Misplaced Pages

Robert K. Cunningham: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 17:41, 26 September 2021 editUpitt-panther (talk | contribs)48 editsNo edit summary← Previous edit Revision as of 04:25, 29 September 2021 edit undoDGG (talk | contribs)316,874 edits Commenting on submission (AFCH 0.9.1)Next edit →
Line 1: Line 1:
{{AFC submission|||u=Upitt-panther|ns=118|ts=20210926174114}} <!-- Do not remove this line! -->
{{AFC submission|d|v|u=Upitt-panther|ns=118|decliner=Mikehawk10|declinets=20210922012815|ts=20210815161610}} <!-- Do not remove this line! --> {{AFC submission|d|v|u=Upitt-panther|ns=118|decliner=Mikehawk10|declinets=20210922012815|ts=20210815161610}} <!-- Do not remove this line! -->

{{AFC comment|1=The relevant standard is not whether there are third party sources to meet GNG. The relevant standard is WP:PROF., and that is normally met by showing the person to be influential in their subject as demonstrated by citations to their work.--but Fellow IEEE alone is enough to meet it.

Thelist of papers needs to be trimmed down--the top 5 is usual. ''']''' (]) 04:25, 29 September 2021 (UTC)}}


{{AFC comment|1=The individual described is most likely notable based off of the information in the article. However, atricles are required to have ] ] ] that cover the article subject in-depth. The sources that are independent of the article subject seem to give only trivial coverage. And, since this is a ], ] cannot be used in the article except in a ]. — ] (]) 01:28, 22 September 2021 (UTC)}} {{AFC comment|1=The individual described is most likely notable based off of the information in the article. However, atricles are required to have ] ] ] that cover the article subject in-depth. The sources that are independent of the article subject seem to give only trivial coverage. And, since this is a ], ] cannot be used in the article except in a ]. — ] (]) 01:28, 22 September 2021 (UTC)}}
Line 54: Line 59:


==Career== ==Career==
In 2021, Cunningham became the Vice Chancellor for Research Infrastructure<ref>{{Cite web|url=https://www.utimes.pitt.edu/news/cmu-official-named-vice|title=CMU official named vice chancellor for research infrastructure|website=utimes}}</ref> at the ], while maintaining connections to ].<ref>{{Cite web|url=https://www.cylab.cmu.edu/directory/bios/cunningham-rob.html|title=Rob Cunningham|website=www.cylab.cmu.edu}}</ref> He worked at the ] of ] from 2018 to 2021, and served as director of the Laboratory of Physical Science at the ] (2019–2020). Prior to this, he spent twenty-five years at the federally funded research laboratory ], where his efforts were critical to building their research in ].<ref>{{Cite web|last=Zissman|first=Marc A.|last2=Cunningham|first2=Robert K.|date=2016|title=Cyber Security Research at Lincoln Laboratory|url=https://www.ll.mit.edu/sites/default/files/page/doc/2018-05/22_1_1_Cunningham.pdf|url-status=live|access-date=15 August 2021|website=ll.mit.edu/}}</ref> While at the ], he helped promote the promise of quantum computing.<ref>{{Cite web|url=https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=525768|title=The Promise of Quantum Computing|website=resources.sei.cmu.edu}}</ref> In 2021, Cunningham became the Vice Chancellor for Research Infrastructure.<ref>{{Cite web|url=https://www.utimes.pitt.edu/news/cmu-official-named-vice|title=CMU official named vice chancellor for research infrastructure|website=utimes}}</ref> at the ], while maintaining connections to ].<ref>{{Cite web|url=https://www.cylab.cmu.edu/directory/bios/cunningham-rob.html|title=Rob Cunningham|website=www.cylab.cmu.edu}}</ref> He worked at the ] of ] from 2018 to 2021, and served as director of the Laboratory of Physical Science at the ] (2019–2020). Prior to this, he spent twenty-five years at the federally funded research laboratory ], where his efforts were critical to building their research in ].<ref>{{Cite web|last=Zissman|first=Marc A.|last2=Cunningham|first2=Robert K.|date=2016|title=Cyber Security Research at Lincoln Laboratory|url=https://www.ll.mit.edu/sites/default/files/page/doc/2018-05/22_1_1_Cunningham.pdf|url-status=live|access-date=15 August 2021|website=ll.mit.edu/}}</ref> While at the ], he helped promote the promise of quantum computing.<ref>{{Cite web|url=https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=525768|title=The Promise of Quantum Computing|website=resources.sei.cmu.edu}}</ref>


