Naval Postgraduate School
Calendar | Directory
banner
Computer Science Department Faculty

See openings for faculty positions.

 

Faculty MemberTitleDegree InfoResearch
Allen, BruceFaculty Associate Research  
Ateshian, PeterFaculty Associate Research  
Auguston, MikhailAssociate ProfessorPh.D., Glushkov Cybernetics Institute, 1983Software Engineering, Programming Languages, Compiler Construction, Testing and Debugging Automation, Visual Programming, Computer Security
Berzins, ValdisProfessorPh.D., Massachusetts Institute of Technology, 1979Software Engineering, Computer Aided Design, Software Evolution and Merging, Specification Languages, Computer Languages, Program Synthesis and Verification, Knowledge Representation, Engineering Databases
Beverly, RobertAssistant ProfessorPh.D., Massachusetts Institute of Technology, 2008Network architecture, systems engineering, Internet measurement, and complex systems. Intersection of networks and machine learning.
Burke, KarenResearch Associate ProfessorMS, Southern Illinois University, 1979Information Assurance, Government policy
Clark, PaulFaculty Research AssociateMS, Naval Postgraduate School, 1999Computer Security Education, Modification of Open Source Operating Systems
Coté, ScottSenior LecturerMS, Naval Postgraduate School, 2000Network design and integration, wireless networking, network security and robotics.
Darken, ChrisAssociate ProfessorPh.D., Yale University, 1993Artificial intelligence, machine learning, and human cognition and behavior models for simulations
Darken, RudyProfessor
DSc, George Washington University, 1995Virtual environments, Human-computer interaction, Human factors, Training systems, Wireless mobile computing
Das, ArijitFaculty Research AssociateMS, University of Nevada, 1989Mobile Devices, Pocket PC, PALM, embedded C, J2ME, Java
Denning, Peter J.Chair, Department of Computer Sciences, Director of the Cebrowski Institute and ProfessorPh.D., Massachusetts Institute of Technology, 1968Technology and transformation, Networking in network centric operations
Dinolt, George W.Professor of Practice, Cyber OperationsPh.D., University of Wisconsin-Madison, 1971Formal Methods, Computer Security
Drusinsky, DoronAssociate ProfessorPh.D., Weizmann Institute of Science, Rehovot, Israel, 1988Harel statecharts, UML, Verification, Formal Methods, Software Testing, Run time Verification, Temporal Pattern Matching, Automatic Test Generation, Real Time Model Checking, Real Time, Low Impact, On-line business rule and security checking, Temporal Logic, Metric Temporal Logic, Probabilistic Temporal Logic, Extended Regular Expressions, Visualization, Programming Applications of Formal Methods, Knowledge models, Temporal Intrusion Pattern Detection
Eagle, ChrisSenior LecturerMS, Naval Postgraduate School, 1995Computer Network Attack/Defense/Exploitation, Computer Forensics, Reverse Engineering.
Fulp, John D. (JD)Senior LecturerMS, Naval Postgraduate School, 1996Implementation of Public Key Infrastructure, Design of Secure Networks
Garfinkel, Simson L.Associate ProfessorPh.D., Massachusetts Institute of TechnologyComputer forensics, the emerging field of usability & security, privacy technology, information policy, and personal information management
Gibson, John H.Faculty Research AssociateMS, Naval Postgraduate School, 1990 and 2000Computer networks (especially under extremely harsh environments, such as shallow water acoustic communications or mobile, low-power, ad hoc networks in support of battlefield operations)
Gondree, MarkResearch Assistant Professor  
Huffmire, TedAssistant ProfessorPh.D., UC Santa Barbara, 2007Computer Architecture, Computer Security
Irvine, Cynthia E.Distinguished Professor and Director of the Center for Information Systems Security Studies and Research (CISR).Ph.D., Case Western University, 1975Information Assurance, Multilevel Security, High Assurance Security Engineering, Network Security, Security Models, Distributed Systems Security, Security Requirements Engineering, Information Assurance Pedagogy, Systems Architecture
Khosalim, JeanFaculty Associate Research  
Kölsch, Mathias N.Associate ProfessorPh.D., University of California, Santa Barbara, 2004Computer Vision; Virtual & Augmented Reality, Video Analytics, Artificial Intelligence
