George Corser, PhD


2469 Copper Creek Drive, Bay City, MI 48706, (989) 780-3168, gcorser@gmail.com, www.georgecorser.com

EDUCATION

PHD, Computer Science and Informatics, Oakland University, Rochester, Michigan, 12/2015
MS, Computer Science and Information Systems, University of Michigan - Flint, Flint, Michigan, 8/2011
BSE, Civil Engineering and Operations Research, Princeton University, Princeton, New Jersey, 6/1985

EXPERIENCE

DEPARTMENT CHAIR, Computer Science and Information Systems (CSIS), 7/2024 to present

ASSISTANT PROFESSOR, Computer Science and Information Systems (CSIS), 7/2014 to present
Saginaw Valley State University (SVSU), University Center, Michigan, 7/2014 to present
SVSU is Michigan's youngest public university, with ~9,000 undergraduate and ~1,000 graduate students

INSTRUCTOR (Part Time), Computer Science and Engineering, and Criminal Justice departments
Oakland University, Rochester, Michigan, Fall, 2012, and Winter, 2014
Concurrent with PhD studies. Official title was Teaching Assistant, but taught as sole teacher. Achieved perfect 5.0 rating at RateMyProfessors.com.

INSTRUCTOR (Part Time), Information Technology
ITT Technical Institute, Troy, Michigan, Summer, 2011, to Winter, 2014

EXPERIENCE - BUSINESS & INDUSTRY

*** Experience prior to 2011 was outside academia ***

Managed information technology (IT), engineering and accounting recruiting agencies. Managed staffs of up to 66, budgets of up to $7MM. From 1985 to 1988: coded COBOL programs, mostly for the US Naval Air Force. From 1988 to 2009: recruited IT professionals, managers and executives, first as recruiter, later as hands-on manager of recruiting agencies in USA and South Korea. Representative positions:

RECRUITING MANAGER, Aspen Search Group, Division of Michigan Staffing, Warren, MI, 2008.
Managed a staff of 4.

MANAGING DIRECTOR, International Recruiting, EngineerKorea, Seoul, South Korea, 2005.
Co-founded this South Korean recruiting agency.

MANAGING DIRECTOR, Technology Talent Acquisition, Corser Smith LLC, Troy, MI, 1998-2002.
Managed staff of 6 internal, 18 external professionals.

COURSES TAUGHT

Saginaw Valley State University (SVSU), University Center, Michigan, 7/2014 to present

Oakland University, Rochester, Michigan, Fall, 2012, and Winter, 2014

ITT Technical Institute, Troy, Michigan, Summer, 2011, to Winter, 2014

PUBLICATIONS

  1. Morel, B., and Corser, G.. State of Research in Mobile Biometrics, and the Impact of Artificial Intelligence. IEEE SoutheastCon 2025 (pending).
  2. Corser, G.. ChatGPT in Teaching Theory of Computation: Capabilities From 2023 To 2024. ICONEST 2024 (accepted).
  3. Corser, G.. ChatGPT in Teaching Theory of Computation. ICONEST 2023.
  4. Reinert, J., and Corser, G.. Classification of Blockchain Implementation in Mobile Electronic Health Records and Internet of Medical Things Devices Research. IEEE SoutheastCon 2021.
  5. Senjalia, N., and Corser, G.. Classification of Mobile Healthcare App Research. IEEE SoutheastCon 2021.
  6. Bodeis, W., and Corser, G.. Blockchain Adoption, Implementation and Integration in Healthcare Application Systems. IEEE SoutheastCon 2021.
  7. Alshammari, A., Zohdy, M., and Corser, G. (2019). Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area. Journal of Information Security. DOI:10.4236/jis.2020.111004 (PDF)
  8. Banihani, A., Zaiter, A., Corser, G., Fu, H. and Alzahrani, A. (2019). Evaluating Trajectory Privacy in Autonomous Vehicular Communications and Applications. WCX SAE World Congress Experience - Intelligent Transportation Systems Section. DOI: 10.4271/2019-01-0487 (PDF)
  9. Alharbi, A., Zohdy, M., Debnath, D., Olawoyin, R., & Corser, G. (2018). Sybil attacks and defenses in internet of things and mobile social networks. International Journal of Computer Science Issues (IJCSI)15(6), 36-41. DOI:10.5281/zenodo.2544625
  10. Zhu, Y., Gurary, J., Corser, G., Oluoch, J., Alnahash, N., Fu, H., and Tang, J. (2018). CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices. IEEE Access. DOI: 10.1109/ACCESS.2018.2872772 (PDF)
  11. Alshammari, A., Zohdy, M., and Corser, G. (2018). Classification Approach for Intrusion Detection in Vehicle Systems. Wireless Engineering and Technology. DOI:10.4236/wet.2018.94007
  12. Banihani, A., Alzahrani, A., Alharthi, R., Fu, H. and Corser, G. (2018). T-PAAD: Trajectory Privacy Attack on Autonomous Driving. 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, 2018, pp. 1-2. DOI:10.1109/CNS.2018.8433168
  13. Bassous, R., Mansour, A., Bassous, R., Fu, H., Zhu, Y. and Corser, G. (2017). Ambiguous Multi-Symmetric Scheme and Applications. Journal of Information Security. DOI:10.4236/jis.2017.84024
  14. Corser, G., Masasabi, M., Kivari, L., Fu, H. (2017). Properties of vehicle network privacy. Michigan Academician, Vol. 44, No. 3, pp287-303. DOI:10.7245/0026-2005-44.3.287 (PDF)
  15. Corser, G. (2017, August). Why IoT security is so important - and what to do about it. IoT Tech News. 4 August 2017. IEEE. (WEB)
  16. Corser, G., Banihani, A., Cox, J., Hoque, R., Fu, H. (2017, July). Location privacy, application overhead and congestion in VANET location based services. In 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Beijing, China, 2017, pp. 243-248. IEEE. DOI:10.1109/BigDataSecurity.2017.52 (PDF)
  17. Corser, G., Fink, G., Aledhari, M., Bielby, J., Nighot, R., Mandal, S., Aneja, N., Hrivnak, C., and Cristache, L. (2017). Internet of Things (IoT) security best practices [White paper]. (PDF)
  18. Bielby, J.; Bashir, A. K.; Corser, G., "End-to-End Security and Privacy by Design for IoT," in IEEE Technology Policy and Ethics , vol.1, no.1, pp.1-5, Nov. 2016, doi: 10.1109/NTPE.2016.9778155.
  19. Corser, G. (2016). Securing location privacy in vehicular applications and communications (Doctoral dissertation, Oakland University). (PDF) Nominated for Outstanding Dissertation Award
  20. Corser, G., Fu, H., and Banihani, A. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658-2667. DOI:10.1109/TITS.2015.2506579 (PDF) Nominated for 2016 Caspar Bowden PET Award.
  21. Corser, G., Arenas, A., and Fu, H. (2016, February). Effect on vehicle safety of nonexistent or silenced basic safety messages. In Computing, Networking and Communications (ICNC), 2016 International Conference on (pp. 1-5). IEEE. DOI:10.1109/ICCNC.2016.7440550 (PDF)
  22. Gurary, J., Zhu, Y., Corser, G., Oluoch, J., Alnahash, N., and Fu, H. (2015, November). MAPS: A multi-dimensional password scheme for mobile authentication. In Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces (pp. 409-412). ACM. DOI:10.1145/2817721.2823479 (PDF)
  23. Corser, G., Fu, H., Shu, T., D'Errico, P., Ma, W., Leng, S., and Zhu, Y. (2014, June). Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. In Intelligent Vehicles Symposium Proceedings, 2014 IEEE (pp. 1030-1036). IEEE. DOI:10.1109/IVS.2014.6856595 (PDF)
  24. Alnahash, N., Corser, G., Fu, H. (2014, April). Protecting Vehicle Privacy using Dummy Events. In 2014 American Society For Engineering Education North Central Section Conference. ASEE NCS 2014. (PDF)
  25. Oluoch, J., Corser, G., Fu, H., Zhu, Y. (2014, April). "Simulation Study of Trust Management Schemes in Vehicular Ad Hoc Networks (VANETs)" (2014). Electrical Engineering & Computer Science Faculty Publications. 305. https://engagedscholarship.csuohio.edu/enece_facpub/305 ASEE NCS 2014 (PDF)
  26. Alrajei, N., Corser, G., Fu, H., Zhu, Y. (2014, February). Energy Prediction Based Intrusion Detection In Wireless Sensor Networks. International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2. IJETAE. (PDF)
  27. Corser, G., Fu, H., Shu, T., D'Errico, P and Ma, W. (2013, December). Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks. In Connected Vehicles and Expo (ICCVE), 2013 International Conference on (pp. 369-374). IEEE. DOI:10.1109/ICCVE.2013.6799822 (PDF)
  28. Corser, G., Arslanturk, S., Oluoch, J., Fu, H., and Corser, G. E. (2013). Knowing the Enemy at the Gates: Measuring Attacker Motivation. In International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 83-95. DOI:10.4018/JITN.2013040107 (PDF)
  29. Corser, G. (2012, October). A tale of two CTs: IP packets rejected by a firewall. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 16-20). ACM. DOI:10.1145/2390317.2390320 (PDF) Best Paper Runner Up Award
  30. Corser, G. (2012, October). Professional association membership of computer and information security professionals. In Proceedings of the 2012 Information Security Curriculum Development Conference (pp. 9-15). ACM. DOI:10.1145/2390317.2390319 (PDF) Best Student Paper Runner Up Award

DOCTORAL DISSERTATION ADVISEES

SPECIAL CONFERENCES

AFFILIATIONS

AWARDS

SERVICE