<?xml version="1.0"?>
<News hasArchived="true" page="3" pageCount="3" pageSize="10" timestamp="Mon, 20 Apr 2026 20:43:32 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=3&amp;tag=computer-engineering">
<NewsItem contentIssues="true" id="78345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78345">
<Title>NSA highlights strong partnership with UMBC through Featured School campaign</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>NSA highlights strong partnership with UMBC in Featured School campaign</h1>
    <p>Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has led to research, internship, and career opportunities for faculty, students, and alumni. UMBC is the first institution to be highlighted in NSA’s Featured School Series, which launched on September 4.</p>
    <p>“UMBC’s long-standing partnership with NSA has provided valuable experiences for our students, faculty, and alumni to pursue internships, careers, and collaborative research opportunities,” said President Freeman Hrabowski. “Through this work we are helping to address the need for well-trained cyber professionals by creating a network of talented people to protect the state, nation, and world.”</p>
    <p>More than 1100 NSA employees are UMBC alumni, including <strong>Darniet Jennings </strong>‘98, M.S. ‘99, Ph.D. ‘03, information systems management. Jennings continued his dissertation research when he took a job at NSA, where he developed a system to manage big data effectively, which was patented in 2010.</p>
    <div>
    <a href="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" rel="nofollow external" class="bo"><img src="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" alt="" width="100%;float:right;border: 2px solid; padding: 4px;" style="max-width: 100%; height: auto;"></a></div>
    <p>The opportunities at NSA include careers in a broad range of disciplines including cybersecurity, engineering, computer science, language, and biological and chemical sciences. <strong>Regina Hambleton</strong> ‘87, mathematics, has held a number of positions at NSA and is currently the Agency’s deputy director of Engagement and Policy. She began working at NSA while she was a student at UMBC, and participated in a program that allowed her to spend a semester at UMBC taking courses followed by a semester working at NSA.</p>
    <p>The partnership between NSA and UMBC also helps prepare an increasing number of graduates for careers in cybersecurity-related fields, to protect the nation from cyber threats.</p>
    <p><strong>Charles Nicholas</strong>, professor of computer science and electrical engineering, is also highlighted in the Featured School Series campaign. He has spent two sabbaticals at NSA during his time at UMBC, and has mentored students who completed NSA internships, in addition to students who went on to pursue careers at NSA. Nicholas is interested in the intersection of cybersecurity and data science, and the tools that are used to compare malware specimens.</p>
    <p>“There are so many opportunities in the intelligence community, including at NSA,” Nicholas says. “It is important for students interested in those careers to develop technical ability, as well as critical and creative thinking, and I enjoy the chance to help them grow those skills.”</p>
    <p>For more information about the partnership, and a few UMBC alumni who work at NSA, visit the <a href="https://www.nsa.gov/resources/students-educators/featured-schools/umbc.shtml" rel="nofollow external" class="bo">UMBC page on the NSA website</a>.</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/national-security-agency-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image by Marlayna Demond for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">NSA highlights strong partnership with UMBC through Featured School campaign</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    NSA highlights strong partnership with UMBC in Featured School campaign   Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78345/guest@my.umbc.edu/937bbb0918436a7c5bf367c07f1e6516/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Sep 2018 09:12:55 -0400</PostedAt>
<EditAt>Wed, 05 Sep 2018 09:12:55 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="77606" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77606">
<Title>talk: Robot Governance &#8211; Institutions and Issues, 10:30 Tue 7/24, ITR346</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/toy-robot-1024x461.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1><strong>Robot Governance – Institutions and Issues</strong></h1>
    <p> </p>
    <h3>Dr. Aaron Mannes, ISHPI Information Technologies</h3>
    <h3>10:30-11:30 Tuesday, 24 July 2018, ITE 346</h3>
    <p> </p>
    <p>Inexpensive sensors and information storage and processing have enabled the large-scale production of robots: autonomous systems capable of acting on the world. These systems represent an enormous technological and economic opportunity that will change society in countless and unpredictable ways. They will also bring new policy challenges. This presentation examines the missions the government will need to undertake to address the challenges raised by this new technology, identifies critical gaps the government faces in carrying out these missions, and discusses institutional options to address these gaps.</p>
    <p> </p>
    <hr><p> </p>
    <p>Dr. Aaron Mannes is the Senior Policy Advisor at ISHPI Information Technologies, where he supports the Apex Data Analytics Engine (DA-E) at the Department of Homeland Security Science and Technology Directorate. In supporting DA-E, Dr. Mannes collaborates on big data projects that support the Homeland Security Enterprise and researches technology policy. He started at DHS as an American Association for the Advancement of Science Policy Fellow in September 2015. From 2004 to 2015, Dr. Mannes was a researcher at the University of Maryland Institute for Advanced Computer Studies (UMIACS) where he was the subject matter expert on terrorism and international affairs collaborating with a team of inter-disciplinary scientists to build computational tools to support decision-makers facing 21st century security and development problems. Dr. Mannes earned his Ph.D. at the University of Maryland’s School of Public Policy in 2014. His dissertation topic was the evolving national security role of the vice president.</p>
    <p>Dr. Mannes is the author or co-author of four books on terrorism and has written scores of articles, papers, and book chapters on an array of topics including Middle East affairs, terrorism, technology, and other international security issues for popular and scholarly publications including Politico, Policy Review, The Wall Street Journal, Foreign Policy, The Journal of International Security Affairs, The Huffington Post, The National Interest, The Jerusalem Post, and The Guardian.</p>
    <p>This research was conducted with the support of the Apex Data Analytics Engine in the Department of Homeland Security (DHS) Science and Technology Directorate (S&amp;T). In no way should anything stated in this seminar be construed as representing the official position of DHS S&amp;T or any other component of DHS. Opinions and findings expressed in this seminar, as well as any errors and omissions, are the responsibility of the presenter alone.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/" rel="nofollow external" class="bo">talk: Robot Governance – Institutions and Issues, 10:30 Tue 7/24, ITR346</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Robot Governance – Institutions and Issues       Dr. Aaron Mannes, ISHPI Information Technologies   10:30-11:30 Tuesday, 24 July 2018, ITE 346       Inexpensive sensors and information storage...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77606/guest@my.umbc.edu/eb929b4718ba6f9af0b285ec85f5cf78/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Jul 2018 17:27:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="77417" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77417">
<Title>UMBC launches cybersecurity research collaboration with Japanese and UK partners</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <a href="https://www.csee.umbc.edu/wp-content/uploads/2018/07/UMBCKRISRHUL.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/UMBCKRISRHUL-1024x536.jpg" style="max-width: 100%; height: auto;"></a>University leaders, including Karl V. Steiner, third from right, signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan. Photo courtesy of Karl V. Steiner<p> </p>
    <h1><strong>UMBC launches infrastructure-focused cybersecurity research collaboration with Japanese and UK partners</strong></h1>
    <p>UMBC is one of three leading academic institutions collaborating on a new research initiative focused on cybersecurity for critical national infrastructures, including information technology, public transit, and financial services. University leaders signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan.</p>
    <p><span>UMBC, Keio Research Institute (KRIS) in Japan, and Royal Holloway University of London (RHUL) in the UK will partner to investigate the use of common system simulation tools for modeling critical national infrastructure. This partnership is part of a broader international collaboration, the International Cybersecurity Center of Excellence (INCS-COE). It will also involve Hitachi, an international operator in power systems, telecommunication, railways, and other core infrastructure areas.</span></p>
    <p><span>Because cybersecurity attacks may not be limited to national borders, this collaboration argues that defense against such attacks should not be siloed either.</span></p>
    <p><span>“Cybersecurity can no longer be treated as a national issue,” emphasizes </span><strong>Karl V. Steiner</strong><span>, vice president for research at UMBC. “Long-term and productive international collaborations are needed to make significant progress.”</span></p>
    <p><span>Jun Murai, professor of environment and information studies at Keio University, notes, “We look forward to working with our research colleagues in the UK and U.S. to help address the increasingly challenging cyber threats to the security of our respective critical national infrastructures.”</span></p>
    <p><span>Working with a common toolset will enable mixed nationality teams to run simulations together. This will help cybersecurity experts learn how to more effectively address human factors, including cultural differences, in predicting how attacks and responses to those attacks might play out across different geographies.</span></p>
    <p><span>“We are excited to participate in this new research collaboration with our colleagues in Japan and the UK to help us better understand and address some of the key cybersecurity challenges that our nations face from increasingly aggressive international adversaries,” says </span><strong>Anupam Joshi</strong><span>, director of UMBC’s Center for Cybersecurity.</span></p>
    <p><span>The partners in this research see the modeling of system security as increasingly vital for industry and government, for both training purposes and vulnerability analysis.</span></p>
    <p>“This initiative creates many future opportunities including, for example, the opportunity to address the impact on critical national infrastructure security of the exponential growth of the internet of things, and for potential exchanges of expert staff and students,” explains Keith Mayes, head of the Information Security Group (ISG) at Royal Holloway University.</p>
    <p><span>Steiner shares Mayes’s excitement about expanding opportunities for both established and emerging researchers in this growing field. Thanks to leading academic programs in cybersecurity, the bwtech@UMBC Cyber Incubator, and UMBC’s internationally-known Center for Cybersecurity, he says, “UMBC is uniquely positioned in Maryland to become a major global force for research in cybersecurity.”</span></p>
