George Corser, PhD


2974 Vido Drive, Saginaw, MI 48603, (989) 780-3168, gcorser@gmail.com, www.georgecorser.com

EDUCATION

PHD, Computer Science and Informatics, Oakland University, Rochester, Michigan, 12/2015
MS, Computer Science and Information Systems, University of Michigan - Flint, Flint, Michigan, 8/2011
BSE, Civil Engineering and Operations Research, Princeton University, Princeton, New Jersey, 6/1985

EXPERIENCE

ASSISTANT PROFESSOR, Computer Science and Information Systems (CSIS)
Saginaw Valley State University (SVSU), University Center, Michigan, 7/2014 to present
SVSU is Michigan's youngest public university, with ~9,000 undergraduate and ~1,000 graduate students

PRIOR TEACHING EXPERIENCE

INSTRUCTOR (Part Time), Computer Science and Engineering, and Criminal Justice departments
Oakland University, Rochester, Michigan, Fall, 2012, and Winter, 2014
Concurrent with PhD studies. Official title was Teaching Assistant, but taught as sole teacher.

INSTRUCTOR (Part Time), Information Technology
ITT Technical Institute, Troy, Michigan, Summer, 2011, to Winter, 2014

PRIOR BUSINESS EXPERIENCE

Managed information technology (IT), engineering and accounting recruiting agencies. Managed staffs of up to 66, budgets of up to $7MM. From 1985 to 1988: coded COBOL programs, mostly for the US Naval Air Force. From 1988 to 2009: recruited IT professionals, managers and executives, first as recruiter, later as hands-on manager of recruiting agencies in USA and South Korea. Representative positions:

RECRUITING MANAGER, Aspen Search Group, Division of Michigan Staffing, Warren, MI, 2008.
Managed a staff of 4.

MANAGING DIRECTOR, International Recruiting, EngineerKorea, Seoul, South Korea, 2005.
Co-founded this South Korean recruiting agency.

MANAGING DIRECTOR, Technology Talent Acquisition, Corser Smith LLC, Troy, MI, 1998-2002.
Managed staff of 6 internal, 18 external professionals.

COURSES TAUGHT

Saginaw Valley State University (SVSU), University Center, Michigan, 7/2014 to present

Oakland University, Rochester, Michigan, Fall, 2012, and Winter, 2014

ITT Technical Institute, Troy, Michigan, Summer, 2011, to Winter, 2014

PUBLICATIONS

  1. Bassous, R., Mansour, A., Bassous, R., Fu, H., Zhu, Y. and Corser, G. (2017). Ambiguous Multi-Symmetric Scheme and Applications. Journal of Information Security. doi:10.4236/jis.2017.84024
  2. Corser, G., Masasabi, M., Kivari, L., Fu, H. (2017). Properties of vehicle network privacy. Michigan Academician, Vol. 44, No. 3, pp287-303. doi:10.7245/0026-2005-44.3.287 (PDF)
  3. Corser, G. (2017, August). Why IoT security is so important - and what to do about it. IoT Tech News. 4 August 2017. IEEE. (WEB)
  4. Corser, G., Banihani, A., Cox, J., Hoque, R., Fu, H. (2017, July). Location privacy, application overhead and congestion in VANET location based services. In 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, 2017, pp. 243-248. IEEE. doi:10.1109/BigDataSecurity.2017.52 (PDF)
  5. Corser, G., Fink, G., Aledhari, M., Bielby, J., Nighot, R., Mandal, S., Aneja, N., Hrivnak, C., and Cristache, L. (2017). Internet of Things (IoT) security best practices [White paper]. (PDF)
  6. Corser, G. (2016). Securing location privacy in vehicular applications and communications (Doctoral dissertation, Oakland University). (PDF) Nominated for Outstanding Dissertation Award
  7. Corser, G., Fu, H., and Banihani, A. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658-2667. doi:10.1109/TITS.2015.2506579 (PDF) Nominated for 2016 Caspar Bowden PET Award.
  8. Corser, G., Arenas, A., and Fu, H. (2016, February). Effect on vehicle safety of nonexistent or silenced basic safety messages. In Computing, Networking and Communications (ICNC), 2016 International Conference on (pp. 1-5). IEEE. doi:10.1109/ICCNC.2016.7440550 (PDF)
  9. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., and Fu, H. (2015, November). Maps: A multi-dimensional password scheme for mobile authentication. In Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces (pp. 409-412). ACM. doi:10.1145/2817721.2823479 (PDF)
  10. Corser, G., Fu, H., Shu, T., D'Errico, P., Ma, W., Leng, S., and Zhu, Y. (2014, June). Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. In Intelligent Vehicles Symposium Proceedings, 2014 IEEE (pp. 1030-1036). IEEE. doi:10.1109/IVS.2014.6856595 (PDF)
  11. Alnahash, N., Corser, G., Fu, H. (2014, April). Protecting Vehicle Privacy using Dummy Events. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. (PDF)
  12. Oluoch, J., Corser, G., Fu, H., Zhu, Y. (2014, April). Simulation Evaluation of Existing Trust Models in Vehicular Ad Hoc Networks. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. (PDF)
  13. Alrajei, N., Corser, G., Fu, H., Zhu, Y. (2014, February). Energy Prediction Based Intrusion Detection In Wireless Sensor Networks. International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2. IJETAE. (PDF)
  14. Corser, G., Fu, H., Shu, T., D'Errico, P and Ma, W. (2013, December). Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks. In Connected Vehicles and Expo (ICCVE), 2013 International Conference on (pp. 369-374). IEEE. doi:10.1109/ICCVE.2013.6799822 (PDF)
  15. Corser, G., Arslanturk, S., Oluoch, J., Fu, H., and Corser, G. E. (2013). Knowing the Enemy at the Gates: Measuring Attacker Motivation. In International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 83-95. doi:10.4018/JITN.2013040107 (PDF)
  16. Corser, G. (2012, October). A tale of two CTs: IP packets rejected by a firewall. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 16-20). ACM. doi:10.1145/2390317.2390320 (PDF) Best Paper Runner Up Award
  17. Corser, G. (2012, October). Professional association membership of computer and information security professionals. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 9-15). ACM. doi:10.1145/2390317.2390319 (PDF) Best Student Paper Runner Up Award

DOCTORAL COMMITTEES

SPECIAL CONFERENCES

SERVICE ACTIVITIES

AFFILIATIONS

AWARDS