
I am interested in computer networking and security. Given the significance of the Internet in our economy and society, I am interested in improvements and studies that can have a real-world impact. My recent work has focused on how to make both enterprise and residential networks more secure. In my research work, I am exploring ways to change the traditional computer network communication model using techniques such as software-defined networking and network function virtualization.
I am interested in exploring future directions in computing from a systems, networking, and security standpoint. For example, how will the Internet of Things or the Bring Your Own Device phenomena affect future networks? What will this mean for network provisioning and security? I am interested in working on projects, theses, and dissertations in these directions.
I love teaching computer science and security at WPI. Our students are enthusiastic about mastering the technical details of systems, networks, and software, making it a thrill to work with them. I have previously worked with students in extra-curricular settings, including as an advisor for the WPI Cyber Security Club and as the coach for the WPI Collegiate Cyber Defense Competition Team.
Research Interests
Scholarly Work
Professional Highlights & Honors
News


Media Coverage
The Worcester Business Journal reported on WPI creating a Master’s in Cyber Security, a new graduate program that prepares students to be leaders in the fields of cyber security and computer science. The program launches in fall 2021 and applications are currently being accepted. “We recognize that the workforce needs professionals who can combine technical expertise in security with an understanding of its impact on people and businesses,” Craig Shue, associate professor of computer science, said in a statement.
Time interviewed Craig Shue, associate professor of computer science, for this article (scroll down to 8th graph). Shue told Time he agrees hackers are likely getting Rings users’ account information from third parties. “I would also encourage everybody to do their own form of risk assessment and determine what they need in these devices and whether it’s worth the risk to have that functionality,” he added.