data Privacy Protection in Cloud Computing,” Midwest University-Industry Summit, West Lafayette, Indiana, March 2010.

7.       “Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A Position Presentation,” CERIAS Security Seminar, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, November 11, 2009 .

8.       “Benefits and pitfalls of specialized ad hoc networks and systems,” at the panel under the same title at the Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009), Montreal, Canada, Friday, June 26, 2009.

9.       “Computer Networks as Tools for Enlarging Social Networks in Our Civilization,” 40th International Conference of the International Society for the Comparative Study of Civilizations (ISCSC 2009), Kalamazoo, Michigan, June 5, 2009.

10.    “Class 2 Opportunistic Networks – a New Paradigm for Specialized Ad Hoc Networks,” Department of Computer Sciences, Purdue University, West Lafayette, Indiana, February 7, 2008.

11.    “The MicroOppnet Tool for Collaboration Experiments with Class 2 Opportunistic Networks,” The 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007),  White Plains, New York, November 13, 2007.

12.    Do we need specialized ad hoc networks and systems?” at the panel under the same title at the First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007), Toronto, Canada, Friday, June 29, 2007.

13.    “Opportunistic Networks —  A New Paradigm and Technology for Service Oriented Architecture,” at the panel: “Web 2.0 and Service Oriented Architecture,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

14.    "Is Security without Trust Feasible?" panel presentation, 3rd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus'06), Kraków, Poland, September 4-8, 2006.

15.    "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006.

16.    "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications,"  presented at the following institutions:

-         Distributed Systems Research Group, Department of Computer Science, AGH University of Science and Technology, Kraków, Poland, May 22, 2006;

-         Section of Information Technology, Institute of Telecomputing, Faculty of Electrical and Computer Engineering, Cracow University of Technology, Kraków (Cracow), Poland, May 23, 2006.

17.    Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks,” Workshop on Distributed Systems and Networks (in conjunction with WWIC’06), Bern, Switzerland, May 9, 2006.

18.    "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 15-16, 2006.

19.    (In cooperation with N. Bhargava), “Attack Prevention, Detection, and Recovery in Optical Networks,” Michigan Academy of Science, Arts, & Letters—Annual Meeting, Oakland University, Rochester, Michigan, March 3, 2006.

20.    (With Z. Huma Kamal and A. Gupta, and  in cooperation with V. Bhuse and Z Yang), "Opportunistic Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9, 2006.

21.    “A Mechanism for Privacy-preserving Data Dissemination” / „P2D2: A Mechanism for Privacy-Preserving Data Dissemination,”  presented at the following institutions:

-         Academic Computer Center CYFRONET AGH and Department of Computer Science, AGH University of Science and Technology, Kraków, Poland, December 21, 2005;

-         Institute of Computing Science, Faculty of Mechanical Engineering, Cracow University of Technology, Kraków (Cracow), Poland, June 9, 2005;

-         Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 8, 2005.

22.    “Asymmetric Trust Relationships: Trading Privacy for Trust,” Panel: “Locating Credentials: Trusted Communities and Controlled Access,” The 6th Annual Information Security Symposium “Security in Motion,” Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 24, 2005.

23.    “Trusted and Private Interactions,” Networking and Distributed Systems Seminar, Department of Computer Sciences, Purdue University, January 25, 2005.

24.    “Trust, Privacy and Security. Breakout Session summary,” Plenary Session, NSF Information and Data Management (IDM) Workshop, Boston, Massachusetts, October 2004.

25.    Private and Trusted Interactions,” the 5th Annual Information Security Symposium "Energizing the Enterprise: Cyber Security in Context," Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, March 23, 2004.

