Vijay Bhuse, Ph. D.

Associate Professor and Program Chair Cybersecurity BS

School of Computing

Grand Valley State University

Office: D-2-224 MAK, Phone: (616) 331-4332, Email: bhusevij “at” gvsu.edu

 

EDUCATION

 

·      Postdoctoral Fellowship, ISTS, Dartmouth College, Advisor: Provost David Kotz, 2007.

·      Ph. D. in Computer Science, Western Michigan University, Advisor: Prof. Ajay Gupta, 2007.

·      B. Tech in Computer Science, DBATU, India, 2000.

           

CERTIFICATIONS

 

·      CompTIA Network+ (current)

·      CompTIA Security+ (current)

·      CCNA and Cisco Academy CCNA Instructor Trainer (expired)

 

PAST APPOINTMENTS

 

·      Assistant professor of computer Science (2013 - 2016), East Tennessee State University.

·      Network Security Instructor (2010-2013) ECPI University, Newport News, VA

·      Software Development Engineer (2009 - 2010), Parametric Technology Corp., R&D Pro-Engineer Product. Needham, MA.

·      Software Engineer (2007 - 2008), EFI Inc., Lebanon, NH.

·      Postdoctoral Fellow (2007 - 2007), Dartmouth College, Hanover, NH.

·      Graduate Teaching Instructor and Research Associate (2001-2007), Computer Science Department, Western Michigan University, Kalamazoo, MI.

 

RESEARCH INTERESTS

 

·      Intrusion Detection

·      Software Security

·      Wireless Sensor Networks


GRANTS

 

·      Administration of the research grant ($24617) as a PI from MLL Inc.

·      Networking equipment grant ($5000) from the Honors College, ETSU.

·      Laker intramural grant ($2000), GVSU

·      GenCyber 2024 participating (Sara Sutton PI)

 

If you are interested in joining a “Hackers Analyzing Threats” (HAT), a student club, related to Cybersecurity, let me know! Here is the link https://www.facebook.com/groups/gvsuhat/ and https://discord.com/invite/8ZVKvxVeRD

 

PUBLICATIONS

See Google Scholar for publications

1.     Bhuse, Vijay, & Gupta, A. (2006). Anomaly intrusion detection in wireless sensor networks. Journal of High-Speed Networks15(1), 33–51.

 

2.     Terwilliger, M., Gupta, A., Bhuse, V., Kamal, Z. H., & Salahuddin, M. A. (2004). A localization system using wireless network sensors: A comparison of two techniques. Proceedings of the First Workshop on Positioning, Navigation and Communication, 95–100.

 

3.     Lilien, L., Kamal, Z. H., Bhuse, V., & Gupta, A. (2007). The concept of opportunistic networks and their research challenges in privacy and security. Mobile and Wireless Network Security and Privacy, 85–117.

 

4.     Bhuse, V. S. (2007). Lightweight intrusion detection: A second line of defense for unguarded wireless sensor networks. Western Michigan University.

 

5.     Bhuse, Vijay, Gupta, A., & Al-Fuqaha, A. (2007). Detection of masquerade attacks on wireless sensor networks. 2007 IEEE International Conference on Communications, 1142–1147. IEEE.

 

6.     Kamal, Z. H., Salahuddin, M. A., Gupta, A., Terwilliger, M. G., Bhuse, V., & Beckmann, B. (2004). Analytical Analysis of Data and Decision Fusion in Sensor Networks. ESA/VLSI, 263–272.

 

7.     Bhuse, Vijay, Gupta, A., & Lilien, L. (2005). DPDSN: Detection of packet-dropping attacks for wireless sensor networks. Proc. Fourth Trusted Internet Workshop107.

 

8.     Bhuse, Vijay, Gupta, A., & Pidva, R. (2003). A distributed approach to security in sensornets2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No. 03CH37484)5, 3010–3014. IEEE.

 

9.     Bhuse, Vijay, Gupta, A., Terwilliger, M., Yang, Z., & Kamal, Z.-E.-H. (2004). Using routing data for Information authentication in sensor networks. 3rd International Trusted Internet Workshop, HiPC. Citeseer.

 

10.  Bhuse, Vijay, Gupta, A., & Lilien, L. (2006). Research challenges in lightweight intrusion detection for wireless sensor networks. 8th International Symposium on System and Information Security.

 

11.  Lilien, L., Kamal, Z. H., Gupta, A., Bhuse, V., & Yang, Z. (2006). Opportunistic networks. Kalamazoo: WesternMichigan University, Department of Computer Science.

 

12.  Revalla, M., Gupta, A., & Bhuse, V. (2013). On Providing User-Level Data Privacy in Cloud. International Conference on Cloud Security Management ICCSM 2013.

 

13.  Bhuse, V. (2011). How to Teach a Course That Leads to Certification. Faculty Focus: Higher Education Faculty and Staff Development.

 

14.  Ben Othmane, L., Bhuse, V., & Lilien, L. T. (2013). Incorporating lab experience into computer security courses. 2013 World Congress on Computer and Information Technology (WCCIT), 1–4. IEEE.

