Summary
The Department of Cyber Security Engineering (CYSE) was established to meet the urgent and growing demand for professionals capable of protecting complex systems at the intersection of the physical and digital worlds.
Building on George Mason’s leadership in engineering and information security, CYSE launched the first bachelor’s program of its kind in the United States, creating a model that integrates cybersecurity into system design from the very beginning. Since then, the department has expanded to include master’s and accelerated degree programs, a thriving capstone experience, and a dynamic research enterprise recognized nationally and internationally.
Our Mission
To educate and inspire the next generation of cybersecurity engineers through rigorous programs that combine technical knowledge, practical application, and innovative thinking, while contributing impactful research that strengthens the security and resilience of society’s critical systems.
CYSE is committed to advancing research that anticipates emerging threats, develops adaptive defenses, and secures cyber-physical systems across critical domains such as infrastructure, communications, and smart technologies. We prepare future leaders through rigorous programs that build advanced technical skills and problem-solving abilities, while supporting students with scholarships, mentorship, and experiential learning. Through partnerships with government, industry, and academia, we ensure our work guides practice, informs policy, and strengthens the resilience of global systems.
Source: Website
OnAir Post: CYSE- Cyber Security Engineering Department
News
When George Mason University cyber security engineering student Noah Hinger interned at Surefire Cyber in summer 2023, his managers were so impressed with his work that they invited him back. Thanks to his previous experience, the Honors College student was able to take on more responsibility this summer at the computer security company and contribute to more projects.
“The experience from my first summer here let me understand what was happening and contribute across the company,” said Hinger, who is a sophomore in the College of Engineering and Computing. “Surefire Cyber has an amazing internship program. They’re investing in us by having professional development meetings and providing us with the opportunity to talk to experts from different fields.” said Hinger.
“I think it’s helped me a lot to be able to practice my independence and accountability,” said Hinger, who also competes in George Mason’s Chess and Competitive Cyber Clubs. “I’ve had the chance to do projects on my own without necessarily needing to report to someone, and I’ve also learned so much from all the smart people at Surefire Cyber.”
What made you choose Surefire Cyber for your internships?
Surefire Cyber is a digital forensics and incident response company. When an organization gets hacked, they call Surefire Cyber to conduct an investigation and restore systems so that everything’s OK. As a technology intern, I am helping develop the code that our forensic analysts use to figure out what’s happened and retrieve all the essential data. Surefire Cyber is really exceptional at using a lot of automation tools so that the forensic analysts can focus more on the big picture and the data they’re working with.
What does a typical day interning at Surefire Cyber look like for you?
I work under two groups: software development and information operations, or DevOps, and security engineering. For DevOps, I help to manage company infrastructure and work on a lot of coding assignments.
Traditionally, there are software developers, and there are operations, which maintain it. DevOps is kind of a hybrid role, which means it entails coding, setting up servers, and being responsible for maintaining the infrastructure.
How would you say George Mason has helped prepare you for this role?
I definitely think more critically when problem-solving this time around, and I think that’s in part due to George Mason, especially the Honors College research and literature classes that I’ve taken. I’m learning about a lot of new technologies in real time, so I have to be able to research and read about them and then apply that knowledge to my work. The courses have definitely helped me when it comes absorbing the information I’m reading about and then transferring it to my assignments at Surefire Cyber.
Another thing about the Honors College is that I get to meet different people from different disciplines, and that’s really helped me at Surefire Cyber when connecting and networking with colleagues. I think that’s been really rewarding and something that George Mason’s helped prepare me for.
I’ve also gotten a lot of experience in my systems engineering and digital systems engineering classes, and getting to see what goes into a lot of security minded decisions is very similar to what I’m doing in this internship.
What’s your favorite thing about interning at Surefire Cyber?
My favorite thing about the company is that it’s always driving innovation and new discoveries within cybersecurity and digital forensics. They’re always pushing for the best and trying to help people. That’s the whole point of digital forensics is to be there for and helping them out on the worst day of their life.
Fatima Majid, a George Mason University senior majoring in cyber security engineering, was not just the only one-person team in the top 10 award winners at a recent National Defense Industrial Association (NDIA) cyber competition, she was the only student team. Majid placed ninth out of 51 teams, most of them comprising industry experts.
“I went in, and they were all professional teams, like from Lockheed Martin. I thought, ‘I want to go home,’” said Majid with a laugh, describing her initial cold feet. “But I told myself I could do it. It helped that it was hosted at George Mason, and I had professors there giving me support.”
Her project focused on how the Department of Defense (DoD) can protect critical U.S. infrastructure against low-cost drone attacks at scale, informed by Ukraine’s “Operation Spiderweb,” which used 117 drones to attack Russian air bases in June 2025.

Majid spent the summer in Richmond during a public policy internship. Photo provided
Majid’s lightbulb moment came with a flash as bright as a Virginia speed camera catching a lead-footed driver. Considering the significant network of traffic cameras in the commonwealth, she conceived SkyEyes. This applies an artificial intelligence (AI) model to the live feed of the Virginia 511 camera network, which provides real-time traffic information to citizens and transportation officials. SkyEyes demonstrated how a low-cost, AI-enabled surveillance layer could differentiate threats from non-threats, employing geofencing logic to define safe versus threat zones around sensitive sites.
“I understand how drones work because of what I’ve done at George Mason’s MIX lab—and since I know how to build it, I also know how to jam it. I trained the AI model on a data set provided from a contest sponsor, and that data set had drone imaging and drone prototyping,” she said. “The camera feeds can find objects flying, but what if it’s an Amazon drone, for example? Then I added geofencing and threat analysis to observe the behavior of the drone—if it’s a drone at 2 a.m., for example, maybe that’s sketchy. So, the model gets smarter.”
Majid said that to access the cameras, all she had to do was make a phone call to the right person and explain her project. She cited time spent this summer at the Virginia Academy of Science, Engineering, and Medicine in the Undergraduate Policy Program (VASEM UPP) in Richmond as giving her confidence and exposure to how government works.
K. L. Akerlof, an associate professor in the Department of Environmental Science and Policy at George Mason, said, “The VASEM UPP is a unique opportunity for undergraduates to learn about opportunities in science policy at the state level. The immersive experience of spending a week in Richmond visiting the General Assembly and state agencies, while getting a crash course in how research evidence relates to public policy, can open new doors and career pathways.”
Majid said the strong showing gave her tremendous exposure to influential professional contacts. She fielded several questions about her simulation and future professional plans from a man she only later realized was Retired Brigadier General and NDIA Executive Vice President Guy Walsh.
“Because he showed interest, after he walked away, a crowd of people gathered around to ask me questions. It was very validating.”
She also had a long conversation about her project with Harley Stout, acting chief digital and AI officer at the Joint Chiefs of Staff.
Majid is still pleasantly shocked by her top-10 finish. She is working with Mohamed Gebril, an associate professor in Cyber Security Engineering, on expanding the research. She is confident that such a cost-efficient solution for critical infrastructure protection against drone attacks will attract more funding opportunities.
She credited the supportive culture at Mason—and her family—for keeping her grounded and encouraging her throughout, saying their support made the accomplishment even more meaningful.
When George Mason University cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland, in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.
“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.
Since winter 2024, the Honors College student has been interning at the Commonwealth Cyber Initiative(CCI) Northern Virginia Node, George Mason’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.

“It’s a super exciting job because I get to work with AprilTags, which are on objects that the drone’s camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.
Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the CCI Symposium in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close, environmental variables, cyber-attacks, and more,” he explained.
Wadlin learned about many of the tools he’s currently using for CCI in his classes with College of Engineering and Computing professors, such as his mentor Mohamed Gebril, an associate professor in the Department of Cyber Security Engineering.
“George Mason supports people where they are to get them where they want to be,” Wadlin said.
The skills Wadlin has acquired during his time at George Mason and in his work with CCI have enable him to help other students in their studies.
“Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George Mason. He even assists the students during our workshops,” said Gebril.
Wadlin is participating in George Mason’s Bachelor’s to Accelerated Master’s Program and will to pursuing a master’s degree also in cyber security. Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student.
“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cutting–edge technology,” said Gebril.
Wadlin’s team is also working to develop a first–of–its–kind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.
Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas.
“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That’s always got to be the end goal,” said Wadlin.
George Mason University Cybersecurity Engineering associate professor Mohamed Gebril led a team of students to the first-ever BattleDrone competition, an exercise coordinated through the Commonwealth Cyber Initiative.
In April, Mohamed Gebril, an associate professor in George Mason University’s Cyber Security Engineering Department, took a team of students into “battle.” The team traveled to Blacksburg, Virginia, for a BattleDrones Competition that was hosted by the Commonwealth Cyber Initiative (CCI) at Virginia Tech’s Drone Park.
Gebril emphasized that the inaugural battle was not really a competition but a learning experience. CCI began working on this competition in 2020, but the pandemic halted its progress. This was the first time the event was held.
“It was not a competition per se. All the teams worked together to get this project off the ground,” said Gebril, who teaches in Mason’s College of Engineering and Computing. “CCI-VT ran into some issues with some of the computer vision tools, but overall it was a great learning experience.”
The main objective of the competition, according to Gebril, was to have student teams assemble their own drones with materials provided by CCI-VT research group, as well as promote interest in these kinds of activities among younger students.
For the competition, Gebril pulled together a team of Mason cyber security engineering majors interested in hands-on opportunities, which included senior Kylie Amison, senior Corrado Apostolakis, senior Brandon Henry, junior Casey Cho, sophomore Zaid Osta, and Mahmoud Zaghloul, an area high school student.
By all accounts, it was a successful trip.
“The team did really well,” Gebril said. “They were able to assemble the drone successfully. We are also working on continuing this project by adding cybersecurity features to enhance this learning experience.”
Will they compete again?
“Yes, indeed,” he said. “Our students love this project and how it applies concepts learned in classrooms toward this hands-on activity.”
CCI is a network of Virginia industry, higher education, and economic development partners dedicated to cybersecurity research, innovation, and workforce development. Mason leads the Northern Virginia Node of the network.
About
Chair’s Statement
Welcome to the Department of Cyber Security Engineering––the first of its kind in the country and the top-ranked program in Virginia.
We are leaders in education in this field, offering both a bachelor’s degree and a master’s degree in cyber security engineering.
Our programs prepare students to tackle some of the most daunting security issues of our day. We teach engineers how to design large, secure systems from the ground up.
Demand for our graduates has never been higher. One group suggests that the global cybersecurity workforce shortage will reach upwards of 1.8 million unfilled positions by 2022. Other reports put that number above 3 million.
Our faculty members are world-renowned leaders in education and research, and our students have the opportunity to work with them in some of the best labs in the country.
Our focus is not only on giving students the technical knowledge they need but helping them become leaders in their fields.
We strive to provide our students with a foundation that will serve them for a career of life-long learning while also advancing the frontiers of engineering.
Explore our programs on this website and see for yourself.
Sincerely,
Paulo Costa
Chair, Department of Cyber Security Engineering
Source: Website
Contact
Email: School
Locations
Cyber Security Engineering Department
Room 359 (Mail Stop 6B1)
Research Hall
George Mason University
Phone: 703-993-6760
Web Links
Degrees
The Department of Cyber Security’s (CYSE) challenging curriculum, dedicated faculty, and state-of-the-art labs will give you the expertise you need to create and maintain crucial information systems that will protect our nation from cyber threats.
As digital systems are deployed to control services we depend on, such as utilities, transportation, economic mechanisms, and defense, the risk of a malicious attack is growing. Cybercriminals identify weaknesses in communications and data networks to steal or sabotage valuable information. Cybersecurity engineers are the guardians of the digital galaxy.
We train our graduates to meet the urgent need for advanced technical skills in everything related to security and communications.
Bachelor’s Degrees
- Bachelor of Applied Science (BAS): Concentration in Cybersecurity
- Computer Science, BS
- Cyber Security Engineering, BS
- Information Technology: Concentration in Cyber Security
Master’s Degrees
- Applied Information Technology, MS: Concentration in Cyber Security
- Computer Science, MS
- Cyber Security Engineering, MS
- Data Analytics Engineering, MS: Concentration in Cyber Analysis
- Information Security and Assurance, MS
Doctoral Degrees
- Computer Science, PhD
- Information Technology, PhD: Concentration in Information Security and Assurance
- Information Technology, PhD: Concentration in Information Systems
Graduate Certificates
Research Centers
Our research labs and centers are leading the battle against cybercrime. They focus on wireless communications, 5G technology, sensors, artificial intelligence, and more. Take a look at the capabilities and infrastructure available in our laboratories.
Command, Control, Communications, Computing, Cyber, and Intelligence (C5I Center)
Source: Website
The C5I Center at George Mason University is the nation’s first and only civilian university-based entity offering a comprehensive academic and research program in military applications of information technology and cyber security.
Living Innovation Lab
Source: website
NoVa Node’s Living Innovation Lab supports foundational research in such areas as 5G performance and the security of autonomous vehicles, the Internet of Things (IoT), smart manufacturing, smart cities and infrastructure, and mobile communications.
With the assistance of industry partners such as COMSovereign, OPNT, and Widelity, the combined testbed provides the capability to test very precise timing- and navigation-sensitive applications, such as signaling.
The lab, on George Mason’s Arlington Campus Mason Square, has developed open-source testbeds, created with OAI, Open5G, and DARPA-sponsored Linux Foundation software, with 15 software-defined radio audio systems, as well as three commercial-grade functioning NextG Systems. More specifically, these testbeds include:
RARE Lab | The Radar and Radio Engineering Lab ..
Source: website
The Radar and Radio Engineering Lab (RARE Lab) is located at George Mason University’s Volgenau School of Engineering and is focused on enhancing the state of the art in safety and security applications of cognitive radios. The lab has partnerships with industry players, government agencies, as well as other academic institutions in the US and abroad; conducting research projects in areas as diverse as air transportation, high-speed trains, autonomous vehicles, smart power grids, and others.
RPRC-
Source: Website
Mason’s Rapid Prototyping Research Center (RPRC), in the university’s College of Engineering and Computing (CEC), is a premier applied engineering hub located in the National Capital Region. Key patrons include the Department of Defense (DoD), Intelligence Community, and other National Security Agencies.
Using our proven “Capabilities Integration” process, we transform conceptual and theoretical ideas into “real world” integrations involving multi-modal communications and capabilities.
Research Focus
Mason is world-renowned for its systems approach to cybersecurity, with expertise in key areas of advanced manufacturing and supply chain security, such as cyber-vulnerabilities research, 5G security, AI-based intrusion detection, autonomous system security, and secure adoption of smart technologies.
Research of Consequence
Our researchers are at the forefront of exploration and study in several significant areas.
Air transportation management: As a center of excellence in operations research (NEXTOR), our work is staying ahead of the challenge of coordinating an increasingly crowded sky.
Information and network assurance: We’re planning for the next big network hack by building defenses to protect you, your business, and our national communications systems from attack.
Configuration analytics and assurance: The best defense is a good offense. Our researchers are constructing testing methods and automatic systems to keep up with quickly changing user environments, networks, and cyber-physical systems.
Command, Control, Communications, Computing, Cyber, and Intelligence (C5I): We’re the nation’s first and only public university to offer comprehensive education and research in engineering for C5I. No other university has access to such research in sensing and fusion, C3 architectures, communications and signal processing, command support and intelligent systems, modeling and simulation, and distributed education and training.
Secure Information Systems: We’re imagining and composing the new structures for secure information. This realm encompasses information secrecy, integrity, and availability problems.
Exploring New Ideas
From our roots in information and communication technology engineering, our cybersecurity researchers are building inroads into uncharted territories of a future that will be more efficient, safer, healthier, and more prosperous.
Our Faculty are Experts Across Disciplines
- System security including communications, cyber-physical, communications, hardware, and network systems
- Digital forensics and analysis
- Cryptography
- Biometrics
- Security and safety of cyber-physical systems, including the safety and security of trains, aircraft, ships, and automobiles
- Electronic support for medical procedures includes formulating, validating and verifying the safety of the medical workflow, privacy, and medical data, including the protection of personal health identifiers
- Leadership, governance, and policy
George Mason is a Research-1 university, among an elite group of institutions known for performing research at the highest level of productivity and impact.
“No serious company can afford to treat cybersecurity specifically as a network or computer science problem. Cybersecurity must be seen as a first-class consideration from the earliest design phases of a system, versus an afterthought once the system is ready.”
NextG and Wireless Communications
Source: Webpage
Securing Networks and Improving Performance
NextG technology is providing new and improved network performance and speed but is also adding new connected experiences for users.
In healthcare, NextG technology will enable patients to be monitored via connected devices that constantly deliver data on key health indicators, such as heart rate and blood pressure. In the auto industry, NextG combined with machine learning will provide information on traffic, accidents, and more; vehicles will be able to share information with other vehicles and entities on roadways, such as traffic lights.
Our researchers are developing new models and systems to make NextG more useful and secure for businesses, government, and industry.
Automotive Cybersecurity
Our researchers are designing automotive applications that will provide safety and timing guarantees while offering methods for assisting with accident investigations. Our scientists intend to show how some known autonomous vehicle accidents could have been predicted and possibly avoided at the early stages of the design-verify-validate-test life cycle using our methodology.
Battery Technology and Renewable Energy
Our research group has demonstrated that cyber threat actors could exploit battery control systems to cause explosions. To protect against this threat, we are developing new battery safety and protection systems to ensure the physical safety of battery systems. Additionally, we are testing system communication security systems to protect wired and wireless electric charging systems from cybersecurity and electromagnetic attacks.
System Integration and Test-Bed Development
Our scientists are developing a digital-twin virtual test-bed that, in conjunction with physical testing, will permit in-lab, in-simulation, and in-field testing. This full range of testing options will lead to improved transportation safety, cybersecurity, and energy efficiency for future transportation and smart mobility systems, and improve training for cybersecurity, transportation, and digital law-enforcement personnel.
Control Systems and Security
Source: Webpage
Keeping Our Transportation and Healthcare Systems Secure
Research in this area includes the safety and security of trains, aircraft, ships, and automobiles. The goal of this research is to create secure cognitive radio networks that ensure mandated safety guarantees. This research also includes electronic support for medical procedures includes formulating, validating and verification of the safety of medical workflows (now called Careflows), privacy and security of medical data, including the protection of personal health identifiers.
Smart Manufacturing Architecture
Source: Webpage
Improving American Manufacturing
Smart Manufacturing has the potential to make American manufacturing more productive, more energy-efficient, and more competitive.
The team’s work addresses potential methods for formally analyzing safety and security risks in Automated Manufacturing Systems (AMS). They emphasize how to identify components and the communication interfaces and components can that be modeled using formal methods. The team used an automated manufacturing system producing aluminum cans to show how these processes are modeled using a suite of formal methods that included Linear Time propositional Temporal Logic (LTL), Architecture Analysis and Design Language (AADL), as well as fault and attack tree analysis.
Research Awards and Grants
Source: Webpage
Cyber Security Engineering faculty members, recognized as the best in their fields, conduct valuable research. Their funding sources include a variety of federal agencies, as well as grants from business and industry.
2025
Mohamed Gebril wins grant for research on threat hunting enhanced by generative AI (LLMs)
Associate Professor Mohamed Gebril was awarded funding for the project: “Threat Hunting Enhanced by Generative AI (LLMs).” This research explores how generative AI and large language models (LLMs) can enhance threat-hunting capabilities, improving the detection, analysis, and mitigation of advanced cybersecurity threats. Gebril’s work aims to bridge the gap between AI innovation and practical cybersecurity applications.
The project is part of the Cyber Initiative’s AI for Cybersecurity and Cybersecurity for AI program.
Mohamed Gebril wins grant for automated threat-hunting system development learning program
Associate Professor Mohamed Gebril received funding for the project: “Automated Threat Hunting System Development Learning Program.” This project focuses on creating an automated threat-hunting system to enhance cybersecurity education and workforce development. By integrating cutting-edge technologies and experiential learning, Gebril aims to equip participants with the skills necessary to tackle modern cybersecurity challenges effectively.
Gebril received funding under the 2024 Experiential Learning Program for this research.
Zhuangdi Zhu wins grant for secure, privacy-conscious threat detection research
Assistant Professor Zhuangdi Zhu received funding for the project: “Secure, Privacy-Conscious Threat Detection.” This research focuses on developing advanced methods for detecting cybersecurity threats while ensuring the privacy of sensitive data. Zhu’s work aims to design innovative, privacy-preserving solutions that enhance threat detection without compromising user confidentiality.
The project is part of the Cyber Initiative’s AI for Cybersecurity and Cybersecurity for AI program.
2024
George Mason University receives a grant from the NTIA Public Wireless Supply Chain Innovation Fund
Assistant Professor Vijay Shah and ECE Professor Kai Zeng received a grant for their project on AI-assisted efficient testing methods for 5G radio access networks. This project focuses on the research and development of AI-assisted methods for the testing of O-RAN’s radio units (RU), distributed units (DU), and central units (CU) in terms of their interoperability, performance, and security. Specifically, it aims to design an AI-based testing software framework that can facilitate and automate the 5G O-RAN testing process.
Arafin wins research grant aimed at securing chipset-based semiconductor manufacturing from untrusted supply chains
Md Tanvir Arafin, Assistant Professor of Cybersecurity Engineering, received funding for the project: “Securing Chiplet-based Semiconductor Manufacturing from Untrusted Supply Chains.” In this project, Arafin and his group will design provable trust embedding techniques for counterfeit chiplet detection.
Arafin received $50,000 from the Virginia Innovation Partnership Authority for this research. Funding began in Jan. 2024 and will end in Jan. 2025.
Vijay K. Shah receives funding from the National Telecommunications and Information Administration (NTIA)
Vijay K. Shah received funding from the National Telecommunications and Information Administration (NTIA) Wireless Innovation Fund on O-RAN Testing R&D award to build a comprehensive cybersecurity testing framework for 5G Radio Access Networks.
Anticipated funding: $480K
More info: https://www.nextgwirelesslab.org/o-ran-cybersecurity-testing
Vijay K. Shah and Kai Zeng receive funding from the National Telecommunications and Information Administration (NTIA)
Vijay K. Shah and Kai Zeng received funding from the National Telecommunications and Information Administration (NTIA) Wireless Innovation Fund. The project aims to formulate AI-assisted testing methods for 5G O-RAN components (i.e., RU, DU, and CU) and design an AI-based testing software framework to automate broader 5G Open RAN testing.
Anticipated funding: $700K
Vijay K. Shah receives funding from the Virginia Innovation Partnership Authority
Vijay K. Shah received funding from the Virginia Innovation Partnership Authority for Fingerprinting Technology for Enhancing 5G/NextG O-RAN Supply Chain Risk.
Anticipated funding: $49,993
More info: https://www.nextgwirelesslab.org/fingerprinting-for-o-ran-supply-chain
2023
Vijay K. Shah, Kai Zeng, and Parth Pathak receive funding from the National Science Foundation
Vijay K. Shah, Kai Zeng, and Parth Pathak received funding from the National Science Foundation to secure mmWave communications with reconfigurable intelligence surfaces.
Anticipated funding: $800K
More info: https://www.nextgwirelesslab.org/securis
Vijay K. Shah receives funding from the National Science Foundation
Vijay K. Shah received funding from the National Science Foundation for Collaborative Research: Research Infrastructure: CCRI: New: Distributed Space and Terrestrial Networking Infrastructure for Multi-Constellation Coexistence.
Anticipated funding: $299,989