26.    Developing Pervasive Trust Paradigm for Authentication and Authorization,” presented at the following institutions:

-         Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, January 2004;

-         Distributed Information Systems Laboratory, School for Computer and Communication Science, EPFL (Federal Institute of Technology Lausanne), Lausanne, Switzerland, November 2003;

-         Network Security and Cryptography Research Group, IBM Zurich Research Laboratory, Zurich, Switzerland, November 2003;

-         Institute of Computing Science, Faculty of Mechanical Engineering, Cracow University of Technology, Kraków (Cracow), Poland, October 2003;

-         Distributed Systems Group, Information Systems Institute, Technical University of Vienna, Vienna, Austria, October 2003;

-         Computer Networks and Distributed Systems Research Group, Institute of Computer Science and Applied Mathematics, University of Bern, Bern, Switzerland, October 2003;

-         MIDLAB Middleware Laboratory, Department of Computer and Systems Science, University of Rome "La Sapienza," Rome, Italy, October 2003.

27.    A Grand Challenge: Using Trust to Improve Data Quality,” Panel: "Grand Challenges in Data Integrity and Quality", Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland, November 2003.

28.    (With C. Farkas) “Trust, Privacy and Security. Breakout Session summary,” Plenary Session, NSF Information and Data Management (IDM) Workshop, Seattle, Washington, September 2003.

29.    “Quasi-partitioning in Distributed Database Systems,” Center for Information Systems, Cracow University of Technology, Kraków (Cracow), Poland, January 2003.

 

Posters (names of students and former students underlined)

1.       J. Baird  (adviser: L.T. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks,” Ph.D. Forum, 31st IEEE Intl. Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, 10 October 2012.

2.       R.M. Salih (adviser: L.T. Lilien), “Protecting Privacy of Patients’ Electronic Health Records with the ABTTP Scheme,” 6th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 20 April 2012.

3.       J. Baird  (adviser: L.T. Lilien), “TAIRO: Trust-aware Automatic Incremental Routing for Oppnets,” 6th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 20 April 2012.

4.       B. Abu Bakr and L. Lilien, “LEACH-SM: A Protocol for Extending Wireless Sensor Network Lifetime by Management of Spare Nodes,” 5th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 15 April 2011.

5.       J. Baird and  L.Lilien, “TARCO- A Trust-Aware Routing Capability for Oppnets,” 5th WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, 15 April 2011.

6.       L. Lilien, “Using Oppnets for Emergency Applications,” WMU Research and Creative Activities Poster Day, Western Michigan University, Kalamazoo, Michigan, April 9, 2010 (poster presentation to fulfill requirements of the FRACAA award from WMU).

7.       Z.H. Kamal, A. Gupta and L. Lilien, “MicroOppnet—Small-Scale Testbed for Class 2 Opportunistic Networks,” The 8th Annual WMU IT Forum “IT Education and Careers 2.0,” Western Michigan University, Kalamazoo, Michigan, April 3, 2009.

8.       L. Ben Othmane  and L. Lilien, “Preserving Data Privacy by Active Bundle Dissemination,” The 8th Annual WMU IT Forum “IT Education and Careers 2.0,” Western Michigan University, Kalamazoo, Michigan, April 3, 2009.

9.       L. Lilien, “Providing Feedback and Quality-of-information Mechanisms in Shared Information Space Environments via Opportunistic Capability Utilization,” Airborne Network Technology Expo 2008, Utica, New York, August 6, 2008.

10.    L. Lilien, “Applying Oppnets for Opportunistic Resource Utilization
in the Joint Battlespace Infosphere (JBI) Program
,” Info Challenges 2008 Conference and Exposition, Utica, New York, June 3, 2008.

11.    A. Al-Alawneh and L. Lilien, “Privacy Issues and Challenges in Opportunistic Networks,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

12.    L. Ben Othmane  and L. Lilien, “Preserving Data Privacy by Active Bundle Dissemination,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

13.    V. Kundoor, V. Achutaramaiah, L. Lilien, Z.H. Kamal and A. Gupta, “The MicroOppnet Testbed for Trust, Security, and Privacy Experiments in Heterogeneous Environments,” The 7th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 28, 2008.

14.    V. Kundoor, V. Achutaramaiah, L. Lilien, Z.H. Kamal and A. Gupta, “The MicroOppnet Testbed for Trust, Security, and Privacy Experiments in Heterogeneous Environments,” The Ninth Annual CERIAS Information Security Symposium," CERIAS, Purdue University, West Lafayette, Indiana, March 18, 2008.

15.    L. Lilien and B. Bhargava  (in collaboration with A. Gupta, I. Woungang, and Z. Yang), “Opportunistic Networks: Finding and Using Helpers Dynamically,” National Science Foundation NeTS Wireless Networks Principal Investigators Meeting, Illinois Institute of Technology, Chicago, Illinois, July 12, 2007.

16.    [Scholarly Endeavor Award] Z.H. Kamal (advisors: A. Gupta and L. Lilien), ”MicroOppnet: Small-Scale Testbed for Class 2 Opportunistic Networks,” Research and Creative Activities Day, The Graduate College, Western Michigan University, Kalamazoo, Michigan, April 20, 2007.

17.    C. Cai, A. Gupta and L. Lilien, “BANBAD: Bayesian-Network-Based Anomaly Detection for MANETs,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

18.    Z.H. Kamal, A. Gupta, and L. Lilien, “MicroOppnet—Small-Scale Testbed for Class 2 Opportunistic Networks,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007.

19.    B. Bhargava and L. Lilien, “Vulnerabilities and Threats in Distributed Systems,” The Eights Annual CERIAS Information Security Symposium," CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007 (due to an omission, not included in the online proceedings).

20.    B. Bhargava and L. Lilien, “P2D2: A Scheme for Privacy-preserving Data Dissemination,”
The Eights Annual CERIAS Information Security Symposium,” CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007 (due to an omission, not included in the online proceedings).

21.    C. Cai, A. Gupta and L. Lilien, “BANBAD: Bayesian-Network-Based Anomaly Detection for MANETs,” The Eights Annual CERIAS Information Security Symposium,” CERIAS, Purdue University, West Lafayette, Indiana, March 20, 2007.

22.    B. Bhargava and L. Lilien, “Vulnerabilities and Threats in Distributed Systems,” NSF Cyber Trust Principal Investigators Meeting, Atlanta, Georgia, January 28-30, 2007.

23.    B. Bhargava and L. Lilien, “P2D2: A Scheme for Privacy-preserving Data Dissemination,”
NSF Cyber Trust Principal Investigators Meeting, Atlanta, Georgia, January 28-30, 2007.

24.    V. Bhuse, A. Gupta, and L. Lilien, “Research Challenges in Lightweight Intrusion Detection (ID) for Wireless Sensor Networks (WSN),” 8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006 (also a conference paper).

25.    L. Lilien, Z.H. Kamal, A. Gupta, V. Bhuse and Z. Yang, “Opportunistic Networks,” Third International Conference on Networked Sensing Systems (INSS 2006), Chicago, Illinois, June 1, 2006.

26.  [Honorable Mention in student poster competition] V. Bhuse, A. Gupta and L. Lilien, “Lightweight Intrusion Detection for Sensornets,” The Seventh Annual CERIAS Information Security Symposium  - "Negotiating Trust: Security, Privacy, Risk," Center  for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 21, 2006.

27.    L. Lilien, Z.H. Kamal, V. Bhuse and A. Gupta, “Opportunistic Networks and Their Privacy and Security Challenges,” The Seventh Annual CERIAS Information Security Symposium  - "Negotiating Trust: Security, Privacy, Risk," Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 21, 2006.

28.    L. Lilien and A. Gupta, “Opportunistic Networks for Emergency Preparedness and Response,” 4th Annual e-Enterprise Conference, Purdue Homeland Security Institute (PHSI) and Regenstrief Center for Healthcare Engineering (RCHE), Purdue University, West Lafayette, Indiana, March 20, 2006.

29.    B. Bhargava and L. Lilien, “A Scheme for Privacy-preserving Data Dissemination,” NSF Cyber Trust Annual Principal Investigator Meeting,  Newport Beach, California, September 26, 2005.

