Ph. D. in Systems Science and Industrial Engineering from SUNY Binghamton, 1997
Advisor: Dr. Gorge Klir, Distinguish Professor; Dissertation Title: Bayesian inference of fuzzy probabilities
Master of Science in Computer Science from SUNY Binghamton, 1997
Master of Science in Applied Mathematics from Shanghai Normal University, 1988
Bachelor of Science in Mathematics from Shanghai Normal University, 1985
1. 9/2014 - 8/2017, PI, $240,875, NSF ATE, Gamified Digital Forensics Course Modules for Undergraduates.
2. 2/2014 - 9/2014, Co-PI, $3500, Connect@RIT, Peer-to-Peer (P2P) Mentoring Group.
3. 1/2014 - 12/2015, Co-PI, $200,531, NSF/BBN, UGREE-GENI: Understanding GENI InfRastructures for ComputEr Networking and Security Experiments.
4. 3/2013 - 2/2014. PI, $4,800, RIT - Provost Learning Innovation Grant (PLIG). Interactive visualization game-based digital forensics course for undergraduate education.
5. 1/2012 - 12/2012. Co-PI, $21,000, GCCIS Deans Office Seed Grant. Development of a Sensor Forensics Model.
6. 11/2011 - 10/2014. Co-PI, $194,790, NSF. Applying a Project-Based Approach to Understanding Multiple GENI Resources for Networking Research and Education.
7. 6/2009 - 6/2010. PI, $2100, RIT Faculty Evaluation and Development (FEAD). CISSP training.
8. 3/2008 - 3/2009. PI, $6000. RIT Provost Learning Innovation Grant (PLIG). Wireless Ad hoc and Sensor Network Security Course Development.
9. 6/2008 - 6/2009. PI, $2100, RIT Faculty Evaluation and Development (FEAD). Steganography training.
10. 9/2006 - 8/2007. Co-PI, $36,551, Department of Defense (DOD). The Small Business Technology Transfer Grant (STTR) on Scalable Mobile Wireless Mesh Networks sponsored by US Air Force research lab, Phase I
11. 6/2005 - 8/2005. PI, $3000, RIT Deans FEAD grant discretionary fund for the tMANET project.
12. 6/2004 - 6/2005. PI, $3000, RIT Faculty Evaluation and Development (FEAD). Computer Forensics training
13. 5/2003 - 9/2003. Co-PI, $42,000, DoD. Computer and Network Security Curriculum.
2009. Method and apparatus for implementing a policy-based management System on A Network Device, submitted by Nortel Networks, was awarded by US Patent and Trademark Office, October, 2009. Patent No: 7606146.
2006. Aggregating filters, submitted by Nortel Networks, was awarded by US Patent and Trademark Office, June, 2006. Patent No: 7065042.
2004. Oversubscribing Network Resources, submitted by Nortel Networks, was awarded by US Patent and Trademark Office in August, 2004. Patent No: 6775701.
2004. Method for Reserving Network Resources Using a Hierarchical/Segment tree for Starting and Ending Times of Request, submitted by Nortel Networks, was awarded by US Patent and Trademark Office in July, 2004. Patent No: 6760306.
Journal Articles
1. Y. Pan, B. Stackpole and L. Troell (2010). Computer Forensics Technologies For Personal Identifiable Information Detection and Audits, Journal of Information Systems Audit and Control Association (ISACA), vol. 2, pp. 44-48.
2. G. Klir and Y. Pan (1998). Constrained fuzzy arithmetic: Basic questions and some answers, Soft Computing, vol. 2, pp. 100-108
3. Y. Pan and G. Klir (1997). Revised hierarchical analysis method based on crisp and fuzzy numbers, International Journal of General Systems, vol. 26(1-2), pp. 115-131.
4. Y. Pan and G. Klir (1997). Bayesian inference of fuzzy probabilities, International Journal of General Systems, vol. 26(1-2), pp. 73-90.
5. Y. Pan and G. Klir (1997). Bayesian inference based on interval probabilities, International Journal of Intelligent and Fuzzy Systems, vol. 5, pp. 193-203.
6. D. Harmanec, R. G, Y. Pan and G. Klir (1996). On the computation of uncertainty measure in Dempster-Shafer theory, Intern. Journal of General Systems, vol. 25(2), pp.153-163.
7. B. Yuan, W. Wu and Y. Pan (1995). MP and invariant MP approximations of fuzzy inference rules, Intern. Journal of General Systems, vol. 23(2), pp. 255-269.
8. B. Yuan, Y. Pan and W. Wu (1995). On normal form based interval-valued fuzzy sets and their applications to approximate reasoning, Intern. Journal of General Systems, vol. 23(3), pp. 421-254.
9. B. Yuan and Y. Pan (1993). Generalized fuzzy method-of-cases, Intern. Journal of Approximate Reasoning, vol. 9(2), pp. 129-138.
10. Y. Pan and W. Wu (1990). Medium algebras, Journal of Mathematical Research Exposition, vol. 10(2), pp. 265-270.
11. Y, Pan and W, Wu (1988). Median algebras, Journal of Shanghai Teachers University, Natural Science Edition, vol. 17(3) pp. 1-7.
12. Y. Pan and W. Wu (1988). The optimal transitive matrix of an anti-symmetric matrix, Mathematics in Practice and Theory, vol. 2, pp. 44-50.
Peer Reviewed Conference Publications and Book Chapters
13. Y. Pan, D. Schwartz, and S. Mishra, Gamified Digital Forensics Course Modules for Undergraduates, IEEE Integrated STEM Education Conference, Princeton, NJ, 2015
14. T. Madiraju, B. Stackpole, D. Johnson, and Y. Pan, Passwords in Public: Dictionary Attacks, Password Selection and Password Meters, Proc. of the 18th Colloquium for Information Systems Security Education, San Diego, CA, 2014
15. B. Huba, B. Yuan, Y. Pan and S. Mishra, Towards A Web Tracking Profiling Algorithm, Proc. of the 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, Massachusetts, 2013 (acceptance rate: 29%), 10.1109/THS.2013.6698968
16. Y. Pan and S. Mishra, Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements, Proc. of the 17th Colloquium for Information Systems Security Education, Mobile, Alabama, 2013
17. Kaiqi Xiong and Yin Pan (2013), Understanding ProtoGENI in Networking Courses for Research and Education, Proc. of the Second GENI Research and Educational Experiment Workshop (GREE2013), co-located with GENI Engineering Conference (GEC16), Salt Lake City, Utah. 10.1109/GREE.2013.31
18. Y. Pan, S. Mishra, B. Yuan, B. Stackpole and D. Schwartz (2012). Game-based Forensics Course For First Year Students, Proc. of 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012), Calgray, Alberta, Canada. 10.1145/2380552.2380558
19. Sanders, Y. Pan, B. Yuan and T. Sun (2012). Correlating Risk Findings to Quantify Risk, Proc. of 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2012), Amsterdam, Netherlands. 10.1109/SocialCom-PASSAT.2012.95
20. M. Hirwani, Y. Pan, B. Stackpole and D. Johnson (2012). Forensic Analysis of VMware Virtual Hard Disks, Proc. of International Conference on Security and Management (SAM 2012), Las Vegas, NV.
21. O. Polatcan, S. Mishra and Y. Pan (2011). Invisible Witness Tool for Email Behavior Profiling, Proc. of 6th Annual Symposium on Information Assurance (ASIA '11), Albany, NY.
22. D. Pearson, S. Mishra and Y. Pan (2011). Dynamic Treat-resistant Node Identification in Sensor Networks, Proc. of Cyber security Education, 2011 International Conference on Security & Management World Congress in Computer Science, Las Vegas, NV.
23. Y. Pan, B. Yuan, and S. Mishra (2011). Network Security Auditing, Book Chapter, in Network Security, Administration and Management: Advancing Technologies and Practices (D. Kar & M. Syed, Editors) IGI Global Publishers, 131-157.
24. M. Robertson, Y. Pan, and B. Yuan (2010). A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content, Proc. of 2010 International Conference on Intelligent Systems and Knowledge Engineering (ISKE2010), Hangzhou, China.
25. D. Pearson, S. Mishra and Y. Pan (2010). Security attacks and defenses in sensor networks, Cyber security Education, 2010 International Conference on Security & Management World Congress in Computer Science, Las Vegas, Nevada.
