{"id":13,"date":"2017-07-07T20:21:07","date_gmt":"2017-07-07T20:21:07","guid":{"rendered":"http:\/\/utsaengineer.wpengine.com\/faculty-page-example\/?page_id=13"},"modified":"2025-08-29T14:03:38","modified_gmt":"2025-08-29T19:03:38","slug":"research","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<p>My research area is a mix of fundamental and applied aspects of cybersecurity. I serve as the Executive Director of the <a href=\"http:\/\/ics.utsa.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Institute for Cyber Security (ICS)<\/a> at UT San Antonio.<\/p>\n<p>I am currently interested in topics such as:<\/p>\n<p>(1) Utilizing machine learning techniques for the purpose of cybersecurity such as: malware detection and automating access control and administration,<\/p>\n<p>(2) Developing novel techniques for security and privacy enhanced machine learning,<\/p>\n<p>(3) Automated cyber threat intelligence sharing and response, and<\/p>\n<p>(4) Improving Android&#8217;s current permission model<\/p>\n<p>See the projects that I work on below.<\/p>\n<p>See my <a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\">publications<\/a>. Also, my <a href=\"http:\/\/scholar.google.com\/citations?user=cHjkxfUAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">Google Scholar Public Profile<\/a>.<\/p>\n<p><strong>Research Projects<\/strong><\/p>\n<p><strong>Current Projects:<\/strong><\/p>\n<ul>\n<li><em><em>Administration of Next Generation Access Control<br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Anthony Rios (Former Co-Principal Investigator: Ravi Sandhu)<br \/>\nSponsor: National Institute of Standards and Technology (NIST), 2023-2026<br \/>\n<\/em><\/em><\/p>\n<hr \/>\n<\/li>\n<li><em><em><em><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1736209\" target=\"_blank\" rel=\"noopener noreferrer\">CREST Center for Security and Privacy Enhanced Cloud Computing <\/a><\/em><em><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1736209\" target=\"_blank\" rel=\"noopener noreferrer\">(C-SPECC)<\/a><\/em><br \/>\nPrincipal Investigator: Ram Krishnan, (Former Principal Investigator: Ravi Sandhu)<br \/>\nCo-Principal Investigators: Nicole Beebe, Guadalupe Carmona, Jeff Prevost<br \/>\nSponsor: <a href=\"http:\/\/www.nsf.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Science Foundation<\/a>, 2017-2025<\/em><\/em><\/p>\n<hr \/>\n<\/li>\n<li><em><em>Machine Learning Based Access Control Applied to Insider Threat Mitigation<br \/>\nPrincipal Investigator: Ravi Sandhu<br \/>\nCo-Principal Investigator: Ram Krishnan<br \/>\nSponsor: Cisco Research, 2023-2024<\/em><\/em><\/p>\n<hr \/>\n<\/li>\n<li><em><em>Cross-Layer Adaptive Access Controls for Resilient Systems<br \/>\nPrincipal Investigator: Ravi Sandhu<br \/>\nCo-Principal Investigator: Ram Krishnan<br \/>\nSponsor: The MITRE Corporation, 2023<\/em><\/em><\/p>\n<hr \/>\n<\/li>\n<\/ul>\n<p><strong>Completed Projects:<\/strong><\/p>\n<ol>\n<li><em><em><em><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1553696&amp;HistoricalAwards=false\" target=\"_blank\" rel=\"noopener noreferrer\">CAREER: Group-Centric Secure Information Sharing &#8211; Models, Properties, and Implementation<\/a><\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nSponsor: <a href=\"http:\/\/www.nsf.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Science Foundation<\/a>, 2016-2022<\/em><\/em><\/p>\n<hr \/>\n<\/li>\n<li><em>Towards Multi-Tenancy Security Capabilities for Applications in Cloud Platforms<\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nKey Personnel: Ravi Sandhu<br \/>\nSponsor: <a href=\"http:\/\/www.arl.army.mil\/www\/default.cfm?page=29\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Army Research Office<\/a>, 2015-2019<\/p>\n<hr \/>\n<\/li>\n<li><em><a href=\"http:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1423481\" target=\"_blank\" rel=\"noopener noreferrer\">Attribute Based Access Control for Cloud Infrastructure as a Service<\/a><\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Ravi Sandhu<br \/>\nSponsor: <a href=\"http:\/\/www.nsf.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Science Foundation<\/a>, 2014-2018<\/p>\n<hr \/>\n<\/li>\n<li><em>Identity and Access Control in the Physical and Virtual Internet of Things<\/em><br \/>\nPrincipal Investigator: Ravi Sandhu<br \/>\nCo-Principal Investigator: Ram Krishnan<br \/>\nSponsor: <a href=\"http:\/\/www.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">The MITRE Corporation<\/a> and <a href=\"http:\/\/www.umd.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">The University of Maryland<\/a>, 2016<\/p>\n<hr \/>\n<\/li>\n<li><em>Design and Implementation of Cybersecurity Risk Metrics for Cloud Based IT Infrastructure<\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Ravi Sandhu<br \/>\nSponsor: <a href=\"http:\/\/www.lmi.org\" target=\"_blank\" rel=\"noopener noreferrer\">LMI Research Institute<\/a>, 2015-2016<\/p>\n<hr \/>\n<\/li>\n<li><em>Enhancing Situational Awareness for Emergency Response Using Social Media Provenance<\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Jae Park<br \/>\nSponsor: <a href=\"http:\/\/www.lmi.org\" target=\"_blank\" rel=\"noopener noreferrer\">LMI Research Institute<\/a> , 2014-2015<\/p>\n<hr \/>\n<\/li>\n<li><em>Secure Information Sharing Models for Cyber Response Teams<\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Ravi Sandhu<br \/>\nSponsor: <a href=\"http:\/\/www.lmi.org\" target=\"_blank\" rel=\"noopener noreferrer\">LMI Research Institute<\/a>, 2013-2014<\/p>\n<hr \/>\n<\/li>\n<li><em>Design of a Curriculum on Building Security Services in the Cloud<\/em><br \/>\nPrincipal Investigator: Ram Krishnan<br \/>\nCo-Principal Investigator: Ravi Sandhu<br \/>\nSponsor: Intel Corporation, 2013-2014<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>My research area is a mix of fundamental and applied aspects of cybersecurity. I serve as the Executive Director of the Institute for Cyber Security (ICS) at UT San Antonio. I am currently interested in topics such as: (1) Utilizing machine learning techniques for the purpose of cybersecurity such as: malware detection and automating access &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Research&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":87,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-13","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research - Ram Krishnan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research - Ram Krishnan\" \/>\n<meta property=\"og:description\" content=\"My research area is a mix of fundamental and applied aspects of cybersecurity. I serve as the Executive Director of the Institute for Cyber Security (ICS) at UT San Antonio. I am currently interested in topics such as: (1) Utilizing machine learning techniques for the purpose of cybersecurity such as: malware detection and automating access &hellip; Continue reading &quot;Research&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/\" \/>\n<meta property=\"og:site_name\" content=\"Ram Krishnan\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T19:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2017\/07\/utsa-orange-bar.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/\",\"name\":\"Research - Ram Krishnan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2017\\\/07\\\/utsa-orange-bar.jpg\",\"datePublished\":\"2017-07-07T20:21:07+00:00\",\"dateModified\":\"2025-08-29T19:03:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2017\\\/07\\\/utsa-orange-bar.jpg\",\"contentUrl\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/wp-content\\\/uploads\\\/sites\\\/27\\\/2017\\\/07\\\/utsa-orange-bar.jpg\",\"width\":1920,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\",\"name\":\"Ram Krishnan\",\"description\":\"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research - Ram Krishnan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/","og_locale":"en_US","og_type":"article","og_title":"Research - Ram Krishnan","og_description":"My research area is a mix of fundamental and applied aspects of cybersecurity. I serve as the Executive Director of the Institute for Cyber Security (ICS) at UT San Antonio. I am currently interested in topics such as: (1) Utilizing machine learning techniques for the purpose of cybersecurity such as: malware detection and automating access &hellip; Continue reading \"Research\"","og_url":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/","og_site_name":"Ram Krishnan","article_modified_time":"2025-08-29T19:03:38+00:00","og_image":[{"width":1920,"height":500,"url":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2017\/07\/utsa-orange-bar.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/","name":"Research - Ram Krishnan","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/#primaryimage"},"image":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/#primaryimage"},"thumbnailUrl":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2017\/07\/utsa-orange-bar.jpg","datePublished":"2017-07-07T20:21:07+00:00","dateModified":"2025-08-29T19:03:38+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/rkrishnan\/research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/#primaryimage","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2017\/07\/utsa-orange-bar.jpg","contentUrl":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-content\/uploads\/sites\/27\/2017\/07\/utsa-orange-bar.jpg","width":1920,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/"},{"@type":"ListItem","position":2,"name":"Research"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/","name":"Ram Krishnan","description":"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/rkrishnan\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media\/87"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}