30.    B. Bhargava, L. Lilien and Y. Zhong, “Security and Privacy in Healthcare Environments,“  The 6th Annual Information Security Symposium: ”Security in Motion,” Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, March 23, 2005.

31.    B. Bhargava, S. Cain, L. Lilien, Pankaj, M. Skibniewski, and M. Tawarmalani, “Vulnerability Analysis and Threat Assessment/Avoidance” Presented at the following posters sessions:

-        Cyber-Infrastructure Workshop, School of Science, Purdue University, West Lafayette, Indiana, August 2003.

-        Energizing the Enterprise: Technology Connecting Science, Business, Manufacturing and Service, e-Enterprise Center, Discovery Park, Purdue University, West Lafayette, Indiana, May 2003.

-        Cyber Security & Safety for the 21st Century, 4th Annual CERIAS Research Symposium, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana, April 2003.

-        e-Enterprise Center Research Colloquium and Poster Session, e-Enterprise Center, Discovery Park, Purdue University, West Lafayette, Indiana, January 2003.

 

Research Grants

1.       A travel grant (from WMU) for The Fourth Intl. Workshop on Sensor Networks (SN 2011), and the Third International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2011), Minneapolis, Minnesota, Thursday, June 23, 2009. Functions included a paper presentation at SN, and chairing the SAHNS workshop.

2.       Opportunistic Resource Utilization Networks (Oppnets) for UAV Ad Hoc Networking, A. DeCarlo (PI, Infoscitex), L. Lilien (co-PI), and B. Bhargava (co-PI). Awarded by the U.S. Navy, STTR 10.A, 2010-2011.

3.       A travel grant from NSF for attending the NSF Workshop on the Future of Trustworthy Computing, National Science Foundation, Arlington, VA, 2010.

4.       A travel grant from The New Security Paradigms Workshop (NSPW 2010) for presentation of a paper on the Pervasive Trust Foundation for security in Next Generation Networks, NSPW 2010, Concord, Massachusetts, September 2010.

5.       A travel grant from NSF CISE for attending the NSF Future Internet  Architecture Summit, National Science Foundation, Arlington, Virginia, 12-15 October  2009.

6.       Vulnerability Analysis and Threat Assessment, Purdue University subcontract for the NSF award Vulnerability Analysis and Threat Assessment/Avoidance (L. Lilien was a co-PI for the NSF award), 2009.

7.       A travel grant (from IEEE/ICDCS conference and WMU) for the Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009), Montreal, Canada, Friday, June 26, 2009. Functions at the workshop included chairing the workshop; moderating its panel “Benefits and pitfalls of specialized ad hoc networks and systems;” and presentation under the same title at the panel.

8.       Using Oppnets for Emergency Applications, Faculty Research and Creative Activities Awards (FRACAA), Western Michigan University, 2009-2010.

9.       Oppnets: A New Paradigm for Opportunistic Resource Utilization, Visiting Faculty Research Program (VFRP), U.S. Air Force Research Lab, Rome, New York, May - August 2008.

10.    Opportunistic Networks for Emergency Applications, Research Development Award (RDA), Western Michigan University, February 2008.

11.    A travel grant (from WMU) for presentation of an invited paper on oppnets, the First Intl. Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007.

12.    Research start-up grant from the Dean, College of Engineering and Applied Sciences (CEAS), Western Michigan University, 2006.

·         Vulnerability Analysis and Threat Assessment/Avoidance, B. Bhargava (PI) and L. Lilien (co-PI).  Awarded by the National Science Foundation (NSF), 2003-2009.