He has given his time to many professional endeavors (e.g.,<ref>{{Cite web|url=https://www.computer.org/csdl/proceedings-article/sp/2012/06234446/12OmNzt0IL3|title=CSDL &#124; IEEE Computer Society|website=www.computer.org}}</ref>), including serving as the Chair of the IEEE Cybersecurity Initiative<ref>{{Cite web|url=https://cybersecurity.ieee.org/|title=IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative|website=cybersecurity.ieee.org}}</ref> and co-founding (with Prof. Michael Hicks<ref>{{Cite web|url=https://www.umiacs.umd.edu/people/mwh|title=Mike Hicks &#124; UMIACS|website=www.umiacs.umd.edu}}</ref>) the ] Secure Development Conference (SECDEV).<ref>{{Cite web|url=https://secdev.ieee.org/2021/home/|title=Home - IEEE Secure Development Conference|website=secdev.ieee.org}}</ref> He has given his time to many professional endeavors (e.g.,<ref>{{Cite web|url=https://www.computer.org/csdl/proceedings-article/sp/2012/06234446/12OmNzt0IL3|title=CSDL &#124; IEEE Computer Society|website=www.computer.org}}</ref>), including serving as the Chair of the IEEE Cybersecurity Initiative<ref>{{Cite web|url=https://cybersecurity.ieee.org/|title=IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative|website=cybersecurity.ieee.org}}</ref> and co-founding (with Prof. Michael Hicks<ref>{{Cite web|url=https://www.umiacs.umd.edu/people/mwh|title=Mike Hicks &#124; UMIACS|website=www.umiacs.umd.edu}}</ref>) the ] Secure Development Conference (SECDEV).<ref>{{Cite web|url=https://secdev.ieee.org/2021/home/|title=Home - IEEE Secure Development Conference|website=secdev.ieee.org}}</ref>
Line 62: Line 67:


==Awards== ==Awards==
Dr. Cunningham is a Fellow of the ].<ref></ref><ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News &#124; Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham &#124; MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer<ref></ref>. Dr. Cunningham is a Fellow of the ].<ref></ref><ref>{{Cite web|url=https://news.mit.edu/2017/seven-from-mit-named-2017-ieee-fellows-0105|title=Seven from MIT are named 2017 IEEE Fellows|website=MIT News &#124; Massachusetts Institute of Technology}}</ref> In 2015, he received an MIT Excellence Award,<ref>{{Cite web|url=https://hr.mit.edu/rewards/recipient/award-recipients/2015/bringing-out-best/robert-k-cunningham|title=Robert K. Cunningham &#124; MIT Human Resources|website=hr.mit.edu}}</ref> Bringing out the Best, from the ]. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer<ref></ref>


== Personal life == == Personal life ==
Line 116: Line 121:
== References == == References ==
{{Reflist}} {{Reflist}}

{{AfC submission|||ts=20210926174114|u=Upitt-panther|ns=118}}

Revision as of 04:25, 29 September 2021

This article, Robert K. Cunningham, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author
This article, Robert K. Cunningham, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author
  • Comment: The relevant standard is not whether there are third party sources to meet GNG. The relevant standard is WP:PROF., and that is normally met by showing the person to be influential in their subject as demonstrated by citations to their work.--but Fellow IEEE alone is enough to meet it. Thelist of papers needs to be trimmed down--the top 5 is usual. DGG ( talk ) 04:25, 29 September 2021 (UTC)

Robert K Cunningham
Alma materBrown University, Boston University
SpouseBarbara Shinn-Cunningham
AwardsFellow IEEE
Scientific career
Fieldscomputer security, machine learning, electrical engineering
InstitutionsUniversity of Pittsburgh, Carnegie Mellon University, University of Maryland, Massachusetts Institute of Technology

Robert Kevin Cunningham (born 1963) is an American scientist and engineer.

Career

In 2021, Cunningham became the Vice Chancellor for Research Infrastructure. at the University of Pittsburgh, while maintaining connections to Carnegie Mellon University. He worked at the Software Engineering Institute of Carnegie Mellon University from 2018 to 2021, and served as director of the Laboratory of Physical Science at the University of Maryland (2019–2020). Prior to this, he spent twenty-five years at the federally funded research laboratory MIT Lincoln Laboratory, where his efforts were critical to building their research in computer security. While at the Software Engineering Institute, he helped promote the promise of quantum computing.

He has given his time to many professional endeavors (e.g.,), including serving as the Chair of the IEEE Cybersecurity Initiative and co-founding (with Prof. Michael Hicks) the IEEE Secure Development Conference (SECDEV).

Education

He earned an Sc.B. in Electrical Engineering from Brown University, which he attended from 1981-1985. He studied visual processes as well as artificial intelligence in the former Department of Cognitive and Neural Systems of Boston University, where he earned his Ph.D.

Awards

Dr. Cunningham is a Fellow of the IEEE. In 2015, he received an MIT Excellence Award, Bringing out the Best, from the Massachusetts Institute of Technology. In addition to organizing and reviewing for many conferences and publications, he served as an NSA Science of Security "Distinguished Expert" reviewer

Personal life

He is married to Barbara Shinn-Cunningham, with whom he has two sons (born in 1994 and 1996).