26. T. Oh, Y. Pan, and S. Mishra (2009). Teaching High-Assurance Internet Protocol Encryption (HAIPE) Using OPNET Modeler Simulation Tool, Proc. of ACM-SIGITE 2009 conference, Fairfax, VA.
27. Y. Pan (2009). Service for Deploying Web-based Online Courses, Proc. of 2009 IEEE International Conference on Service Operations, Logistics and Informatics, Chicago, IL.
28. T. Oh, Y. Pan, and S. Mishra (2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc Networks, Proc. of US-Korea Conference (UKC) 2009 on Science, Technology, and Entrepreneurship, Raleigh, NC.
29. S. Mishra, Y. Pan and T. Oh (2009). Undergraduate Research in Wireless Sensor Security Course, Proc. of the 13th Colloquium for Information Systems Security Education, Seattle, Washington.
30. B. Stackpole , J. Koppe, T. Haskell, L. Guay and Y. Pan (2008). Decentralized Virtualization in Systems Administration Education, Proc. of ACM-SIGITE 2008 conference, Cincinnati, OH.
31. Y. Pan (2007). Security Auditing Course Development, Proc. of ACM-SIGITE 2007 conference, Florida.
32. Y. Pan, N. Shenoy and M. Kwon (2005). A Secure QoS Routing Scheme for Internet MANETs, Proc. of the 2nd IEEE Upstate New York Workshop on Communications and Networking, Rochester, NY.
33. N. Shenoy, Y. Pan and D. Narayan, etc (2005). Route Robustness of a QoS Sensitive Routing Scheme for Internet MANETs, Proc. of the IEEE Global Telecommunications Conference, GLOBECOM 2005, St Louis.
34. N. Shenoy, Y. Pan and V. Rao (2005). Bandwidth Reservation and QoS in Internet MANETs, Proc. of the IEEE International conference on computer communications and Networks (ICCCN), San Diego.
35. N. Shenoy and Y. Pan (2005). Multi-meshed Tree routing for Internet MANETs, Proc. of the Second International Symposium of Wireless Communication Systems 2005 (ISWCS 2005), Italy.
36. N. Shenoy, Y. Pan and V. Rao (2005). Quality of service in Internet MANETs invited paper, Proc. of 16th International Symposium on Personal Indoor and Mobile Radio Communications PIMRC 2005, Berlin.
37. N. Shenoy, Y. Pan and D. Narayan (2004). Multi-Meshed Tree Routing Protocol Analysis, 1st IEEE Upstate NY Workshop on Communications and Networking, Rochester, NY.
38. L. Troell, Y. Pan, and B. Stackpole (2004). Forensic Course Development One Year Later, Proc. of the SIGITE 2004 conference, Salt Lake City, Utah.
39. L. Troell, Y. Pan, and B. Stackpole (2003). Forensic Course Development, Proc. of Conference on Information Technology Curriculum 4, North Carolina.
40. Y. Pan, G. Klir, and B. Yuan (1996). Bayesian inference based on fuzzy probabilities. Proc. of 5th IEEE Intern. Conference on Fuzzy Systems, Sept. 8-11, 1996, New Orleans, LA, vol. 3, pp. 1693-1699.
41. B. Yuan, W. Wu and Y. Pan (1993). On approximations of fuzzy inference rules: a further study of the compositional rule of inference, Proc. of NAFIPS'93, Allentown, PA, pp. 242-246.
Partially Reviewed Conference Presentations
42. Y. Pan, S. Mishra, D. Schwartz, A. McNett, and P. McCarthy (2015). Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration, the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo, NY.
43. Y. Pan and D. Johnson (2008). NSSA faculty Involvement in IT Security Auditing at RIT, 75-minute peer reviewed presentation, Secure IT 2008 Conference for Information Technology and Network Security, San Diego.
44. Y. Pan (2007). Security Audit Lab Development, 60-minute peer reviewed presentation, the Fifth Annual Secure IT for Information Technology and Network Security conference, Sacramento, California.
45. Y. Pan and B. Stackpole (2006). Forensics Lab Development, 60-minute peer reviewed presentation, Secure IT 2006 Conference, Anaheim, California.
46. Y. Pan and B. Stackpole (2005). Forensic Course Development, 75-minute peer reviewed presentation, Secure IT 2005 Conference, San Diego, CA.