Hong Liu

Hong Liu, PhD

Professor

Electrical & Computer Engineering

508-999-8514

508-999-8489

hliu@umassd.edu

Science & Engineering 213D


Education

1990Polytechnic University, Brooklyn, NYPhD in Computer Science
1984Hefei Polytechnic University, ChinaMS in Computer Science
1982Hefei Polytechnic University, ChinaBS in Computer Science & Mathematics

Teaching

Programs

Teaching

Courses

Introduction to current networking methodologies. Backbone design, layered architecture, protocols, local and wide area networks, internetworking, broadband, electrical interface, and data transmission. Projects are included.

Introduction to current networking methodologies. Backbone design, layered architecture, protocols, local and wide area networks, internetworking, broadband, electrical interface, and data transmission. Projects are included.

Fundamentals and practices in information assurance (IA) and cyber defense (CD). This course covers threats in the cyber realm, design principles to create trustworthy systems, and security lifecycle. Topics include threat models, attack surface, social engineering, vulnerability identification, risk assessment, and fail secure system design. Hands-on exercises will demonstrate the interaction between security and system usability as well as the effects of security mechanisms in specific scenarios.

Fundamentals and practices in information assurance (IA) and cyber defense (CD). This course covers threats in the cyber realm, design principles to create trustworthy systems, and security lifecycle. Topics include threat models, attack surface, social engineering, vulnerability identification, risk assessment, and fail secure system design. Hands-on exercises will demonstrate the interaction between security and system usability as well as the effects of security mechanisms in specific scenarios.

Principles and practices of security in computer networks. This course covers the theoretical foundations of securing computer networks including cryptography and models. It steps through the practical process of defending networking resources. It also reveals various case studies, large and small, to familiarize the techniques that attackers use.

Fundamentals and practices in information assurance (IA) and cyber defense (CD). This course covers threats in the cyber realm, design principles to create trustworthy systems, and security lifecycle. Topics include threat models, attack surface, social engineering, vulnerability identification, risk assessment, and fail secure system design. Hands-on exercises will demonstrate the interaction between security and system usability as well as the effects of security mechanisms in specific scenarios.

Fundamentals and practices in information assurance (IA) and cyber defense (CD). This course covers threats in the cyber realm, design principles to create trustworthy systems, and security lifecycle. Topics include threat models, attack surface, social engineering, vulnerability identification, risk assessment, and fail secure system design. Hands-on exercises will demonstrate the interaction between security and system usability as well as the effects of security mechanisms in specific scenarios.

Principles and practices of security in computer networks. This course covers the theoretical foundations of securing computer networks including cryptography and models. It steps through the practical process of defending networking resources. It also reveals various case studies, large and small, to familiarize the techniques that attackers use. An Internet Testbed is facilitated for students to experiment attacks and defenses.

Operating system design and implementation using the specifics of current operating systems. The course covers file, process, memory and Input/Output management; multitasking, synchronization, and deadlocks; scheduling, and inter-process communication. Projects include team system's programming assignments to investigate the kernel interface, files, processes, and inter-process communication for a current operating system.

Research

Research Interests

  • Network security
  • Heterogeneous networks
  • Real-time network applications and quality-of-service management
  • Cyber-physical systems
  • Programming languages and compilers

Request edits to your profile