Selected publications

Dr. Cunningham has written broadly on computer security, covering multiple important topic areas. This section contains a sampling.

Measuring and Understanding Computer Security and Privacy

Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A., 2000, January. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00 (Vol. 2, pp. 12-26). IEEE.

Lippmann, R.P. and Cunningham, R.K., 1999. Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4), pp.579-595.

Pfleeger, S. and Cunningham, R., 2010. Why measuring security is hard. IEEE Security & Privacy, 8(4), pp.46-54.

Rossey, L.M., Cunningham, R.K., Fried, D.J., Rabek, J.C., Lippmann, R.P., Haines, J.W. and Zissman, M.A., 2002, March. LARIAT: Lincoln adaptable real-time information assurance testbed. In Proceedings, ieee aerospace conference (Vol. 6, pp. 6-6). IEEE.

Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J.D. and Cunningham, R.K., 2019. Don't Even Ask: Database Access Control through Query Control. ACM SIGMOD Record, 47(3), pp.17-22.

Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R. and Cunningham, R.K., 2016. SoK: Privacy on Mobile Devices-It's Complicated. Proc. Priv. Enhancing Technol., 2016(3), pp.96-116.

Weaver, N., Paxson, V., Staniford, S. and Cunningham, R., 2003, October. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode (pp. 11-18).

Yu, T.H., Fuller, B.W., Bannick, J.H., Rossey, L.M. and Cunningham, R.K., 2008. Integrated environment management for information operations testbeds. In VizSEC 2007 (pp. 67-83). Springer, Berlin, Heidelberg.

Zhivich, M. and Cunningham, R.K., 2009. The real cost of software errors. IEEE Security & Privacy, 7(2), pp.87-90.

Leveraging Static Analysis and Machine Learning for Computer Security

Boyer, S., Dain, O. and Cunningham, R., 2005, March. Stellar: A fusion system for scenario construction and security risk assessment. In Third IEEE International Workshop on Information Assurance (IWIA'05) (pp. 105-116). IEEE.

Cunningham, R.K., Lippmann, R.P., Kassay, D., Webster, S.E. and Zissman, M.A., 1999, November. Host-based bottleneck verification efficiently detects novel computer attacks. In IEEE Military Communications Conference Proceedings.

Khazan, R., Rabek, J., Lewandowski, S. and Cunningham, R., Massachusetts Institute of Technology, 2005. Technique for detecting executable malicious code using a combination of static and dynamic analyses. U.S. Patent Application 10/464,828.

Lippmann, R.P. and Cunningham, R.K., 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks, 34(4), pp.597-603.

Streilein, W.W., Cunningham, R.K. and Webster, S.E., 2001, June. Improved detection of low-profile probe and denial-of-service attacks. In Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection.

Cryptographically-protected search and computation

Fuller, B., Varia, M., Yerukhimovich, A., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J.D. and Cunningham, R.K., 2017, May. Sok: Cryptographically protected database search. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 172-191). IEEE.

Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A. and Cunningham, R.K., 2014, September. Computing on masked data: a high performance method for improving big data veracity. In 2014 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-6). IEEE.

Shen, E., Varia, M., Cunningham, R.K. and Vesey, W.K., 2015. Cryptographically secure computation. Computer, 48(4), pp.78-81.

Analysis Tools

Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M. and Cunningham, R., 2006, October. Validating and restoring defense in depth using attack graphs. In MILCOM 2006-2006 IEEE Military Communications Conference (pp. 1-10). IEEE.

Williams, T., Kelley, C., Bröker, H.B., Campbell, J., Cunningham, R., Denholm, D., Elber, E., Fearick, R., Grammes, C. and Hart, L., 2017. Gnuplot 4.6: An interactive plotting program, 2012. URL http://www. gnuplot. info, 56.

References

  1. "CMU official named vice chancellor for research infrastructure". utimes.
  2. "Rob Cunningham". www.cylab.cmu.edu.
  3. Zissman, Marc A.; Cunningham, Robert K. (2016). "Cyber Security Research at Lincoln Laboratory" (PDF). ll.mit.edu/. Retrieved 15 August 2021.{{cite web}}: CS1 maint: url-status (link)
  4. "The Promise of Quantum Computing". resources.sei.cmu.edu.
  5. "CSDL | IEEE Computer Society". www.computer.org.
  6. "IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative". cybersecurity.ieee.org.
  7. "Mike Hicks | UMIACS". www.umiacs.umd.edu.
  8. "Home - IEEE Secure Development Conference". secdev.ieee.org.
  9. IEEE Fellow Directory
  10. "Seven from MIT are named 2017 IEEE Fellows". MIT News | Massachusetts Institute of Technology.
  11. "Robert K. Cunningham | MIT Human Resources". hr.mit.edu.
  12. Science of Security Announcement
  13. "Brown Alumni Monthly Archives". archive.org.
Categories: