<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="3" pageSize="10" timestamp="Sat, 25 Apr 2026 22:48:12 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=2&amp;tag=data-science">
<NewsItem contentIssues="true" id="79464" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79464">
<Title>Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, &#8230;)</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/header.png" style="max-width: 100%; height: auto;"></p>
    <h1>Professional Graduate Programs Open House, Sat. 10/20</h1>
    <p>The <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">Fall Open House</a> for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB from 9:30-11:30am. Students interested in exploring and/or pursuing these graduate programs (degrees and/or certificates) or just want to learn more about these fields are encouraged to register and attend. CSEE students interested in pursuing a BS/MPS option for selected programs (such as CYBR or Data Science) are especially welcome.</p>
    <p>Programs represented include</p>
    <ul><li>
    <ul><li><strong><a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity</a></strong></li>
    <li><strong><a href="http://datascience.umbc.edu/" rel="nofollow external" class="bo">Data Science</a></strong></li>
    <li><strong><a href="http://www.umbc.edu/hit/" rel="nofollow external" class="bo">Health Information Technology</a></strong></li>
    <li><a href="http://www.umbc.edu/engm/" rel="nofollow external" class="bo">Engineering Management</a></li>
    <li><a href="http://www.umbc.edu/se/" rel="nofollow external" class="bo">Systems Engineering</a></li>
    <li><a href="http://www.umbc.edu/isd/" rel="nofollow external" class="bo">Instructional Systems Development</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/ipdm/" rel="nofollow external" class="bo">Integrated Product Development &amp; Manufacturing</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/techm/" rel="nofollow external" class="bo">Technical Management</a></li>
    </ul></li>
    </ul><p>Faculty program directors will be presenting in individual breakout sessions and relevant support staff will be on-hand to provide administrative overviews, answer questions, and mingle. Refreshments will be provided.</p>
    <p>If you are interested, please RSVP at <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">https://openhouse.umbc.edu/</a>. If you have questions contact: *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/" rel="nofollow external" class="bo">Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, …)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professional Graduate Programs Open House, Sat. 10/20   The Fall Open House for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79464/guest@my.umbc.edu/a7478305bcb2d96e34dc23e14d28a5dd/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>engineering-management</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>systems-engineering</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Oct 2018 13:41:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78988" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78988">
<Title>MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a><br></p>
    <h1>MD-AI Meetup holds 1st event at UMBC<br>
    6-8pm Wed 10/3, 7th floor library</h1>
    <p> </p>
    
    <p>A new Maryland-based meetup interest group has been established for Artificial Intelligence (<a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">MD-AI Meetup</a>) and will have its first meeting at UMBC this coming Wednesday (Oct 3) from 6:00-8:00pm in the 7th floor of the library.  The first meeting will feature a talk by UMCP Professor <a href="http://users.umiacs.umd.edu/~resnik/" rel="nofollow external" class="bo">Phil Resnik</a> on the state of NLP and an AI research agenda.  Refreshments will be provided.  The meetup is organized by <a href="http://altaplana.com/grimes.html" rel="nofollow external" class="bo">Seth Grimes</a> and supported by <a href="http://tedco.md/" rel="nofollow external" class="bo">TEDCO</a>, local AI startup <a href="http://redshred.com/" rel="nofollow external" class="bo">RedShred</a>, and the <a href="http://www.mdtechcouncil.com/" rel="nofollow external" class="bo">Maryland Tech Council</a>.</p>
    
    <p>If you are interested in attending this and possibly future meetings (which will probably be monthly), go to the <a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">Meetup<span> site</span></a> and join (it’s free) and RSVP to attend this meeting (<span>if there’s still room)</span>.  If you join the meetup and RSVP, you can see who’s registered to attend.</p>
