Vijay Bhuse, Ph. D.
Associate
Professor and Program Chair Cybersecurity BS
School of Computing
Grand Valley State
University
Office:
D-2-224 MAK, Phone: (616) 331-4332, Email: bhusevij “at”
gvsu.edu
EDUCATION
· Postdoctoral
Fellowship, ISTS, Dartmouth College, Advisor: Provost David Kotz,
2007.
· Ph. D. in
Computer Science, Western Michigan University, Advisor: Prof. Ajay Gupta, 2007.
· B. Tech
in Computer Science, DBATU, India, 2000.
CERTIFICATIONS
· CompTIA
Network+ (current)
· CompTIA
Security+ (current)
· CCNA and
Cisco Academy CCNA Instructor Trainer (expired)
PAST APPOINTMENTS
· Assistant
professor of computer Science (2013 - 2016), East Tennessee State University.
· Network Security
Instructor (2010-2013) ECPI University, Newport News, VA
· Software
Development Engineer (2009 - 2010), Parametric Technology Corp., R&D
Pro-Engineer Product. Needham, MA.
· Software
Engineer (2007 - 2008), EFI Inc., Lebanon, NH.
· Postdoctoral
Fellow (2007 - 2007), Dartmouth College, Hanover, NH.
· Graduate
Teaching Instructor and Research Associate (2001-2007), Computer Science
Department, Western Michigan University, Kalamazoo, MI.
RESEARCH INTERESTS
· Intrusion
Detection
· Software
Security
· Wireless
Sensor Networks
GRANTS
· Administration
of the research grant ($24617) as a PI from MLL Inc.
· Networking
equipment grant ($5000) from the Honors College, ETSU.
· Laker
intramural grant ($2000), GVSU
· GenCyber 2024 participating (Sara
Sutton PI)
If you are interested in
joining a “Hackers Analyzing Threats” (HAT), a student club, related to
Cybersecurity, let me know! Here is the link https://www.facebook.com/groups/gvsuhat/ and https://discord.com/invite/8ZVKvxVeRD
PUBLICATIONS
See Google Scholar for publications
1.
Bhuse, Vijay, & Gupta, A. (2006). Anomaly intrusion
detection in wireless sensor networks. Journal of High-Speed Networks, 15(1), 33–51.
2.
Terwilliger, M., Gupta, A., Bhuse, V., Kamal, Z. H., &
Salahuddin, M. A. (2004). A localization system using wireless network sensors:
A comparison of two techniques. Proceedings of the First
Workshop on Positioning, Navigation and Communication, 95–100.
3.
Lilien, L., Kamal, Z. H.,
Bhuse, V., & Gupta, A. (2007). The concept of opportunistic networks and
their research challenges in privacy and security. Mobile
and Wireless Network Security and Privacy, 85–117.
4.
Bhuse, V. S. (2007). Lightweight intrusion
detection: A second line of defense for unguarded wireless sensor networks.
Western Michigan University.
5.
Bhuse, Vijay, Gupta, A., & Al-Fuqaha, A. (2007).
Detection of masquerade attacks on wireless sensor networks. 2007 IEEE International Conference on Communications,
1142–1147. IEEE.
6.
Kamal, Z. H., Salahuddin, M. A., Gupta, A., Terwilliger, M.
G., Bhuse, V., & Beckmann, B. (2004). Analytical Analysis of Data and
Decision Fusion in Sensor Networks. ESA/VLSI, 263–272.
7.
Bhuse, Vijay, Gupta, A., & Lilien,
L. (2005). DPDSN: Detection of packet-dropping attacks for wireless sensor
networks. Proc. Fourth Trusted Internet Workshop, 107.
8.
Bhuse, Vijay, Gupta, A., & Pidva,
R. (2003). A distributed approach to security in sensornets. 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall
(IEEE Cat. No. 03CH37484), 5, 3010–3014. IEEE.
9.
Bhuse, Vijay, Gupta, A., Terwilliger, M., Yang, Z., &
Kamal, Z.-E.-H. (2004). Using routing data for Information authentication in
sensor networks. 3rd International Trusted Internet Workshop, HiPC. Citeseer.
10.
Bhuse, Vijay, Gupta, A., & Lilien,
L. (2006). Research challenges in lightweight intrusion detection for wireless
sensor networks. 8th International Symposium on System and
Information Security.
11.
Lilien, L., Kamal, Z. H.,
Gupta, A., Bhuse, V., & Yang, Z. (2006). Opportunistic networks. Kalamazoo: WesternMichigan University,
Department of Computer Science.
12.
Revalla, M., Gupta, A., &
Bhuse, V. (2013). On Providing User-Level Data Privacy in Cloud. International Conference on Cloud Security Management ICCSM 2013.
13.
Bhuse, V. (2011). How to Teach a Course That Leads to
Certification. Faculty Focus: Higher Education Faculty and
Staff Development.
14.
Ben Othmane, L., Bhuse, V., &
Lilien, L. T. (2013). Incorporating lab experience
into computer security courses. 2013 World Congress on Computer
and Information Technology (WCCIT), 1–4. IEEE.
15.
