Xin-Wen Wu, Ph.D., is a faculty member of Computer Science at University of Mary Washington. He has spent over twenty years in academia as an educator and researcher.
His research interests include theoretical and applied aspects of cybersecurity, and intersection of artificial intelligence and security. He published three books and over a hundred research papers in these and related areas.
He taught numerous subjects in computer science and cybersecurity. Currently, he teaches Introduction to Computer Science, Advanced Cybersecurity, Network Security, and Individual Study in Cybersecurity.
This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined.
Puts forward a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks.
Includes a number of algorithms on multi-aspect anomaly detection in sensor networks.
Presents several algorithms on mobile agent transmission optimization in resource constrained sensor networks.
Highlights an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes.
Offers a detailed Petri Net-based formal modeling and analysis of the proposed system.
Includes an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization.