\documentclass[10pt]{article}
%\usepackage{epsf}

%\usepackage{alg,alg2}
%\input{psfig.sty}

%\input{preamble-isca}
\setcounter{secnumdepth}{4}

\textheight 9in         % 1in top and bottom margin
\textwidth 6.5in        % 1in left and right margin

\topmargin -0.5 in
\oddsidemargin 0in      % Both side margins are now 1in
\evensidemargin 0in

% The header goes .5in from top of the page and from the text.


\begin{document}

\normalsize
\bibliographystyle{alpha}


\clearpage
\pagestyle{empty}

%\setcounter{page}{0}

\begin{flushleft}
{\Large\bf Biographical Sketch: Jelena Mirkovic} \\
\end{flushleft}


\noindent\large{\underline{Professional Preparation}}\normalsize
\medskip
\begin{table}[h]
\begin{center}
\begin{tabular}{ l c r}
    School of Electrical Engineering,&&\\
    University of Belgrade,& Computer Science and Engineering & BSc 1998 \\
    Serbia &&\\
University of California Los Angeles & Computer Science & MS 2000 \\
University of California Los Angeles & Computer Science & PhD 2003 \\
\end{tabular}
\end{center}
\end{table}

\bigskip \noindent\large{\underline{Appointments}}\normalsize
\vspace{0.2 in}

\begin{table}[h]
\begin{center}
\begin{tabular}{ l p{4in}}
  June 2010 - present & Research Faculty at University of Southern California \\
   August 2007 - present & Computer Scientist at University of Southern California Information Sciences Institute\\
   September 2003 - August 2007 & Assistant Professor at the CIS
Department, University of Delaware\\
    2000 - 2003& Research Assistant at the Computer Science
Department, UCLA \\
    1998 - 2000& Teaching Assistant at the Computer Science
Department, UCLA \\
\end{tabular}
\end{center}
\end{table}


\bigskip
\noindent\large{\underline{Publications}}\normalsize

\bigskip
\noindent\textbf{Closely Related Publications}
\begin{enumerate}
\item{J. Mirkovic, ``Privacy-Safe Network Trace Sharing via Secure Queries,''
Proceedings of the ACM CCS Workshop on Network Data Anonymization (NDA), 2008.}
\item{A. Viswanathan, A. Hussain, S. Schwab and J. Mirkovic, ``A Knowledge Framework for Data Analysis in Networked Systems,'' Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI),  March 2011.}
\item{J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg, R. Jung,``Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise,'' IEEE Transactions on Computers, Vol 57, No 8, pp 1098-1112, August 2008.}
\item{J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas, ``Accurately Measuring Denial of Service in Simulation and Testbed Experiments,'' IEEE Transactions on Dependable and Secure Computing, vol 6, no 2, pp 81-95, April-June 2009.}
\item{S. Wei, C. Ko, J. Mirkovic,  A. Hussain,  ``Tools for Worm Experimentation on the DETER Testbed,'' International Journal of Communication Networks and Distributed Systems (IJCNDS), 2010, Vol. 5, No. 1/2, pp. 151-171.}
\end{enumerate}

\bigskip
\noindent\textbf{Other Publications}

\begin{enumerate}
\item{E. Kissel and J. Mirkovic,``Comparative Evaluation of Spoofing Defenses,'' IEEE Transactions on Dependable and Secure Computing, preprint November 2009. }
\item{S. Wei and J. Mirkovic, ``Correcting Congestion-Based Error in Network Telescope's Observations of Worm Dynamics,'' Proceedings of Internet Measurement Conference, October 2008.}
\item {G. Oikonomou and J. Mirkovic, ``Modeling Human Behavior for Defense against Flash Crowd Attacks,''
Proceedings of the IEEE International Conference on Communications (ICC), 2009.}
 \item{J. Mirkovic and P. Reiher, ``D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks,'' IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232.}
    \item{E. Kline, M. Beaumont-Gay, J. Mirkovic and P. Reiher, ``RAD: Reflector Attack Defense Using Message Authentication Codes,'' In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2009.}
\end{enumerate}

\bigskip \noindent\large{\underline{Synergistic
Activities}}\normalsize
\begin{enumerate}
  \item{Leading an NSF CCLI-sponsored effort to create and share cyber security exercises for classroom use on the DETER testbed. }
\item{Developed a set of benchmarks for DDoS defense evaluation on DETER testbed.}
    \item{Developed attack generator and legitimate traffic generator for testing of DDoS defenses.}
    \item{Developed DDoS attack and DDoS defense taxonomy to structure the research in DDoS defense field.}
  
\end{enumerate}

\bigskip \noindent\large{\underline{Collaborators \& Other
Affiliations}}\normalsize

\begin{itemize}
\item[]{\textbf{Collaborators and Co-Editors:}
Daniel Massey (Colorado State University),
Christos Papadopoulos (Colorado State University),
Mooi Choo Chuah (Lehigh University),
B. Hoon Kang (George Mason University),
Angelos Stavrou (George Mason University),
Sonia Fahmy (Purdue University),
Anthony Joseph (UC Berkeley),
Roshan Thomas (SPARTA),
Alefiya Hussain (SPARTA),
Stephen Schwab (SPARTA),
Brett Wilson (SPARTA),
Michael Burg (Sandia National Laboratories),
David Dittrich (University of Washington),
Sven Dietrich (CERT),
Wilson Farrell (BBN Technologies),
Bob Jung (Sandia National Laboratories),
Jun Li (University of Oregon),
Tom Obenauf (Sandia National Laboratories),
Peter Reiher (UCLA),
Marla Shepard (BBN Technologies),
Conor Sibley (BBN Technologies),
Lyle Sudin (BBN Technologies),
Ken Theriault (BBN Technologies),
Lixia Zhang (UCLA),
Dino Dai Zovi (Sandia National Laboratories)
}

\item[]{\textbf{Graduate and Postdoctoral Advisors:} Peter Reiher (UCLA)}
\item[]{\textbf{Thesis Advisor and Postgraduate-Scholar Sponsor:}

PhD students: Songjie Wei, George Oikonomou, Eric Schrag, Ezra Kissel, Hao Shi, Vaibhav Gupta, Erik Kline, Arun Viswanathan

MS students: Erinc Arikan, Neeta Jain, Divya Gopalakrishnan, Vikram Kaliraman, Namratha Hundigopal, Emre Iliman}
\end{itemize}

\end{document}