    <p>These meetups are good opportunities to meet and network with people in the area who share interests. It’s a great opportunity for students who are will be looking for internships or jobs in the coming year.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/" rel="nofollow external" class="bo">MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD-AI Meetup holds 1st event at UMBC  6-8pm Wed 10/3, 7th floor library        A new Maryland-based meetup interest group has been established for Artificial Intelligence (MD-AI Meetup) and will...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78988/guest@my.umbc.edu/9f971bc6300fd641f11e4a00be96e2fb/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>nlp</Tag>
<Tag>robotics</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 29 Sep 2018 23:50:53 -0400</PostedAt>
<EditAt>Sat, 29 Sep 2018 23:50:53 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="78945" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78945">
<Title>Machine learning and AI for cybersecurity: a technical chat with DISA</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3>The UMBC Cyber Defense Lab</h3>
    <p> </p>
    <h1>Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency</h1>
    <h3>James Curry<br>
    Lead Engineer–DoD Cyber Security Range<br>
    Defense Information Systems Agency (DISA)</h3>
    <h3>12:00–1:00pm Friday, 28 September 2018, ITE 227, UMBC</h3>
    <p>A broad reaching brief on the scope and scale of the DISA Mission, followed by a dive into DISA’s efforts to develop Machine Learning and Artificial Intelligence to help defend the nation’s cyber infrastructure. Attendees are highly encouraged to ask questions.</p>
    <p>James Curry is the Lead Engineer of the DoD Cyber Security Range (CSR). The CSR’s mission is to replicate the DoD Information Network (DODIN) environment at lab scale, while maintaining high-fidelity realism. As Lead Engineer, Mr. Curry led the design, acquisition, and implementation of two first-of-its-kind technologies: a Virtual Internet Access Point (vIAP) and a Virtual Joint Regional Security Stack (vJRSS). These technologies enable the DoD Workforce to train in an IaaS-on-demand environment that realistically matches DISA’s core infrastructure. Mr. Curry is a Scholarship for Service (SFS) recipient (2008-2009) and received his masters and bachelors of science in computer science from New Mexico Tech. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming meetings for Fall 2018 include the following.</p>
    <ul><li>Oct 12 Enis Golaszewski, The 2018 UMBC SFS study</li>
    <li>Oct 26 Enis Golaszewski, Using tools in the formal analysis of cryptographic protocols</li>
    <li>Nov 9 Razvan Mintesu, Legal aspects privacy</li>
    <li>Dec 7 Tim Finin, A knowledge graph for cyber threat intelligence</li>
    </ul>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/" rel="nofollow external" class="bo">Machine learning and AI for cybersecurity: a technical chat with DISA</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab       Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency   James Curry  Lead Engineer–DoD Cyber Security Range...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78945/guest@my.umbc.edu/1d7e79c959c784379822047cd7dd1737/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 27 Sep 2018 12:49:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78345">
<Title>NSA highlights strong partnership with UMBC through Featured School campaign</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>NSA highlights strong partnership with UMBC in Featured School campaign</h1>
    <p>Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has led to research, internship, and career opportunities for faculty, students, and alumni. UMBC is the first institution to be highlighted in NSA’s Featured School Series, which launched on September 4.</p>
    <p>“UMBC’s long-standing partnership with NSA has provided valuable experiences for our students, faculty, and alumni to pursue internships, careers, and collaborative research opportunities,” said President Freeman Hrabowski. “Through this work we are helping to address the need for well-trained cyber professionals by creating a network of talented people to protect the state, nation, and world.”</p>
    <p>More than 1100 NSA employees are UMBC alumni, including <strong>Darniet Jennings </strong>‘98, M.S. ‘99, Ph.D. ‘03, information systems management. Jennings continued his dissertation research when he took a job at NSA, where he developed a system to manage big data effectively, which was patented in 2010.</p>
    <div>
    <a href="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" rel="nofollow external" class="bo"><img src="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" alt="" width="100%;float:right;border: 2px solid; padding: 4px;" style="max-width: 100%; height: auto;"></a></div>
    <p>The opportunities at NSA include careers in a broad range of disciplines including cybersecurity, engineering, computer science, language, and biological and chemical sciences. <strong>Regina Hambleton</strong> ‘87, mathematics, has held a number of positions at NSA and is currently the Agency’s deputy director of Engagement and Policy. She began working at NSA while she was a student at UMBC, and participated in a program that allowed her to spend a semester at UMBC taking courses followed by a semester working at NSA.</p>
    <p>The partnership between NSA and UMBC also helps prepare an increasing number of graduates for careers in cybersecurity-related fields, to protect the nation from cyber threats.</p>
    <p><strong>Charles Nicholas</strong>, professor of computer science and electrical engineering, is also highlighted in the Featured School Series campaign. He has spent two sabbaticals at NSA during his time at UMBC, and has mentored students who completed NSA internships, in addition to students who went on to pursue careers at NSA. Nicholas is interested in the intersection of cybersecurity and data science, and the tools that are used to compare malware specimens.</p>
    <p>“There are so many opportunities in the intelligence community, including at NSA,” Nicholas says. “It is important for students interested in those careers to develop technical ability, as well as critical and creative thinking, and I enjoy the chance to help them grow those skills.”</p>
    <p>For more information about the partnership, and a few UMBC alumni who work at NSA, visit the <a href="https://www.nsa.gov/resources/students-educators/featured-schools/umbc.shtml" rel="nofollow external" class="bo">UMBC page on the NSA website</a>.</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/national-security-agency-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image by Marlayna Demond for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">NSA highlights strong partnership with UMBC through Featured School campaign</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    NSA highlights strong partnership with UMBC in Featured School campaign   Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78345/guest@my.umbc.edu/937bbb0918436a7c5bf367c07f1e6516/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Sep 2018 09:12:55 -0400</PostedAt>
<EditAt>Wed, 05 Sep 2018 09:12:55 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76642" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/76642">
<Title>talk: Big Data, Security and Privacy, 11am Wed 5/16</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/05/Bhavani-Thuraisingham.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/05/Bhavani-Thuraisingham-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1><strong>Big Data, Security and Privacy</strong></h1>
    <h3>Prof. Bhavani Thuraisingham, University of Texas at Dallas<br>
    11:00-12:00 Wednesday, 16 May 2018, ITE 459, UMBC</h3>
    <p>The collection, storage, manipulation and retention of massive amounts of data have resulted in serious security and privacy considerations. Various regulations are being proposed to handle big data so that the privacy of the individuals is not violated. For example, even if personally identifiable information is removed from the data, when data is combined with other data, an individual can be identified. This is essentially the inference and aggregation problem that data security researchers have been exploring for the past four decades. This problem is exacerbated with the management of big data as different sources of data now exist that are related to various individuals.</p>
    <p>While collecting massive amounts of data causes security and privacy concerns, big data analytics applications in cyber security is exploding. For example, an organization can outsource activities such as identity management, email filtering and intrusion detection to the cloud. This is because massive amounts of data are being collected for such applications and this data has to be analyzed. The question is, how can the developments in big data management and analytics techniques be used to solve security problems? These problems include malware detection, insider threat detection, and intrusion detection.</p>
