{"id":279,"date":"2020-06-16T17:54:35","date_gmt":"2020-06-16T17:54:35","guid":{"rendered":"https:\/\/in.nau.edu\/cybersecurity\/?page_id=279"},"modified":"2025-05-07T16:44:12","modified_gmt":"2025-05-07T16:44:12","slug":"our_team","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/cybersecurity\/our_team\/","title":{"rendered":"Our Team"},"content":{"rendered":"<h1 style=\"text-align: left;\">Cybersecurity Team<\/h1>\n<h2>Faculty<\/h2>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-277 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/05\/cambou_portrait-e1592328284780-138x186.png\" alt=\"\" width=\"280\" height=\"377\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Bertrand Cambou<\/h3>\n<p style=\"text-align: left;\">Professor<\/p>\n<p style=\"text-align: left;\">Department of Applied Physics and Materials Science<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong>\u00a0<a href=\"mailto:bertrand.cambou@nau.edu\">bertrand.cambou@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-short-banner-image-sm wp-image-576\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2024\/04\/MikeGowanlock3-150x186-1-150x116.jpg\" alt=\"\" width=\"150\" height=\"116\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Michael Gowanlock<\/h3>\n<p style=\"text-align: left;\">Assistant Professor<\/p>\n<p style=\"text-align: left;\">School of Informatics, Computing, and Cyber Systems<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:michael.gowanlock@nau.edu\">michael.gowanlock@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"size-landscape-image wp-image-290 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/Juliev4-299x348.png\" alt=\"\" width=\"299\" height=\"348\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Julie Heynssens<\/h3>\n<p style=\"text-align: left;\">Senior Lecturer<\/p>\n<p>Graduate Researcher (PhD)<\/p>\n<p style=\"text-align: left;\">School of Informatics, Computing, and Cyber Systems<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong>\u00a0<a href=\"mailto:julie.heynssens@nau.edu\">julie.heynssens@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-507 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2023\/01\/Photo-Tuy-Nguyen-150x225-1-150x186.jpg\" alt=\"\" width=\"280\" height=\"347\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Tuy Nguyen<\/h3>\n<div><strong>Assistant Professor<\/strong><\/div>\n<div><strong>Lab:<\/strong><span class=\"TextRun SCXW264808530 BCX9\" lang=\"en-us\" xml:lang=\"en-us\"><span class=\"NormalTextRun SCXW264808530 BCX9\"><a href=\"https:\/\/www.dsd-lab.com\/\">\u00a0Digital Systems Design Lab<\/a>\u00a0(DSD LAB)<\/span><\/span><\/div>\n<div><strong>Research interests:<\/strong>\u00a0<span class=\"TextRun SCXW108701228 BCX9\" lang=\"en-us\" xml:lang=\"en-us\"><span class=\"NormalTextRun SCXW108701228 BCX9\">Cryptography, Homomorphic Encryption, Hardware Security, System-on-Chip Design<\/span><span class=\"NormalTextRun SCXW108701228 BCX9\">\u202f<\/span><\/span><span class=\"EOP SCXW108701228 BCX9\">\u00a0<\/span><\/div>\n<div><a href=\"https:\/\/directory.nau.edu\/person\/tn537\">Contact<\/a><\/div>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-575 size-tall-banner-image-sm\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2024\/04\/BenLucas-200x186.jpg\" alt=\"\" width=\"200\" height=\"186\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3>Ben Lucas<\/h3>\n<div>\n<p style=\"text-align: left;\">Associate Professor<\/p>\n<p style=\"text-align: left;\">Department of Mathematics and Statistics<\/p>\n<p>Also associated with\nCollege of the Environment, Forestry, and Natural Sciences<\/p>\n<\/div>\n<p><a href=\"https:\/\/profile.directory.nau.edu\/person\/tn396\">Contact<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-586 size-landscape-image-lg\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2025\/05\/Dr.Taiwo_profile-pic-473x600.png\" alt=\"\" width=\"473\" height=\"600\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\"><span style=\"font-size: 16px;\">Olutosin Taiwo<\/span><\/h3>\n<div>\n<p>Assistant Teaching Professor<\/p>\n<p>School of Informatics, Computing, and Cyber Systems.<\/p>\n<p>Email: Olutosin.Taiwo@nau.edu<\/p>\n<p>Research Interest: Smart Home Automation, Smart Home Security, Security in Smart Cities, Secured Smart Healthcare Devices.<\/p>\n<\/div>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2>Staff<\/h2>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/IAN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-160 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/IAN-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Ian Burke<\/h3>\n<p style=\"text-align: left;\">Cybersecurity Lab Manager\/Electrical Engineer<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:Ian.Burke@nau.edu\">Ian.Burke@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<h2>PHD Graduates<\/h2>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-424 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/05\/Sareh3-464x348.jpg\" alt=\"Sareh Assiri\" width=\"383\" height=\"287\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Sareh Assiri<\/h3>\n<p style=\"text-align: left;\">Assistant Professor of Practice<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:sa2363@nau.edu\">sa2363@nau.edu<\/a><\/p>\n<p>M.Sc. in both Computer Science and Informatics. Currently a Ph.D student in the School of Informatics and Computing Cyber Systems at NAU. His research interests include Using nanotechnology- Physically Unclonable Function (PUF) for security purposes ( key exchange, keyless cryptography, authentication (password manager and management), and one-way encryption.)<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/DSC00905.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-165 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/DSC00905-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Mohammad Mohammadinodoushan<\/h3>\n<p style=\"text-align: left;\">PhD<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:mm3845@nau.edu\">mm3845@nau.edu<\/a><\/p>\n<p style=\"text-align: left;\"><!-- <a href=\"https:\/\/in.nau.edu\/cybersecurity\/mohammad-mohammadinodoushan\/\">Biography<\/a> -->M.Sc. degree in Electrical Engineering and is currently pursuing a Ph.D. in Informatics and Computing at NAU. His past research emphasis was on Renewable Energy Power Systems, including data mining and machine learning, intelligent control, and Power Electronics. His current research emphasis is on Cyber Engineering for Cyber Security, including statistics to circuits of memory PUFs, very novel password managers utilizing PUFs, as well as key generation, keyless encryption, and key exchange using PUFs.<\/p>\n<p style=\"text-align: left;\">\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-97 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Manuel Aguilar Rios<\/h3>\n<p style=\"text-align: left;\">PhD<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:maa778@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">maa778@nau.edu<\/a><\/p>\n<p>Design, characterization, and optimization of the electronic circuits driving ReRAM-based PUFs, and MRAM-based PUFs for the reference cell, cell pairing, and keyless protocols. Theoretical modeling and experimental validation of the parameters driving latencies, accuracies, and reliability of these circuits.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/Taylor.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-157 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/Taylor-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Taylor Begay<\/h3>\n<p style=\"text-align: left;\">PhD<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:tjb389@nau.edu\">tjb389@nau.edu<\/a><\/p>\n<p>Electrical characterization of the ReRAM with 1b boards, get statistically significant data base. Characterize and model the resistance values in the pre-forming range: BER, temperature and aging effect, entropy. Develop ways to sort out the vulnerable cell population. Develop ways to damage the cells.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-509 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2023\/01\/avitar-1-300x300-1-300x186.jpg\" alt=\"\" width=\"289\" height=\"179\" \/><\/p>\n<p>\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Christopher Philabaum<\/h3>\n<p style=\"text-align: left;\">Cyber Systems Specialist, Ph.D. in Informatics<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:christopher.philabaum@nau.edu\">christopher.philabaum@nau.edu<\/a><\/p>\n<p>Development, characterization of the implementation of lattice based cryptography for TAPKI\/RBC with ReRAM-based PUF. Back-to-back comparison with EC-DSA, and ECC based key encapsulation. Optimization of the architecture with distributed memory and multi-core such as multi-core, GPU, Associative memory.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-294 size-square-image alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/SaloniJain-e1592329868224-300x300.jpeg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/SaloniJain-e1592329868224-300x300.jpeg 300w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/SaloniJain-e1592329868224-150x150.jpeg 150w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/SaloniJain-e1592329868224-600x600.jpeg 600w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/SaloniJain-e1592329868224.jpeg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Saloni Jain<\/h3>\n<p style=\"text-align: left;\">PhD<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:sj779@nau.edu\">sj779@nau.edu<\/a><\/p>\n<p>My research involves developing cryptographic key protocols using MRAM and ReRAM. In addition to that, I am analyzing SRAM, ReRAM and MRAM PUFs(Physically Unclonable Functions) on how they behave at different temperatures and what their Bit Error Rates are. I am also working on protocols to generate True Random Numbers using these memristors, mainly focusing on MRAM at the moment. To protect these keys from being hacked by the intruders using reverse engineering of the protocols, we have developed a way to confuse the intruders and that is done by injecting noise. I have been progressively working on that too.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/Dina.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-154 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/Dina-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Dina Ghanai Miandoab<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (PhD)<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:dg856@nau.edu\">dg856@nau.edu<\/a><\/p>\n<p>Develop, characterize, and optimize various PQC algorithms for SRAM and ReRAM PUFs: lattice, multivariate. Theoretical modeling and experimental validation of the algorithm with benchmarking analysis. Study and propose optimization of ternary QKD architecture to reduce BER.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-97 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Ashwija Korenda<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (PhD)<\/p>\n<p style=\"text-align: left;\">Email:<a href=\"mailto:AshwijaKorenda@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">AshwijaKorenda@nau.edu<\/a><\/p>\n<p>Develop, characterize, and optimize error correcting schemes for TAPKI and ReRAM-based PUFs. Theoretical modeling and experimental validation of correcting scheme with optimization of the size of the helper, latencies, BERs, and computing power.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Students<\/h2>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-293 size-square-image alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-300x300.jpg 300w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-1024x1024.jpg 1024w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-150x150.jpg 150w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-768x768.jpg 768w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-1536x1536.jpg 1536w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett-600x600.jpg 600w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2020\/06\/LoganGarrett.jpg 1980w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Michael Logan Garrett<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (Masters)<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:mlg238@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">mlg238@nau.edu<\/a><\/p>\n<p>Characterization and optimization with NIST suite of test of several TRNG designs for various PUFs: SRAM, ReRAM, and MRAM. Theoretical modeling and experimental validation of session key generation in zero-trust environment. Evaluate RBC accelerator such as an Associative Memory for the protocol.<\/p>\n<p>\n<\/div>\n<\/div>\n<hr \/>\n<p>&nbsp;<\/p>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-97 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Morgan Riggs<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (PhD)<\/p>\n<p style=\"text-align: left;\"><strong>Email:<\/strong> <a href=\"mailto:bmr298@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">bmr298@nau.edu<\/a><\/p>\n<p>Physical characterization of the ReRAM cells (1a and 1b). Propose\/validate physical models explaining the cell to cell variations. Leverage outside resources working on radiation effects, and physical analysis. Study PUF-based protocol to protect QKD with teaching kit.<\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-square-image wp-image-97 alignleft\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2019\/11\/avitar-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/a>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Mahafujul Alam<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (PhD)<\/p>\n<p style=\"text-align: left;\">Email:<a href=\"mailto:ma3755@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">ma3755@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class='shortcode-column-container'><!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    \n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-landscape-image wp-image-582\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2025\/04\/Ruben_profile_pic-464x348.jpg\" alt=\"\" width=\"464\" height=\"348\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2025\/04\/Ruben_profile_pic-464x348.jpg 464w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2025\/04\/Ruben_profile_pic-232x174.jpg 232w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/>\n\n<\/div>\n\n<!-- shortcode-column -->\n<div class=\"shortcode-column shortcode-column--count-2\">\n    <\/p>\n<h3 style=\"text-align: left;\">Ruben Eduardo Montano Claure<\/h3>\n<p style=\"text-align: left;\">Graduate Researcher (PhD)<\/p>\n<p>Research interests :<\/p>\n<p>&#8211; Sensor Resilience in MEMS: Gyroscopes, Accelerometers, Magnetic Sensors, Magnetometers<\/p>\n<p>&#8211; Fingerprinting Sensors for Cryptographic Key Generation, Identification, and Authentication<\/p>\n<p>-Real-Time Systems, IoT, and CPS<\/p>\n<p style=\"text-align: left;\">Email:<a href=\"mailto:rm2297@nau.edu\" target=\"_blank\" rel=\"noopener noreferrer\">rm2297@nau.edu<\/a><\/p>\n<p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Team Faculty &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Staff &nbsp; &nbsp; &nbsp; PHD Graduates &nbsp; Students &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"author":543,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-279","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/543"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":40,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/279\/revisions"}],"predecessor-version":[{"id":585,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/279\/revisions\/585"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}