{"id":209,"date":"2017-08-10T14:41:32","date_gmt":"2017-08-10T19:41:32","guid":{"rendered":"http:\/\/utsaengineer.wpengine.com\/rkrishnan\/?page_id=209"},"modified":"2025-08-29T14:05:08","modified_gmt":"2025-08-29T19:05:08","slug":"prospective-students","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/","title":{"rendered":"Prospective Students"},"content":{"rendered":"<hr \/>\n<p>The <a href=\"http:\/\/ics.utsa.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Institute for Cyber Security (ICS)<\/a> conducts research in fundamental and applied aspects of cybersecurity. In particular, ICS members work on machine learning security and privacy, malware detection using machine learning techniques and foundational aspects of authorization in information systems in the context of technology domains such as Cloud Computing, Internet of Things, Mobile Computing and Social Computing. ICS projects are supported by funding from the National Science Foundation, the Department of Defense, and the industry.<\/p>\n<p>Research assistantships are available for <strong><u>highly motivated<\/u><\/strong> students committed to pursue a PhD degree in the field of computer security. At times, ICS may have positions open for students pursuing an MS degree with a thesis option. Students interested in working in ICS are expected to have very strong analytical, computer programming and discrete math skills. Please contact Prof. Ram Krishnan if interested.<\/p>\n<p>Note that admission decisions are made by the UT San Antonio Graduate School and the ECE department&#8217;s PhD\/Graduate committee.<em> In particular, individual faculty members, such as myself, do not admit students directly<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Institute for Cyber Security (ICS) conducts research in fundamental and applied aspects of cybersecurity. In particular, ICS members work on machine learning security and privacy, malware detection using machine learning techniques and foundational aspects of authorization in information systems in the context of technology domains such as Cloud Computing, Internet of Things, Mobile Computing &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Prospective Students&#8221;<\/span><\/a><\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-209","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prospective Students - Ram Krishnan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prospective Students - Ram Krishnan\" \/>\n<meta property=\"og:description\" content=\"The Institute for Cyber Security (ICS) conducts research in fundamental and applied aspects of cybersecurity. In particular, ICS members work on machine learning security and privacy, malware detection using machine learning techniques and foundational aspects of authorization in information systems in the context of technology domains such as Cloud Computing, Internet of Things, Mobile Computing &hellip; Continue reading &quot;Prospective Students&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/\" \/>\n<meta property=\"og:site_name\" content=\"Ram Krishnan\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T19:05:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/prospective-students\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/prospective-students\\\/\",\"name\":\"Prospective Students - Ram Krishnan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\"},\"datePublished\":\"2017-08-10T19:41:32+00:00\",\"dateModified\":\"2025-08-29T19:05:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/prospective-students\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/prospective-students\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/prospective-students\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prospective Students\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\",\"name\":\"Ram Krishnan\",\"description\":\"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prospective Students - Ram Krishnan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/","og_locale":"en_US","og_type":"article","og_title":"Prospective Students - Ram Krishnan","og_description":"The Institute for Cyber Security (ICS) conducts research in fundamental and applied aspects of cybersecurity. In particular, ICS members work on machine learning security and privacy, malware detection using machine learning techniques and foundational aspects of authorization in information systems in the context of technology domains such as Cloud Computing, Internet of Things, Mobile Computing &hellip; Continue reading \"Prospective Students\"","og_url":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/","og_site_name":"Ram Krishnan","article_modified_time":"2025-08-29T19:05:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/","name":"Prospective Students - Ram Krishnan","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website"},"datePublished":"2017-08-10T19:41:32+00:00","dateModified":"2025-08-29T19:05:08+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/prospective-students\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/"},{"@type":"ListItem","position":2,"name":"Prospective Students"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/","name":"Ram Krishnan","description":"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/rkrishnan\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/comments?post=209"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/209\/revisions"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media?parent=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}