Mao, Y., Bhuse, V., Zhou, Z., Pichappan,
P., Abdel-Aty, M., & Hayafuji,
Y. (2014). Applied mathematics and algorithms for cloud computing and iot. Mathematical Problems in
Engineering, Vol. 2014. Hindawi.
16.
Hayafuji, Y., Xie, B., Bhuse, V., Abdel-Aty,
M., Pichappan, P., Li, L., … Others. (n.d.). IEIT Journal of Adaptive & Dynamic Computing.
17.
Jung, C., Lee, S. J., & Bhuse, V. (2014). The minimum
scheduling time for convergecast in wireless sensor
networks. Algorithms, 7(1), 145–165.
18.
Sun, W., Zhang, G., Zhou, J., & Bhuse, V. (2014).
Next-generation internet and communication. The Scientific World Journal,
Vol. 2014. Hindawi.
19.
Bhuse, Vijay. (2014). Security and privacy challenges for
healthcare records and wearable sensors in cloud. Transaction
on IoT and Cloud Computing, 2(3), 11–17.
20.
Bhuse, Vijay. (2015). Information System Management with
SNMP and Syslog. Appalachian Research in Business Symposium.
21.
Bhuse, Vijay. (2014). On Incorporating Security Concepts
into a Networking Class. ACM Mid-Southeast Conference.
22.
Bhuse, Vijay. (2013). Syslog, SNMP. Cisco Academy Networking Conference.
23.
Son, J., Bhuse, V., Othmane, L.
B., & Lilien, L. (2015). Incorporating Lab
Experience into Computer Security Courses: Three Case Studies. Global Journal of Enterprise Information System, 7(2), 69–80.
24.
Lilien, L., Kamal, Z. H.,
Bhuse, V., & Gupta, A. (n.d.). Opportunistic Networks and
Their Privacy and Security Challenges.
25.
Bhuse, Vijay, & Hekhuis, K.
(2018). Support for Secure Code Execution in Server Operating Systems. ICCWS 2018 13th International Conference on Cyber Warfare and
Security, 21. Academic Conferences and publishing limited.
26.
Bhuse, Vijay, & Nandigam, J.
(2017). Support for Secure Code Execution in Unix-Like Operating Systems. ICMLG 2017 5th International Conference on Management Leadership
and Governance, 40. Academic Conferences and publishing limited.
27.
El-Said, M., Bhuse, V., & Arendsen,
A. (2017). An empirical study to investigate the effect of air density changes
on the DSRC performance. Procedia Computer Science, 114, 523–530.
28.
Prins, K., & Bhuse, V.
(2018). Forced vacation: A rouge switch detection technique. European Conference on Cyber Warfare and Security, 390–399.
Academic Conferences International Limited.
29.
El-Said, M., Mansour, S., & Bhuse, V. (2018). DSRC
based sensor-pooling protocol for connected vehicles in future smart
cities. Procedia Computer Science, 140, 70–78.
30.
Bhuse, Vijay, & El-said, M. (2017). Alternative to
layer-based networking instruction. Journal of Computing Sciences
in Colleges, 33(1), 77–87.
31.
Sun W., Zhang G., Zhou J., Bhuse, V. (2014). Next-Generation Internet and
Communication. The Scientific World Journal.
32.
Bhuse, Vijay, & Sinha, H. (2019). Secure Application
for Health Monitoring. ECCWS 2019 18th European
Conference on Cyber Warfare and Security, 31. Academic Conferences and
publishing limited.
33.
Bhuse, Vijay, & James, V. (2020). Detecting a Rogue
Switch using Network Automation. ECCWS 2020 19th European
Conference on Cyber Warfare and Security, 26. Academic Conferences and
publishing limited.
34.
Bhuse, Vijay, Kalafut, A., & Dohn,
L. (2019). Detection of a Rogue Switch in a Local Area Network. The Fourteenth International Conference on Internet Monitoring and
Protection. ICIMP.
35.
Quitiqut, T., & Bhuse, V.
(2022). Utilizing Switch Port Link State to Detect Rogue Switches. International Conference on Cyber Warfare and Security, 17, 272–278.
36.
Bhuse, Vijay. (2023). Review of End-to-End Encryption for Social Media. International Conference on
Cyber Warfare and Security, 18, 35–37.
37.
Son, J., Bhuse, V., Othmane, L.
B., & Lilien, L. (2023). Lab Experience in
Computer Security. Sustainable Business and IT, 129.
38.
Hazelip, J. C., Son, J., &
Bhuse, V. (2023). Generalization of Secure Wearable Authentication through
Self-Sovereign Identity and IoT Parallels. Pan-Pacific Journal of Business
Research, 14(1), 1–21.
39.
Wang, X., Bhuse, V., & Sutton, S. (2023). Hands-on
Activities for Digital Forensics Education. Proceedings of the 24th Annual
Conference on Information Technology Education, 205–206.
40.
Hamouda, E., Son, J., Pannosian, G., & Bhuse, V. (2023). Data Dissemination
and Policy Enforcement in Multi-Level Secure Multi-Domain Environments. Available at SSRN 4634523.
41.
Bhuse, Vijay, & Gupta, A. (2016). Security Issues in
Solar-Powered Wireless Sensors. MERI-Journal of Management
& IT, 1–4.