Chao-Hsien Chu, PhD
Dr. Chao-Hsien Chu's research includes information and cybersecurity (particularly wireless security, intrusion detection, security and risk management, and cyber forensics), intelligent technologies (expert systems, fuzzy modeling, neural networks, and genetic algorithms) and their applications in communication network design, data mining (e.g., bioinformatics and privacy preserving processing) and manufacturing systems design, supply chain management and integration, and information technology for manufacturing/operations management.
Chu has taught networking and telecommunications, computer and cyber forensics, wireless security, IT and systems integration, intelligent information processing; decision support systems (DSS); object-oriented systems analysis and design; enterprise resources planning (ERP); process reengineering; competitive manufacturing management, strategic quality management, and many others.
Peter Forster, PhD
Dr. Peter Forster is a senior lecturer in the College of IST and executive director of online education there. Dr. Forster's primary areas of interest are terrorism/counter-terrorism, risk and crisis management, international relations, and national security. He is a member of the NATO/OSCE Partnership for Peace Consortium's Counter-Terrorism Working Group, which brings academics and practitioners together to examine the global aspects of terrorism and its impact. He has been involved with Penn State's homeland security program since its inception, teaching courses on terrorism, crisis management, and homeland security-specific topics such as intelligence and inter-agency cooperation.
Prior to joining IST, he taught courses on international relations, war, and international relations of the Middle East. Dr. Forster served on the University's Homeland Security Council, the Homeland Security and Defense Education Consortium's sub-committee on curriculum development, the Department of Homeland Security Professional Development and Strategic Studies working group, and is Penn State's representative to the Naval Postgraduate School's University and Agency Partnership Initiative.
Peng Liu, PhD
Peng Liu's research interests include systems security and survivability, database systems, distributed systems, and peer-to-peer systems in the contexts of e-commerce, digital health care, digital government, command and control, digital infrastructure systems, and web and wireless applications. Dr. Liu is the co-author of the book Trusted Recovery and Defensive Information Warfare (Kluwer International Series on Advances in Information Security). Before joining Penn State, he was an assistant professor at the University of Maryland, Baltimore County.
Jungwoo Ryoo, PhD
Dr. Jungwoo Ryoo is associate professor of IST at the Penn State Altoona campus. He is the author of numerous academic articles and conducts extensive research in software security, network/cybersecurity, security management (particularly in the government and medical sector), software architectures, architecture description languages (ADLs), object-oriented software development, formal methods and requirements engineering. Many of Dr. Ryoo's research projects have been funded by both state and federal government agencies. He also has substantial industry experience in architecting and implementing secure, high-performance software for large-scale network management systems.
Dinghao Wu, PhD
Dr. Dinghao Wu is assistant professor of IST whose research is on software systems, including software security, analysis, verification, software engineering, and programming languages. He has worked on foundational proof-carrying code, typed assembly languages, program analysis, and software and systems security projects. His current projects include lock-free concurrent security monitoring, real-time concurrent information flow tracking, and semantics-based software plagiarism detection. He also leads a project on cloud computing for energy and environmental sustainability.
As a former employee of Microsoft, Dinghao worked on a number of influential and massively deployed program analysis and verification tools. His KISS work pioneered sequentialization, a program analysis and verification technique for checking concurrency properties using sequential program analysis, and has been followed by many researchers.