 

 


[_Top_]            [_Summary_]  [_Research_]  [_Teaching_]  [_Other Professional Activities_] 


 

Teaching

Last update: 09 January 2014

 Academic Teaching

Western Michigan University

·         Graduate Courses:

1.       CS 6580—Pervasive Computing, Spring 2014

2.       CS 6700—Advanced Computer and Information Security, Fall 2013

3.       CS 6700—Advanced Computer and Information Security, Spring 2011

4.       CS 6030—Pervasive Computing, Spring 2010

5.       CS 6030—Advanced Computer and Information Security, Spring 2009

6.       CS 6030—Pervasive Computing, Fall 2008

7.       CS 6030—Advanced Computer and Information Security, Fall 2007

8.       CS 6910—Pervasive Computing, Spring 2007

9.       CS 6910—Advanced Computer and Information Security, Fall 2006

10.    CS 6030—Computer Security and Information Assurance, Spring 2006 (crosslisted as CS 5950)

11.    CS 6030—Network Security, Fall 2005 (crosslisted as CS 5950)

·         Undergraduate Courses:

1.       CS 1120—Computer Science II  (with Java), Spring 2014

2.       CS 1120—Computer Science II  (with Java), Spring 2012

3.       CS 5700—Computer Security and Information Assurance, Spring 2012

4.       CS 1120—Computer Science II  (with C#)–18:30 Section, Fall 2011

5.       CS 1120—Computer Science II  (with C#) –10:00 Section, Fall 2011

6.       CS 1120—Computer Science II  (with C#), Spring 2011

7.       CS 1120—Computer Science II  (with C#), Fall 2010

8.       CS 5700—Computer Security and Information Assurance, Fall 2010

9.       CS 1120—Computer Science II  (with C#), Spring 2010

10.    CS 1120—Computer Science II  (with C#), Fall 2009

11.    CS 5950—Computer Security and Information Assurance, Fall 2009

12.    CS 1120—Computer Science II  (with C#), Spring 2009

13.    CS 5950—Computer Security and Information Assurance, Fall 2008

14.    CS 1110—Computer Science I  (with C#), Spring 2008

15.    CS 5950—Computer Security and Information Assurance, Spring 2008

16.    CS 1120—Computer Science II  (with C#), Fall 2007

17.    CS 5950—Computer Security and Information Assurance, Spring 2007

18.    CS 1120—Computer Science II  (with C#), Fall 2006

19.    CS 5950—Computer Security and Information Assurance, Spring 2006 (crosslisted as CS 6030)

20.    CS 5950—Network Security, Fall 2005 (crosslisted as CS 6030)

 

University of Illinois at Chicago

·         Graduate courses: Database Management Systems (developed),  Distributed Computing Systems (developed), Advanced Database Systems (updated)

·         Undergraduate courses: Database Systems,File and Communication Systems, Computer Graphics I, Data Structures, Digital System Design, Microprocessors

 

Non-academic Instruction

·       IEEE Computer Society

Presenting tutorials on reliability and performance of distributed database systems.

·         AT&T Bell Labs, Naperville, Illinois

Co-trainer for the "Kelley-Caplan Productivity Enhancement Group" seminar.

 


[_Top_]            [_Summary_]  [_Research_]  [_Teaching_]  [_Other Professional Activities_] 


 

Other Professional Activities

Last update: 23 November 2012 

Membership in Professional and Research Organizations

·         Collaborator, Center for Science of Information (CSoI), Purdue University, 2010 -

·         Member, Medical/Bio Engineering Research Working Group, CEAS, WMU, 2009 –

·         Senior Member, Institute of Electrical and Electronics Engineers (IEEE) and IEEE Computer Society, 2005 -

·         Affiliated Faculty, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, 2002 -

 

Recent Service to Scientific Community

Journal Editorial Board Member

1.       International Journal of Computing and Digital Systems (IJCDS)

2.       International Journal of Computer Science: Theory, Technology and Applications (IJCS)

3.       International Journal of Next Generation Computing

4.       Journal of Wireless Mobile Networks, Ubiquitous Computing and Applications (JoWUA)

5.       International Journal of Communication Networks and Distributed Systems

6.       The Open Cybernetics & Systemics Journal

7.       Recent Patents on Computer Science

 

Conference/Workshop Organizer/Chair

1.       Technical Program Committee Co-Chair for the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012),  Irvine, California, October 2012.