    <p>To address the challenges of big data security and privacy as well as big data analytics for cyber security applications, we organized a workshop sponsored by the National Science Foundation in September 2014 and presented the results in 2015 at an inter-agency workshop in Washington DC. Since then several developments have been reported on big data security and privacy as well as on big data analytics of cyber security. This presenting will summarize the findings of the workshop and discuss the developments and directions.</p>
    <hr><p><a href="https://www.utdallas.edu/~bhavani.thuraisingham/" rel="nofollow external" class="bo">Dr. Bhavani Thuraisingham</a> is the Louis A. Beecherl, Jr. Distinguished Professor in the Erik Jonsson School of Engineering and Computer Science at The University of Texas at Dallas (UTD) and the Executive Director of UTD’s Cyber Security Research and Education Institute since October 2004. She is also a Senior Research Fellow at Kings College, University of London (2015-2018) and a New America Cyber Security Policy Fellow (2017-2018). Her current research is on integrating cyber security and data science. Prior to joining UTD she worked at the MITRE Corporation for 16 years including a three-year stint as a Program Director at the NSF. She initiated the Data and Applications Security program at NSF and was a member of the Cyber Trust theme. While at MITRE she was a department head and was also a technical advisor to the DoD, the NSA, the CIA, and the IRS. Prior to that, she worked for the commercial industry for six years including at Honeywell, Inc. She is the recipient of numerous awards including the IEEE CS 1997 Technical Achievement Award, the IEEE ISI 2010 Research Leadership Award, ACM SIGSAC 2010 Outstanding Contributions Award, SDPS 2012 Transformative Achievement Gold Medal, 2013 IBM Faculty Award, ACM CODASPY 2017 Innovative and Lasting Research Contributions Award, IEEE CS Services Computing 2017 Research Innovation Award, and Dallas Business Journal 2017 Women in Technology Award. She is a 2003 Fellow of the IEEE and the AAAS and a 2005 Fellow of the British Computer Society. She has published over 120 journal articles, 250 conference papers, 15 books, has delivered over 130 keynote and featured addresses, and is the inventor of six US patents. She has chaired/co-chaired top tier conferences including the Women in Cyber Security (WiCyS) 2016, ACM CCS 2017, and is serving as the Program co-Chair for IEEE ICDM 2018. She also delivered a featured address at the Women in Data Science (WiDS) conference in 2018. She received her PhD at the University of Wales, Swansea, UK, and the earned higher doctorate (D. Eng) from the University of Bristol, England, UK for her published research in secure data management.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/05/talk-umbc-bhavani-thuraisingham-big-data-security-privacy-utd/" rel="nofollow external" class="bo">talk: Big Data, Security and Privacy, 11am Wed 5/16</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Big Data, Security and Privacy   Prof. Bhavani Thuraisingham, University of Texas at Dallas  11:00-12:00 Wednesday, 16 May 2018, ITE 459, UMBC   The collection, storage, manipulation and retention...</Summary>
<Website>https://www.csee.umbc.edu/2018/05/talk-umbc-bhavani-thuraisingham-big-data-security-privacy-utd/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76642/guest@my.umbc.edu/973c2409255673a40cf2a563d30a3181/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 15 May 2018 08:44:32 -0400</PostedAt>
<EditAt>Thu, 03 May 2018 08:44:32 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="75698" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/75698">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/04/dark_web.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/dark_web-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>Classifying Malware using Data Compression</strong></h1>
    <h2>Charles Nicholas, UMBC</h2>
    <h3>12:00–1:00pm Friday, 20 April 2018, ITE 229</h3>
    <p>Comparing large binary objects can be tricky and expensive. We describe a method for comparing such strings, using ideas form data compression, that is both fast and effective. We present results from experiments applying this method, which we refer to as LZJD, to the areas of malware classification and digital forensics.</p>
    <p><a href="https://www.csee.umbc.edu/~nicholas/charles_nicholas.html" rel="nofollow external" class="bo">Charles Nicholas</a> (*protected email*) earned his B.S. in Computer Science from the University of Michigan – Flint in 1979, and the M.S. and Ph.D. degrees in Computer Science from Ohio State University in 1982 and 1988, respectively. He joined the Computer Science Department at UMBC in 1988. His research interests include electronic document processing, intelligent information systems, and software engineering. In recent years he has focused on the problems of storing and retrieving information from large collections of documents. Intelligent software agents are an important aspect of this work. Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/04/talk-classifying-malware-using-data-compression-umbc-nicholas-cybersecurity/" rel="nofollow external" class="bo">🗣 talk: Classifying Malware using Data Compression, 12-1 Fri 4/20, ITE229</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Classifying Malware using Data Compression   Charles Nicholas, UMBC   12:00–1:00pm Friday, 20 April 2018, ITE 229   Comparing large binary objects can be...</Summary>
<Website>https://www.csee.umbc.edu/2018/04/talk-classifying-malware-using-data-compression-umbc-nicholas-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/75698/guest@my.umbc.edu/af742b2d5bd0e690e50299c23c102811/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 15 Apr 2018 18:08:07 -0400</PostedAt>
<EditAt>Sun, 15 Apr 2018 18:08:07 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="74886" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74886">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1>Global Impact, Promise &amp; Perils of Blockchain</h1>
    <p>UMBC Professors <a href="https://www.csee.umbc.edu/haibin-zhang/" rel="nofollow external" class="bo">Haibin Zhang</a> (Computer Science and Electrical Engineering) and <a href="http://karuna.informationsystems.umbc.edu/" rel="nofollow external" class="bo">Karuna Joshi</a> (Information Systems) will be panelists for an event focused on the impact, promise and perils of blockchain technologies at the <a href="http://www.bwtechumbc.com/" rel="nofollow external" class="bo">bwtech@UMBC Research &amp; Technology Park</a>. The event will take place from 8:15 to 11:15am on Tuesday, March 20 2018 at and will include breakfast and time for networking.  They will be joined on the panel by <a href="https://www.linkedin.com/in/marcus-edwards/" rel="nofollow external" class="bo">Marcus Edwards</a>, from Northrop Grumman’s Cyber &amp; Intelligence Mission Solutions, <a href="https://www.linkedin.com/in/steve-cook-15283a/" rel="nofollow external" class="bo">Steve Cook</a> of Verizon Enterprise Solutions, <a href="https://www.linkedin.com/in/sean-manion-6383a64/" rel="nofollow external" class="bo">Sean Manion</a> of  Science Distributed and moderator <a href="https://www.linkedin.com/in/razvan-miutescu-83b44912/" rel="nofollow external" class="bo">Razvan Miutescu</a> of Whiteford, Taylor &amp; Preston, LLP.   For more information and tickets are available on <a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo">eventbrite</a>.</p>
    <h1><a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo"><strong>CyberInnovation Briefing: The Global Impact, Promise &amp; Perils of Blockchain</strong></a></h1>
    <h4>8:15 – 11:15 Tuesday, March 20, 2018</h4>
    <h4>bwtech@UMBC Research &amp; Technology Park<br>
    5520 Research Park Drive, Baltimore, MD 21228</h4>
    <p>Cryptocurrency market capitalizations have soared over the past year and new innovative blockchain applications are continuing to emerge seemingly by the day. However, the average end-user is left to singularly make sense of a vast and global marketplace that is rapidly converging the core tenets of economics and technology development. The future prospects of traditional business and financial models is uncertain as blockchain technology leaves key decision makers in an untenable position to either adopt and adapt or simply be left behind. Industry and academic experts in the field will discuss the pros and cons and opportunities and challenges of this disruptive technology movement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/" rel="nofollow external" class="bo">🗣️ CyberInnovation Briefing: Global Impact, Promise &amp; Perils of Blockchain</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Global Impact, Promise &amp; Perils of Blockchain   UMBC Professors Haibin Zhang (Computer Science and Electrical Engineering) and Karuna Joshi (Information Systems) will be panelists for an event...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74886/guest@my.umbc.edu/071b57ec9d7f66fc52ec392277325cb1/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 16 Mar 2018 08:34:37 -0400</PostedAt>
<EditAt>Fri, 16 Mar 2018 08:34:37 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="74319" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74319">
<Title>UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/capture-the-flag.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC Cyber Dawgs<br>
    Capture The Flag Cybersecurity Competition</h1>
    <p>The national champion <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">UMBC Cyber Dawgs</a> will hold the second annual computer security Capture The Flag (CTF) competition on Sunday, March 11th from 11am-7pm in the UC Ballroom. This CTF event is a Jeopardy-style competition where teams of four people use their laptops to discover answers to questions about cybersecurity, including network forensics, reverse engineering, reconnaissance, and cryptography. Each question has a point value based upon its difficulty and whichever team has the most points at the end wins!</p>
    <p>The competition is open to all current UMBC students and student from a few other nearby schools. Both beginners and experts are welcome to participate.</p>
    <p>Prizes will be awarded to the top teams. There will also be door prizes for randomly selected participants as well as T-Shirts for everyone. Some prizes from last year include Raspberry Pis, a Wireless Pineapple Nano, a YARD Stick One, and a Chromebook! Lunch and dinner (Lima’s Chicken) will be provided for everyone.</p>
    <p>Students who are interested must <a href="https://goo.gl/forms/g2oxUMeyKYlf2QVD3%22" rel="nofollow external" class="bo">register</a> online in advance and bring a laptop to the event. Please note any dietary restrictions on the registration form as well as your T-Shirt size. See the <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">event website</a> for more information</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/" rel="nofollow external" class="bo">UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Dawgs  Capture The Flag Cybersecurity Competition   The national champion UMBC Cyber Dawgs will hold the second annual computer security Capture The Flag (CTF) competition on Sunday,...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74319/guest@my.umbc.edu/2e5232853dad24355b1c4efb82961c8a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 26 Feb 2018 23:53:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73663" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73663">
<Title>talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" alt="hardware cybersecurity" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Towards Hardware Cybersecurity</strong></h1>
    <h3><strong><a href="https://ece.gmu.edu/~hhomayou/goal.html" rel="nofollow external" class="bo">Professor Houman Homayoun</a><br>
    George Mason University<br></strong></h3>
    <h4><strong><span>11:00am-12:00pm Tuesday, 20 Febuary 2018</span>, ITE 325, UMBC</strong></h4>
    <p>Electronic system security, trust and reliability has become an increasingly critical area of concern for modern society. Secure hardware systems, platforms, as well as supply chains are critical to industry and government sectors such as national defense, healthcare, transportation, and finance.</p>
    <p>Traditionally, authenticity and integrity of data has been protected with various security protocol at the software level with the underlying hardware assumed to be secure, and reliable. This assumption however is no longer true with an increasing number of attacks reported on the hardware. Counterfeiting electronic components, inserting hardware trojans, and cloning integrated circuits are just few out of many malicious byproducts of hardware vulnerabilities, which need to be urgently addressed.</p>
    <p>In the first part of this talk I will address the security and vulnerability challenges in the horizontal integrated hardware development process. I will then present the concept of hybrid spin-transfer torque CMOS look up table based design which is our latest effort on developing a cost-effective solution to prevent physical reverse engineering attacks.</p>
    <p>In the second part of my talk I will present how information at the hardware level can be used to address some of the major challenges of software security vulnerabilities monitoring and detection methods. I will first discuss these challenges and will then show how the use of data at the hardware architecture level in combination with an effective machine learning based predictor helps protecting systems against various classes of hardware vulnerability attacks.</p>
    <p>I will conclude the talk by emphasizing the importance of this emerging area and proposing a research agenda for the future.</p>
