Yin Pan Headshot

Yin Pan

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Yin Pan

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Education

BS, MS, Shanghai Normal University (China); MS, Ph.D., State University of New York at Binghamton

Bio

Yin Pan is a Professor in the Computing Security department. She received her Ph.D. in Systems Science and M.S. degree in Computer Science from Binghamton University. Dr. Pan holds four US patents in the areas of Network Quality of Services, Voice over IP and Artificial Intelligence. Since joining RIT in 2002, Dr. Pan has been actively involved in the IT security area, especially in security audits and computer forensics. Her current research interests include game-based digital forensics and memory-based malware detection using machine learning. She has published over 45 papers and presentations in research conferences and journals. She received grants from NSF, US Air Force Research Lab, and RIT. Dr. Pan teaches both undergraduate and graduate courses in digital forensics.


Areas of Expertise

Select Scholarship

Published Conference Proceedings
Willis, Peter, et al. "A Novel Frame Forwarding Algorithm for Switched Networks." Proceedings of the IEEE 47th Conference on Local Computer Networks. Ed. none. Edmonton, Canada: n.p., 2022. Web.
Mosli, Rayan, et al. "They Might NOT Be Giants: Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization." Proceedings of the ESORICS 2020. Ed. N/A. Virtual, Virtual: n.p., 2020. Print.
Willis, Peter, et al. "Root Redundancy in Meshed Tree Bridged Networks." Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN). Ed. N/A. Virtual, Virtual: n.p., 2020. Print.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Cybersecurity Course Content for Entry Level Students." Proceedings of the 2017 ASEE Annual Conference & Exposition, Columbus, Ohio, June, 2017. Ed. ASEE Conference Proceeding. Columbus, Ohio: ASEE, 2017. Print.
Mosli, Rayan, et al. "A Behavioral-Based Approach for Malware Detection." Proceedings of the Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, 2017. Ed. IFIP WG 11.9 Conference Proceeding. Orlando, FL: Proceeding, 2017. Web.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Course Modules for Entry Level Students." Proceedings of the 2017 ACM Special Interest Group for Computer Science Education (SIGCSE), Seattle, Washington, 2017. Ed. SIGCSE Conference Proceeding. Seattle, Washington: ACM, 2017. Print.
Mosli, Rayan, et al. "Automated malware detection using artifacts in forensic memory images." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. IEEE Conference. Waltham, Massachusetts: n.p., 2016. Print.
Pan, Yin, David Schwartz, and Sumita Mishra. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the IEEE Integrated STEM Education Conference. Ed. ISEC. Princeton, NJ: n.p., 2015. Print.
Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the 18th Colloquium for Information Systems Security Education. Ed. CISSE. San Diego, CA: n.p., 2014. Web.
Pan, Yin and Sumita Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education. Mobile, Alabama: CISSE, 2013. Print.
Huba, Bill, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts: IEEE, 2013. Print.
Xiong, Kaiqi and Yin Pan. "Understanding ProtoGENI in Networking Courses for Research and Education." Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013). Ed. Conference. Salt Lake City, Utah: n.p., 2013. Print.
Pan, Yin, et al. "Game-based Forensics Course For First Year Students." Proceedings of the ACM SIGITE 2012, October. Ed. ACM SIGITE. Calgary, Alberta: ACM, 2012. Print.
Sanders, Aaron, et al. "Correlating Risk Findings to Quantify Risk." Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust, September. Ed. Conforence Proceeding. Amsterdam, Netherlands: IEEE, 2012. Print.
Hirwani, Manish, et al. "Forensics Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing. Albany, NY: WorldComp, 2012. Print.
Polatcan, Onur, Sumita Mishra, and Yin Pan. "Invisible Witness Tool for Email Behavior Profiling." Proceedings of the 6th Annual Symposium on Information Assurance (ASIA \'11), June, 2011, Albany, NY. Ed. ASIA '11. Albany, NY: ASIA, 2011. Print.
Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Treat-resistant Node Identification in Sensor Networks." Proceedings of the Cyber Security Education - 2011 International Conference on Security & Management World Congress in Computer Science, July, 2011, Las Vegas, NV. Las Vegas, NV: UCMSS, 2011. Print.
Peer Reviewed/Juried Poster Presentation or Conference Paper
Pan, Yin, Sumita Mishra, and Micheal Yacci. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the ASEE Annual Conference & Exposition. Ed. None. Salt Lake City, Utah: n.p..
Mosli, Rayan, Bo Yuan, and Yin Pan. "On the Viability of Data Collection Using Google Rapid Response for Enterprise-level Malware Research." Proceedings of the Digital Forensics Workshop (DFRWS). Ed. None. Rhode Island, Providence: n.p..
Shows/Exhibits/Installations
Pan, Yin. Associate Professor. By Ryan McGlinn. 22 Oct. 2015. 2015 ATE Principal Investigators Conference, Washington DC. Exhibit.
Pan, Yin. Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration. By Sumita Mishra and David Schwartz. May 2015. the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo. Performance.
Book Chapter
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey, PA: IGI Global, 2011. 131-157. Print.

Currently Teaching

CISC-807
2 Credits
Teaching is a valuable and desirable skill for PhD students. This workshop course provides an introduction to the concepts and skills needed for quality teaching in higher education. Students will be provided with lecture, reading, and class activities centered on building skills in educational analysis, design, and assessment. Prerequisites: Limited to students in the Ph.D. program. Class 2, Credit 2 (F)
CSEC-464
3 Credits
This course focuses on the fundamental incident response and computer forensics procedures for computer systems. Students will follow the forensics procedures and use forensically-sound tools to uncover the activities of computer users (deleted and hidden files, cryptographic steganography, illegal software, etc.). Students will also technologies to gather and preserve this evidence to ensure admissibility in court.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-730
3 Credits
This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms.
CSEC-799
1 - 3 Credits
The graduate independent study offers students the opportunity to investigate a topic not covered in an available course in the MS program in conjunction with a faculty sponsor. Working cooperatively, the faculty sponsor and the student draft a proposal of the work to be completed, the deliverables expected from the student, the number of credits assigned, and the means by which the student’s work will be evaluated. The proposal must be approved by the graduate program director before a student can be registered for independent study.