Lundy, G.M.Associate ProfessorPh.D., Georgia Institute of Technology, 1988Computer networks, Telecommunications networks, Internetworking, Network security, Formal specification, Analysis, Testing and simulation of computer network protocols, High speed networks, Application of networks
LuqiProfessorPh.D., University of Minnesota, 1986Cyber and Cyber-Physical Systems, Social Context Modeling for Cyber, Big and Intensive Data Processing, Real-Time Monitoring for Network Based Systems, Detection Software for Insider Threat, Cyber-Physical Systems Security and Safety, Model Based System and Software Risk Analysis, Documentation Process Automation, Unified Hardware/Software Architecture, Metrics, Testing and Problem Solving in Rapid Prototyping
Martell, CraigAssociate  ProfessorPh.D., University of Pennsylvania, 2004Machine Learning, Natural Language Processing
McCarrin, MichaelFaculty Research Associate  
McGhee, Robert B.Professor EmeritusPh.D., University of Southern California, 1963Military Robotics, Computer Architecture, Computer Graphics
McMullen, EricLCDR, USN, Program Officer, Military FacultyMS, Naval Postgraduate School, 2013Human Factors in Simulation, Supervisory Control of UAVs
Michael, BretProfessorPh.D., George Mason University, 1993Trustworthy and dependable distributed systems, cloud and mobile device computing.
Nguyen, Thuy D.Faculty Research AssociateBA, University of California –San Diego, 1982Advanced Topics in Computer Security, Trusted Operating Systems and Kernels, Multilevel Security Applications, Common Criteria Evaluation for High Robustness Systems, Secure Web Services
Otani, Thomas W.Associate ProfessorPh.D., University of California, San Diego, 1983Object-Oriented Modeling, Visual Query Languages, Software Development for Mobile Devices, Computer Science Education
Peitso, LorenSenior Lecturer and Associate Chair for AdministrationMS, Naval Postgraduate School, 2002Artificial Intelligence and learning methods, physically based simulation for uses in virtual environments, training and robotics
Prince, CharlesFaculty Research AssociateBS, Oregon State University 1987, 1994, 1994Mobile Devices, Network, Security, Embedded Devices
Richer, MarkFaculty Associate Research  
Rohrer, JustinResearch Assistant ProfessorPh.D., The University of Kansas, 2011Mobile wireless networks, disruption-tolerant networks (DTNs), software-defined networks, network resilience and survivability
Rowe, Neil C.ProfessorPh.D., Stanford University, 1983.Applied Artificial Intelligence
Shaffer, AlanCDR, USN, Assistant Professor and Associate Chair for AcademicsPh.D., Naval Postgraduate School, 2008Information Assurance, High Assurance System Engineering, Secure systems development and verification
Shifflett, DavidFaculty Research AssociateBS, California State University, Northridge, 1985Multi-Level Security, High Assurance Computing/Systems, Trusted Networking
Shing, Man-TakAssociate Professor, Associate Chair of Academic AffairsPh.D., University of California at San Diego, 1981Software Engineering, Real-Time Systems Modeling and Scheduling, Software Architectures for embedded and distributed systems, Computer-Aided Prototyping, Software Re-engineering, Engineering Automation for Computer Based System
Singh, GurminderProfessor and Director of the Center for the Study of Mobile Devices and Communications (2002)Ph.D., University of Alberta, Canada, 1989Wireless Mobile Computing, Mobile Devices, Wireless Data Services
Thompson, MikeFaculty Associate ResearchBS, Marquette University, 1981Network security simulation based educational games, high assurance multilevel security, software vulnerability analysis tools
Volpano, Dennis M.Associate ProfessorPh.D., Oregon Graduate Institute, 1986Programming Languages, Type Systems, Program Security
Xie, GeoffreyProfessor and Associate ChairPh.D., University of Texas at Austin, 1996Network design, configuration, analysis, and validation; Tactical and disruption tolerant networks; Secure handhelds and seamless mobility; Underwater acoustic networks
Young, JoelAssistant ProfessorPh.D., Brown University, 2004Machine Learning

This is an official U.S. Navy website.
All information contained herein has been approved for release by the NPS Public Affairs Officer.
Page Last Updated: Oct 30, 2014 4:15:12 AM | Contact the Webmaster