Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Xiangdong Che
Eastern Michigan University
Ypsilanti, Michigan

Xiangdong Sean Che holds a PhD in computer science from Wayne State University, in addition to master’s degrees in software engineering (Bowling Green State University) and computer engineering (Zhejiang University), and a bachelor’s in electrical engineering from Zhejiang University.

Currently serving as School Director and Full Professor at Eastern Michigan University's School of Information Security and Applied Computing, Sean has been instrumental in advancing the university’s recognition as a Center of Academic Excellence in Information Assurance and Cyber Defense by the National Security Agency (NSA). He has played a pivotal role in the continuous growth of the cybersecurity programs at EMU.

Sean’s teaching portfolio encompasses a diverse range of information technology (IT)/cybersecurity courses, with a research focus on network security and computational intelligence. He has made significant contributions to scholarly literature, with publications spanning journals, conference proceedings, and book chapters. Moreover, he brings a wealth of industrial experience, particularly in network engineering and security, to his academic endeavors.

Sean continues to be actively engaged in professional societies such as IEEE and ACM, where he contributes to conferences, reviews manuscripts, and mentors future IT/cybersecurity professionals. His multifaceted career, blending academia, research, and industry, exemplifies a lifelong dedication to advancing IT and cybersecurity education, research, and practice.


 Natural language processing with Python and spaCy: a practical introduction
Vasiliev Y., No Starch Press, San Francisco, CA, 2020. 192 pp.  Type: Book (978-1-718500-52-5)

Having had three Amazon Alexa units in my house for years, I’ve always wondered how my utterances are interpreted and understood by a machine, and how a machine talks back to me and carries out my commands without error (almo...


Introduction to hybrid intelligent networks: modeling, communication, and control
Guan Z., Hu B., Shen X., Springer International Publishing, New York, NY, 2019. 292 pp.  Type: Book (978-3-030021-60-3)

Human brains are the most advanced intelligent systems to ever exist, yet also the most mysterious systems to be explored. A hybrid intelligent network is a term coined for the brain-inspired artificial intelligence (AI) that emulates ...


Cyber warfare: a multidisciplinary analysis
Green J., Routledge, New York, NY, 2015. 196 pp.  Type: Book (978-1-138793-07-1), Reviews: (2 of 2)

The issue: The nature of cyber warfare involves technology, the military, and laws as well as the whole society. However, government decision makers, security professionals, and academic researchers from various disciplines have differ...


Computational models of complex systems
Mago V., Dabbaghian V., Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 210 pp.  Type: Book (978-3-319012-84-1)

An ancient Chinese saying states: “Since you are inside the mountain, that is exactly the reason why you cannot see the mountain clearly.” This very environment that we live in is comprised of numberless complex sys...


Flexible web visualization for alert-based network security analytics
Hao L., Healey C., Hutchinson S.  VizSec 2013 (Proceedings of the 10th Workshop on Visualization for Cyber Security, Atlanta, GA, Oct 14, 2013) 33-40, 2013.  Type: Proceedings

Visualization, in general, helps reveal patterns and relationships in data. This paper focuses on how to support network security analysis using analyst-driven visualization. A web-based data visualization framework is described. This ...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy