FAMU Center for Cybersecurity (FCCS)

The Florida A&M University Center for Cybersecurity (FCCS) recognizes that as technology advances and the world becomes more and more computer-oriented, the tasks of Cyber Defense (CD) and Information Assurance (IA) becomes progressively more challenging.

Center for Cybersecurity (FCCS)
FCCS focuses on education, research and development for all aspects of information security, including systems vulnerability assessment, theory development and formalization methodologies, and mobile computing. FCCS is aligned with Florida A&M University values and supportive of the Florida A&M University mission to:
  • Help students realize their educational goals.
  • Provide intellectual challenges and undergraduate research opportunities.
  • Value and promote teaching, scholarship, and active learning.
  • Encourage experimentation, innovation, and creativity.
FCCS represents a response to a national need. President Obama states in his Cybersecurity Legislative Proposal that "cyber threat is one of the most serious economic and national security challenges we face as a nation."

[Cybersecurity Legislative Proposal, May 12, 2011]

Mission Statement

The mission of FCC is to promote, coordinate, and implement education, research and innovation in Cyber Defense (CD) and Cyber Security (CS). Participation in FCC research projects and educational endeavors is open to faculty, visiting scholars, undergraduate and graduate students, students from diverse disciplines and underrepresented populations. A specific goal of FCC is to involve undergraduate students in CD and Cyber Security research.

Objectives & Purpose

FCCS exists to:

  • Offer coursework leading to certificates in Cyber Defense (CD) and Cyber Security that align with the National Security Agency (NSA)and the Department of Homeland Security (DHS) standards as defined by the National Center for Academic Excellence (CAE) Cyber Defense (CD) Program Office 
  • Increase minority participation in CD and cybersecurity-related careers.
  • Support university initiatives and projects CD and Cybersecurity.
  • Establish a program of research in CD and Cyber Security.
  • Serve as a community, regional, and national resource for educational institutions, small businesses, and the general population.
  • LaWanda Warren, Hongmei Chi: Securing EHRs via CPMA attribute-based encryption on cloud systems. ACM Southeast Regional Conference 2014: 20. 

Our Team


Head of the Cyber Security Program of Study

Idongesit Mkpong-Ruffin, Ph.D.

Idongesit Mkpong-Ruffin, Ph.D.
Associate Professor and CIS Chairperson
P: (850) 599-3042 E: idongesit.ruffin@famu.edu
Office: 308 Benjamin Banneker A

Permanent Faculty Members


Hongmei Chi, Ph.D.
Hongmei Chi, Ph.D.

P: (850) 412-7355 E: hongmei.chi@famu.edu
Office: 211C Benjamin Banneker A
More About Me

Jon deGoicoechea, M.S.
P: (850) 599-3961 E: jon.degoicoechea@famu.edu
Office: 304 Benjamin Banneker A

Deidre W. Evans, Ph.D.
Deidre W. Evans, Ph.D.

Associate Dean/Professor
P: (850) 599-3964 E: deidre.evans@famu.edu
Office: 312 Benjamin Banneker A
More About Me

Edwina Jacobs, M.S.
Edwina Jacobs, M.S.

P: (850) 412-7351 E: edwina1.jacobs@famu.edu
Office: 213 Benjamin Banneker A
More About Me

Edward Jones, Ph.D.
Edward Jones, Ph.D.

Professor and Associate Chairperson
P: (850) 412-7349 E: edward.jones@famu.edu
Office: 304 Benjamin Banneker A
More About Me

Jinwei Liu, Ph.D.
Jinwei Liu, Ph.D.
Assistant Professor
P: (850) 599-8647 E:  jinwei.liu@famu.edu
Office: 207 Benjamin Banneker A

Department of Computer & Information Sciences Advisory Board

1. Christina Stallings, President – CSX

2. Jaclyn Parran, Vice President – Eli Lilly

3. Candice Clement-McPhatter – Fifth Third Bank

4. Thomas Moore – Microsoft

5. Veda Bawo – Raymond James

6. Chris Mclean – Grainger

7. Alex Alade – Dow Chemical

8. Justin Simpson – Walmart

9. David Bennett – Johnson & Johnson

The FCC Director, Dr. Idongesit Mkpong-Ruffin, is responsible for overseeing and guiding the mission of the Center. FCC has an Advisory Board of academic, corporate and government representatives who provide advice and guidance on the Center’s annual and strategic plans and performance. The activities of FCC fall into five major areas: research, curriculum/standards, education/training, service/outreach, and efforts to gain certification as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE). The areas are described below:

  • Research: Establish a program of research in Cyber Defense (CD) and Information Assurance (IA). Seek external funding from federal, state, and corporate sources.
  • Curriculum and Standards: Maintain curriculum mappings to industry CD and IA standards and authorization to offer professional certificates to students completing CD and IA courses.
  • Service and Outreach: Implement programs to promulgate CD and IA awareness to students at Florida A&M University and in the local community. Collaborate with other institutions to enhance their capacity for CD and IA education, research and outreach.
  • Support activities related to the Florida A&M University Center of Academic Excellence: The National Security Agency (NSA) and the Department of Homeland Security (DHS) designated Florida A&M University as a Center of Academic Excellence (CAE) in Information Assurance Education (IAE) for academic years 2012-2022.
  • The Center is currently applying for re-designation as a Center of Academic Excellence (CAE) in Cyber Defense Education (CDE) for academic years 2022-2027.


Edward Jones, Ph.D.




  • Mkpong-Ruffin, Idongesit, Hannis, Melissa, Student Educational Learning Experience Through Cooperative Research, National Cyber Summit –Cybersecurity 2021:Pivot, Respond, Inoculate Conference 2021 –November2021
  • Liu, J., Cheng, L., Chi, H., et al (2021, July). CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber Attacks. In 2021 International Conference on Computer Communications and Networks (ICCCN) (pp. 1-6). IEEE.
  • Prodanoff, Z., White-Williams, C., & Chi, H. (2021). Regulations and Standards Aware Framework for Recording of mHealth App Vulnerabilities. International Journal of E-Health and Medical Communications (IJEHMC), 12(3), 1-16.
  • Li, H., Yang, S., Chi, H., Xu,L. et al. (2021). Enhancing Attention and Memory of Individuals at Clinical High Risk for Psychosis with mHealth Technology. Asian Journal of Psychiatry, 102587.
  • Taeb,M., Chi,H. Jones, E. L. et al.Inherent Discriminability of BERT towardsRacial Minority Associated Data, The 21st International Conference on Computational Science and Applications (ICCSA 2021), Sept 13 - 16, 2021
  • Liu, Jinwei, Haiying Shen, Hongmei Chi, et. al "A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage." IEEE/ACM Transactions on Networking ( Volume: 29, Issue: 4, Aug. 2021): 1436 - 1451.
  • Taeb, Maryam and Hongmei Chi, A Personalized Learning Framework for Software Vulnerability Detection and Education, 2021 International Workshop on Cyber Security (CSW 2021)-- Ei Compendex & Scopus—Call for paper August 13-15, 2021|Stockholm, Sweden|


  • Li, Huijun, Camille Lewis, Hongmei Chi, Gwendolyn Singleton, and Nailah Williams. "Mobile Health Applications for Mental Illnesses: An Asian Context." Asian Journal of Psychiatry (2020): 102209.
  • Bertony Bornelus, Hongmei Chi, and Guillermo A. Francia III, Integrating Blockchain Technology in Healthcare via Active Learning, The Annual ACM Southeast Conference, Tampa, April 02-04, 2020
  • Gokila Dorai, Eleason Williams, Hongmei Chi and Richard Alo, Is your Smart Home a Secure Home? - Analysis of Smart Home Breaches and Approach for Vulnerability Analysis and the Device Isolation, IEEE World Forum on Internet of Things (WF-IOT) 2020.
  • Hongmei Chi, Udochi Maduakor, Integrating DeepFake Detection into Cybersecurity Curriculum, IEEE FTC 2020 - Future Technologies Conference, 5-6 November 2020 | Vancouver, Canada
  • Chi, Hongmei, Meysam Ghaffari, Ashok Srinivasan, and Jinwei Liu. "Development of Cybersecurity Lab Exercises for Mobile Health." In Journal of The Colloquium for Information Systems Security Education, vol. 7, no. 1, pp. 6-6. 2020.
  • J. Liu, L. Cheng, and H. Chi, DeepDive: Examining Determinants of Health Disparities in COVID-19 for Improving Pandemic Health Care, 4th International Conference on Vision, Image and Signal Processing (ICVISP 2020)
  • G.A. Francia, III, E. El-Sheikh, & H. Chi (2020). “Vehicle Security Learning Tools and Scenarios,” Proceedings of the 2020 International Conference on Computer Science and Computational Intelligence: Cyber Warfare and Cybersecurity, Las Vegas, NV. December 14-16, 2020.


  • W. Xu, J. Yan and H. Chi, A Forensic Evidence Acquisition Model for Data Leakage Attacks, The 17th IEEE International Conference on Intelligence and Security Informatics (ISI) July 1-3, 2019, Shenzhen, China.
  • F. Bao, Y. Cao, and H. Chi, Adjoint Forward Backward Stochastic Differential Equations Driven by Jump Diffusion Processes and Its Application to Nonlinear Filtering Problems. International Journal for Uncertainty Quantification. Volume 9, 2019 Issue 2, Pages 143-159
  • B. Bornelus, H. Chi and H. Shahriar, A Novel Framework to Teach Hands-on Laboratory Exercises in Blockchains, ADFSL Conference on Digital Forensics, Security and Law in Daytona Beach, May 15-17, 2019, Florida
  • Aggarwal, S., Dorai, G., Karabiyik, U., Mukherjee, T., Guerra, N., Hernandez, M,. Parsons, J., Rathi, K., Chi, H., Aderibigbe, T. and Wilson, R., "Design and Implementation of a Targeted Data Extraction System for Mobile Devices", Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics.
  • Hossain Shahriar, Md Arabin Islam Talukder, Hongmei Chi, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi: Data Protection Labware for Mobile Security. SpaCCS 2019: 183-195
  • Kavoosi, M., Dulebenets, M. A., Abioye, O. F., Pasha, J., Wang, H., & Chi, H. (2019). An augmented self-adaptive parameter control in evolutionary computation: a case study for the berth scheduling problem. Advanced Engineering Informatics, 42, 100972.
  • Shahriar, H., Talukder, M. A. I., Rahman, M., Chi, H., Ahamed, S., & Wu, F. (2019, July). Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 604-609). IEEE.


  • (Poster Presentation) Mkpong-Ruffin, I., “Quantitative Software Risk Assessment Model in the design phase of Software Development” –The Colloquium for Information Systems Security Education–June2018
  • Manal Bayousef and Hongmei Chi. 2018. Computational Investigations of Optimal Scrambled Halton Sequences. In Proceedings of the Practice and Experience on Advanced Research Computing (PEARC '18). ACM, New York, NY, USA, Article 83, 4 pages. DOI: https://doi.org/10.1145/3219104.3229258
  • Rodney Wilson and Hongmei Chi. 2018. A framework for validating aimed mobile digital forensics evidences. In Proceedings of the ACMSE 2018 Conference (ACMSE '18). ACM, New York, NY, USA, Article 17, 8 pages. DOI: https://doi.org/10.1145/3190645.3190695
  • Temilola Aderibigbe and Hongmei Chi. 2018. Investigation of Florida Housing Prices using Predictive Time Series Model. In Proceedings of the Practice and Experience on Advanced Research Computing (PEARC '18). ACM, New York, NY, USA, Article 92, 4 pages. DOI: https://doi.org/10.1145/3219104.3229253
  • Rathi K., Karabiyik, U., Aderibigbe, T., Chi, H., "Forensic Analysis of Encrypted Instant Messaging Applications on Android", 6th International Symposium on Digital Forensic and Security (ISDFS 2018). March 22-25, 2018 Antalya, Turkey.
  • Ghaffari, J. Wang, A. Chari, A. Srinivasan, K. Viswanathan, A. Mubayi, and H. Chi. Integrating Travel and Epidemic Models for Vector Borne Disease Surveillance. 7th International Conference on Innovations in Travel Modeling (ITIM). National Academies � Transportation Research Board. 2018.
  • Chi, H., Aderibigbe, T., & Granville, B. C. (2018, December). A Framework for IoT Data Acquisition and Forensics Analysis. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 5142-5146). IEEE
  • Alkadi, A., Chi, H., Prodanoff, Z. G., & Kreidl, P. (2018, April). Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection. In SoutheastCon 2018 (pp. 1-5). IEEE.


National Resources:

Regional Resources:

FAMU Resources:

  • Certificate in Compliance
  • ACM: To provide students with the computing field’s premier Digital Library and leading-edge publications, conferences, and career resources.
  • ACM-W: To support, celebrate, and advocate for women in computing at FAMU and the wider community.  
  • CISMO: A mentoring organization specifically for challenging curriculums such as Information Technology, Computer & Information Systems, and Computer Science.
  • ISACA: To expand recognition of the IT Audit and Assurance, Security and IT Governance disciplines
  • I/O Avenue: FAMU’s code academy provides accelerated free training to the local community for in-demand, 21st century skills.
  • Secured Rattler Club: FAMU’s cybersecurity club aims to increase student technical capabilities to respond to information security threats.
  • Student Ambassadors: Students studying technology majors travel across the Florida Panhandle promoting IT, Computer Science, and Engineering to high school students
  • Video Game Club: To learn and teach about game development and participate in gaming culture

Career Resources:

Cybersecurity Teaching & Research Resources:

Professional Development Resources:

Free Cybersecurity Courses:


Contact Us

The Florida A&M University Center for Cybersecurity
1333 Wahnish Way
308-A Banneker Technical Bldg.
Tallahassee, Florida 32307
(850) 599-3050
(850) 599-3221