    <p><a href="https://ece.gmu.edu/~hhomayou" rel="nofollow external" class="bo">Dr. Houman Homayoun</a> is an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. He also holds a courtesy appointment with the Department of Computer Science as well as Information Science and Technology Department. He is the director of GMU’s Accelerated, Secure, and Energy-Efficient Computing Laboratory (ASEEC).  Prior to joining GMU, Houman spent two years at the University of California, San Diego, as NSF Computing Innovation (CI) Fellow awarded by the CRA-CCC. Houman graduated in 2010 from University of California, Irvine with a Ph.D. in Computer Science. He was a recipient of the four-year University of California, Irvine Computer Science Department chair fellowship. Houman received the MS degree in computer engineering in 2005 from University of Victoria and BS degree in electrical engineering in 2003 from Sharif University of Technology. Houman conducts research in hardware security and trust, big data computing, and heterogeneous computing, where he has published more than 80 technical papers in the prestigious conferences and journals on the subject. Since 2012 he leads ten research projects, a total of $7.2 million in funding, supported by DARPA, AFRL, NSF, NIST, and GM on the topics of hardware security and trust, big data computing, heterogeneous architectures, and biomedical computing. Houman received the 2016 GLSVLSI conference best paper award for developing a manycore accelerator for wearable biomedical computing. Since 2017 he has been serving as an Associate Editor of IEEE Transactions on VLSI. He is currently serving as technical program co-chair of 2018 GLSVLSI conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/" rel="nofollow external" class="bo">talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Towards Hardware Cybersecurity   Professor Houman Homayoun  George Mason University    11:00am-12:00pm Tuesday, 20 Febuary 2018, ITE 325, UMBC   Electronic system security, trust and reliability...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73663/guest@my.umbc.edu/346faa5a3054d6e7d0b17a902843a9e0/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 19:08:51 -0500</PostedAt>
<EditAt>Sat, 17 Feb 2018 19:08:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="72613" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72613">
<Title>talk: A Practitioner&#8217;s Introduction to Deep Learning, 1pm Fri 11/17</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/deep_learning.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>ACM Tech Talk Series</h4>
    <h1><strong>​A Practitioner’s Introduction to Deep Learning</strong></h1>
    <h3>​Ashwin Kumar Ganesan, PhD student</h3>
    <h3>1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC</h3>
    <p>In recent years, Deep Neural Networks have been highly successful at performing a number of tasks in computer vision, natural language processing and artificial intelligence in general. The remarkable performance gains have led to universities and industries investing heavily in this space. This investment creates a thriving open source ecosystem of tools &amp; libraries that aid the design of new architectures, algorithm research as well as data collection.</p>
    <p>This talk (and hands-on session) introduce people to some of the basics of machine learning, neural networks and discusses some of the popular neural network architectures. We take a dive into one of the popular libraries, Tensorflow, and an associated abstraction library Keras.</p>
    <p>To participate in the hands-on aspects of the workshop, bring a laptop computer with Python installed and install the following libraries using pip.  For windows or (any other OS) consider doing an installation of anaconda that has all the necessary libraries.</p>
    <ul><li>numpy, scipy &amp; scikit-learn</li>
    <li>tensorflow / tensoflow-gpu (The first one is the GPU version)</li>
    <li>matplotlib for visualizations (if necessary)</li>
    <li>jupyter &amp; ipython (We will use python2.7 in our experiments)</li>
    </ul><p>Following are helpful links:</p>
    <ul><li><a href="https://www.tensorflow.org/install/" rel="nofollow external" class="bo">https://www.tensorflow.org/install/</a></li>
    <li><a href="https://www.scipy.org/install.html" rel="nofollow external" class="bo">https://www.scipy.org/install.html</a></li>
    </ul><p>Contact Nisha Pillai (NPillai1 at umbc.edu) with any questions regarding this event.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/" rel="nofollow external" class="bo">talk: A Practitioner’s Introduction to Deep Learning, 1pm Fri 11/17</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ACM Tech Talk Series   ​A Practitioner’s Introduction to Deep Learning   ​Ashwin Kumar Ganesan, PhD student   1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC   In recent years, Deep Neural...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72613/guest@my.umbc.edu/e6c0244a9107e67e192737ee9aca6200/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Nov 2017 14:56:17 -0500</PostedAt>
</NewsItem>

</News>
