Institute of Information Assurance (IIA)
The Institute of Information Assurance (IIA) focuses on protecting the integrity and security of information and reducing the vulnerability of hardware and software systems to attacks.
IIA is a multidisciplinary Center of Academic Excellence led by Northeastern University‘s Khoury College of Computer Sciences, College of Engineering, and College of Social Sciences and Humanities.
Cyber attacks are a mounting threat to economic and national security. A multidisciplinary effort created in 2005, the IIA is a crucial part of Northeastern University’s commitment to advancing cyber security through research and education.
The IIA draws on talent and knowledge in three colleges at Northeastern:
- Khoury College of Computer Sciences
- College of Engineering Department of Electrical and Computer Engineering
- College of Social Sciences and Humanities
Faculty and students involved in the IIA help to ensure that the nation’s cyber infrastructure is robust, reliable, and secure. Their research and education contribute to Northeastern’s stature as a National Security Agency/Department of Homeland Security Center of Academic Excellence in Information Assurance Research and Education, and to its growing leadership in the area of cyber security.
IIA was funded by the National Science Foundation as part of the CyberCorps: Scholarship for Service program.
Big Data and Geospatial Computation, Machine Learning
Wireless networks; ad hoc networks; underwater and terrestrial sensor networking; protocol design and testing
Machine learning; data mining; statistical pattern recognition; computer vision and image processing
Hardware-oriented security, computer architecture, embedded systems, design automation, IoT and cyber physical systems
Distributed systems, networking, machine learning, big data, and privacy
Computer architecture; GPUs; heterogeneous computing; performance analysis; security and information assurance; hardware reliability and recovery; Big Data analytics; and workload characterization
Malware analysis and detection; web security; social network security; reverse engineering; intrusion detection
Software Engineering, Cognitive Radios, Information Integration and Fusion
Trustworthy computing architectures, web security, statistical machine learning for anomaly detection, malware analysis using adversarial program analysis, reverse engineering, intrusion detection
Error correcting codes; information theory; digital communications
Big Data and Geospatial Computation, Networks
Networking and systems for data-intensive engineering, science, health applications; caching, fog/edge computing, networked distributed learning; wireless network optimization, coding for low latency, network coding, polar codes; interdependent networks, cascading failure, information dissemination; network economics.