2.       Organizer and Chair for The Third International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2011). Held in conjunction with the 31st IEEE International Conference on Distributed Computing Systems (ICDCS 2011); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Minneapolis, Minnesota, June 2011.

3.       Organizer and Chair for The Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009). Held in conjunction with the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Montreal, Canada, June 2009.

4.       Organizer and Chair for The First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007). Held in conjunction with the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007); sponsored by the IEEE Computer Society Technical Committee on Distributed Processing, Toronto, Canada, June 2007.

 

Other Conference Functions

1.       Workshops Co-Chair, 30th International Symposium on Reliable Distributed Systems, IEEE Computer Society, Madrid, Spain, October 4-7, 2011.

2.       Publicity Co-Chair, 29th International Symposium on Reliable Distributed Systems, IEEE Computer Society, Delhi, India, November 1-3, 2010.

3.       Publicity Co-Chair, 29th International Symposium on Reliable Distributed Systems, IEEE Computer Society, Delhi, India, November 1-3, 2010.

4.       Awards Co-Chair, 28th International Symposium on Reliable Distributed Systems, Niagara Falls, NY, September 27-30, 2009.

5.       Organizer and Moderator of the panel “Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS)” at the Second International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2009), Montreal, Canada, June 26, 2009.

6.       Organizing Committee Member, Workshop on Research Directions in Situational-aware Self-managed Proactive Computing in Wireless Adhoc Networks (including CRA-W Workshop on Pervasive Computing), St. Louis, Missouri, March 2-3, 2009.

7.       Session Chair, Session 1, The First International Workshop on Mobile and Ubiquitous Context Aware Systems and Applications  (MUBICA 2007), Philadelphia, Pennsylvania, August 6, 2007.

8.       Organizer and Moderator of the panel “Do we need specialized ad hoc networks and systems?” at the First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007), Toronto, Canada, June 29, 2007.

9.       Organizer and Moderator of the panel “Is Security without Trust Feasible?” at the 3rd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus'06), Kraków, Poland, September 2006.

10.    Session Chair, Session 4: Privacy Enhancing Technologies and Privacy Management, The 3rd International Conference on Trust and Privacy  in Digital Business (TrustBus’06), Krakow, Poland, September 6, 2006.

11.    Session Chair, Session 2B: Distributed Programming, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), San Juan, Puerto Rico, May 2003.

 

Technical Program Committee (TPC) Member at International Conferences

Over 45 international conferences since 2007.

 

Reviewer 

·         National Science Foundation programs, including Cyber Trust, Small Business Innovation Research, Database Management, and Distributed Systems and Compilers (2002 – 2007)

·         Foreign counterparts to the National Science foundation:

-        Switzerland: Swiss National Science Foundation (requested: May 2008)

-        Luxembourg: National Research Fund or FNR (requested: June 2008)

·         A number of journals, including IEEE Transactions on Instrumentation & Measurement (2008); International Journal of Computers and Applications (2008, 2005); IEEE Transactions on Systems, Man and Cybernetics (2005); International Journal of Cooperative Information Systems (2004); Automation in Construction (2004); IEEE Transactions on Mobile Computing (2003).

·         Numerous international and national conferences (not as a Technical Program Committee member), including International Conferences on Electronic Commerce and Web Technologies EC-Web (2005, 2004, 2003), IEEE INFOCOM 2005—The 24th Annual Conference (2005), IEEE PerCom (2004), International Conferences on Data Warehousing and Knowledge Discovery DaWaK (2004, 2003), IEEE ICDM Workshop on Foundations of Data Mining (2004), the Third Workshop on Applications and Services in Wireless Networks ASWN (2003)

·         A Springer Verlag book based on papers presented earlier at the Fourth IEEE ICDM (International Conference on Data Mining) Workshop on Foundations of Data Mining (at Brighton, UK, November 2004).

 


[_Top_]            [_Summary_]  [_Research_]  [_Teaching_]  [_Other Professional Activities_] 


 

Note: This page is not a complete record of L. Lilien’s work.                                  Last partial update: 09 January 2014