Thomas Conley

Thomas Conley portrait

Thomas Conley

Information Security Officer
Security

El Pomar Center, Room 240

Office Hours :

M-F 8 a.m. - 5 p.m.

 

Education

M.S. Computer Science, Ohio University, 2012

 

My graduate studies in computer science at Ohio University has kept me current in software development, information security and network engineering. (55 hrs. 3.8 GPA)

B.S. The Pennsylvania State University, 1983, Environmental Resources Management

 

This interdisciplinary, environmental science curriculum concentrates on problem-solving, decision-making, and communication to solve environmental and resource management issues.

CISSP, Certified Information Systems Security Professional 2003, through 2018, license 46970

 

CISSP is the premier credential for information security leaders in government and industry. It is approved by the U.S. Department of Defense (DoD) in both Information Assurance Technical (IAT) and Managerial (IAM) categories, and by the U.S. National Security Agency (NSA).

GSSP-JAVA, GIAC Secure Software Programmer, 2013 through 2017, license. 1375

 

GSSP-JAVA certifies my ability to develop and maintain secure software systems and to recognize security shortcomings in existing applications. This specification guarantees advanced mastery of current security technology and tools for software development.

GWEB, GIAC Certified Web Application Defender, 2014 through 2018, license. 314

 

GWEB certifies mastery of current security paradigms and up-to-date hands-on experience using the latest tools to secure Web based systems and servers.

Cert/CSIRT, Carnegie Mellon University, 2002

 

This technical, managerial, and practical coursework provided the framework I used in starting a Computer Security Incident Response Team (CSIRT) at Ohio University in 2002.

Courses Taught

Predictive Network Anomaly Detection and Visualization, IEEE Transactions on Information Forensics and Security, Volume 5 Issue 2, June 2010

 

Presents a method of complex statistical modeling using short-term observations of multiple network features and their respective time averaged entropies for finding patterns in data.

Anomaly Detection and Visualization using Fisher Discriminant Clustering of Network Entropy, International Conference on Digital Information Management, (ICDIM), London, 2008

 

Research and experimental results for a novel method of detecting network anomalies such as BotNets, worm outbreaks, and denial of service attacks.

Anomaly Prediction in Network Traffic using Adaptive Wiener Filtering and ARMA Modeling, International Conference on Systems, Man and Cybernetics (ICSMC), Singapore, 2008

 

Research on innovative algorithms and software engineering methods for complex data analysis.

Internet Traffic Analysis for Threat Detection, Educause Midwest Regional Conference, Denver, 2005

 

This research resulted in numerous custom-made data analysis tools and provided Ohio University administrators with the knowledge needed to improve the network security posture.

Ohio University Network Infrastructure and Internet Border Security, Educause Annual Conference, Denver, 2004

 

A statistical data analysis of University Internet traffic and resource utilization used to identify security risks and predict outages.

Intelligent Name Searching Enhancements, Advanced Information Processing and Analysis Symposium (AIPA) - McLean VA, 1997

 

Development of a rule based machine translation language, compiler and Integrated Development Environment (IDE) used by linguists in writing and testing software for language translation, natural language processing, fuzzy data retrieval and multi-lingual spell checking.

Publications and Presentations

  • Effective Programmatic Analysis of Network Flow Data for Security and Visualization using Higher-order Statistics and Domain Specific Embedded Languages
    • A thesis presented to the faculty of the Russ College of Engineering and Technology of Ohio University.
  • Predictive Network Anomaly Detection and Visualization, IEEE Transactions on Information Forensics and Security, Volume 5 Issue 2, June 2010
    • Presents a method of complex statistical modeling using short-term observations of multiple network features and their respective time averaged entropies for finding patterns in data.
  • Anomaly Detection and Visualization using Fisher Discriminant Clustering of Network Entropy, International Conference on Digital Information Management, (ICDIM), London, 2008
    • Research and experimental results for a novel method of detecting network anomalies such as BotNets, worm outbreaks, and denial of service attacks.
  • Anomaly Prediction in Network Traffic using Adaptive Wiener Filtering and ARMA Modeling, International Conference on Systems, Man and Cybernetics (ICSMC), Singapore, 2008
    • Research on innovative algorithms and software engineering methods for complex data analysis.
  • Internet Traffic Analysis for Threat Detection, Educause Midwest Regional Conference, Denver, 2005
    • This research resulted in numerous custom-made data analysis tools and provided Ohio University administrators with the knowledge needed to improve the network security posture.
  • Ohio University Network Infrastructure and Internet Border Security, Educause Annual Conference, Denver, 2004
    • A statistical data analysis of University Internet traffic and resource utilization used to identify security risks and predict outages.
  • Intelligent Name Searching Enhancements, Advanced Information Processing and Analysis Symposium (AIPA) - McLean VA, 1997
    • Development of a rule based machine translation language, compiler and Integrated Development Environment (IDE) used by linguists in writing and testing software for language translation, natural language processing, fuzzy data retrieval and multi-lingual spell checking.