 

15.  Mao, Y., Bhuse, V., Zhou, Z., Pichappan, P., Abdel-Aty, M., & Hayafuji, Y. (2014). Applied mathematics and algorithms for cloud computing and iotMathematical Problems in Engineering, Vol. 2014. Hindawi.

 

16.  Hayafuji, Y., Xie, B., Bhuse, V., Abdel-Aty, M., Pichappan, P., Li, L., … Others. (n.d.). IEIT Journal of Adaptive & Dynamic Computing.

 

17.  Jung, C., Lee, S. J., & Bhuse, V. (2014). The minimum scheduling time for convergecast in wireless sensor networks. Algorithms7(1), 145–165.

 

18.  Sun, W., Zhang, G., Zhou, J., & Bhuse, V. (2014). Next-generation internet and communication. The Scientific World Journal, Vol. 2014. Hindawi.

 

19.  Bhuse, Vijay. (2014). Security and privacy challenges for healthcare records and wearable sensors in cloud. Transaction on IoT and Cloud Computing2(3), 11–17.

 

20.  Bhuse, Vijay. (2015). Information System Management with SNMP and Syslog. Appalachian Research in Business Symposium.

 

21.  Bhuse, Vijay. (2014). On Incorporating Security Concepts into a Networking Class. ACM Mid-Southeast Conference.

 

22.  Bhuse, Vijay. (2013). Syslog, SNMP. Cisco Academy Networking Conference.

 

23.  Son, J., Bhuse, V., Othmane, L. B., & Lilien, L. (2015). Incorporating Lab Experience into Computer Security Courses: Three Case Studies. Global Journal of Enterprise Information System7(2), 69–80.

 

24.  Lilien, L., Kamal, Z. H., Bhuse, V., & Gupta, A. (n.d.). Opportunistic Networks and Their Privacy and Security Challenges.

 

25.  Bhuse, Vijay, & Hekhuis, K. (2018). Support for Secure Code Execution in Server Operating Systems. ICCWS 2018 13th International Conference on Cyber Warfare and Security, 21. Academic Conferences and publishing limited.

 

26.  Bhuse, Vijay, & Nandigam, J. (2017). Support for Secure Code Execution in Unix-Like Operating Systems. ICMLG 2017 5th International Conference on Management Leadership and Governance, 40. Academic Conferences and publishing limited.

 

27.  El-Said, M., Bhuse, V., & Arendsen, A. (2017). An empirical study to investigate the effect of air density changes on the DSRC performance. Procedia Computer Science114, 523–530.

 

28.  Prins, K., & Bhuse, V. (2018). Forced vacation: A rouge switch detection technique. European Conference on Cyber Warfare and Security, 390–399. Academic Conferences International Limited.

 

29.  El-Said, M., Mansour, S., & Bhuse, V. (2018). DSRC based sensor-pooling protocol for connected vehicles in future smart cities. Procedia Computer Science140, 70–78.

 

30.  Bhuse, Vijay, & El-said, M. (2017). Alternative to layer-based networking instruction. Journal of Computing Sciences in Colleges33(1), 77–87.

 

31.  Sun W., Zhang G., Zhou J., Bhuse, V. (2014). Next-Generation Internet and Communication. The Scientific World Journal.

 

32.  Bhuse, Vijay, & Sinha, H. (2019). Secure Application for Health Monitoring. ECCWS 2019 18th European Conference on Cyber Warfare and Security, 31. Academic Conferences and publishing limited.

 

33.  Bhuse, Vijay, & James, V. (2020). Detecting a Rogue Switch using Network Automation. ECCWS 2020 19th European Conference on Cyber Warfare and Security, 26. Academic Conferences and publishing limited.

 

34.  Bhuse, Vijay, Kalafut, A., & Dohn, L. (2019). Detection of a Rogue Switch in a Local Area Network. The Fourteenth International Conference on Internet Monitoring and Protection. ICIMP.

 

35.  Quitiqut, T., & Bhuse, V. (2022). Utilizing Switch Port Link State to Detect Rogue Switches. International Conference on Cyber Warfare and Security17, 272–278.

 

36.  Bhuse, Vijay. (2023). Review of End-to-End Encryption for Social MediaInternational Conference on Cyber Warfare and Security18, 35–37.

 

37.  Son, J., Bhuse, V., Othmane, L. B., & Lilien, L. (2023). Lab Experience in Computer Security. Sustainable Business and IT, 129.

 

38.  Hazelip, J. C., Son, J., & Bhuse, V. (2023). Generalization of Secure Wearable Authentication through Self-Sovereign Identity and IoT Parallels. Pan-Pacific Journal of Business Research14(1), 1–21.

 

39.  Wang, X., Bhuse, V., & Sutton, S. (2023). Hands-on Activities for Digital Forensics Education. Proceedings of the 24th Annual Conference on Information Technology Education, 205–206.

 

40.  Hamouda, E., Son, J., Pannosian, G., & Bhuse, V. (2023). Data Dissemination and Policy Enforcement in Multi-Level Secure Multi-Domain Environments. Available at SSRN 4634523.

 

41.  Bhuse, Vijay, & Gupta, A. (2016). Security Issues in Solar-Powered Wireless Sensors. MERI-Journal of Management & IT, 1–4.