    <p><span>“This partnership,” says Steiner, “builds important connections to move this essential work forward.”</span></p>
    <p>Adapted from a <a href="https://news.umbc.edu/umbc-launches-infrastructure-focused-cybersecurity-research-collaboration-with-japanese-and-uk-partners/" rel="nofollow external" class="bo">UMBC News article</a> written by Megan Hanks. Photo by Marlayna Demond ’11 for UMBC.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/umbc-cybersecurity-research-collaboration-japanese-uk-partners/" rel="nofollow external" class="bo">UMBC launches cybersecurity research collaboration with Japanese and UK partners</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>University leaders, including Karl V. Steiner, third from right, signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan. Photo courtesy of Karl...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/umbc-cybersecurity-research-collaboration-japanese-uk-partners/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77417/guest@my.umbc.edu/fb69bb7ce9baa05f22981b1dd26cee4d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 08 Jul 2018 09:06:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="74319" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74319">
<Title>UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/capture-the-flag.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC Cyber Dawgs<br>
    Capture The Flag Cybersecurity Competition</h1>
    <p>The national champion <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">UMBC Cyber Dawgs</a> will hold the second annual computer security Capture The Flag (CTF) competition on Sunday, March 11th from 11am-7pm in the UC Ballroom. This CTF event is a Jeopardy-style competition where teams of four people use their laptops to discover answers to questions about cybersecurity, including network forensics, reverse engineering, reconnaissance, and cryptography. Each question has a point value based upon its difficulty and whichever team has the most points at the end wins!</p>
    <p>The competition is open to all current UMBC students and student from a few other nearby schools. Both beginners and experts are welcome to participate.</p>
    <p>Prizes will be awarded to the top teams. There will also be door prizes for randomly selected participants as well as T-Shirts for everyone. Some prizes from last year include Raspberry Pis, a Wireless Pineapple Nano, a YARD Stick One, and a Chromebook! Lunch and dinner (Lima’s Chicken) will be provided for everyone.</p>
    <p>Students who are interested must <a href="https://goo.gl/forms/g2oxUMeyKYlf2QVD3%22" rel="nofollow external" class="bo">register</a> online in advance and bring a laptop to the event. Please note any dietary restrictions on the registration form as well as your T-Shirt size. See the <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">event website</a> for more information</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/" rel="nofollow external" class="bo">UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Dawgs  Capture The Flag Cybersecurity Competition   The national champion UMBC Cyber Dawgs will hold the second annual computer security Capture The Flag (CTF) competition on Sunday,...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74319/guest@my.umbc.edu/2e5232853dad24355b1c4efb82961c8a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 26 Feb 2018 23:53:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73663" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73663">
<Title>talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" alt="hardware cybersecurity" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Towards Hardware Cybersecurity</strong></h1>
    <h3><strong><a href="https://ece.gmu.edu/~hhomayou/goal.html" rel="nofollow external" class="bo">Professor Houman Homayoun</a><br>
    George Mason University<br></strong></h3>
    <h4><strong><span>11:00am-12:00pm Tuesday, 20 Febuary 2018</span>, ITE 325, UMBC</strong></h4>
    <p>Electronic system security, trust and reliability has become an increasingly critical area of concern for modern society. Secure hardware systems, platforms, as well as supply chains are critical to industry and government sectors such as national defense, healthcare, transportation, and finance.</p>
    <p>Traditionally, authenticity and integrity of data has been protected with various security protocol at the software level with the underlying hardware assumed to be secure, and reliable. This assumption however is no longer true with an increasing number of attacks reported on the hardware. Counterfeiting electronic components, inserting hardware trojans, and cloning integrated circuits are just few out of many malicious byproducts of hardware vulnerabilities, which need to be urgently addressed.</p>
    <p>In the first part of this talk I will address the security and vulnerability challenges in the horizontal integrated hardware development process. I will then present the concept of hybrid spin-transfer torque CMOS look up table based design which is our latest effort on developing a cost-effective solution to prevent physical reverse engineering attacks.</p>
    <p>In the second part of my talk I will present how information at the hardware level can be used to address some of the major challenges of software security vulnerabilities monitoring and detection methods. I will first discuss these challenges and will then show how the use of data at the hardware architecture level in combination with an effective machine learning based predictor helps protecting systems against various classes of hardware vulnerability attacks.</p>
    <p>I will conclude the talk by emphasizing the importance of this emerging area and proposing a research agenda for the future.</p>
    <p><a href="https://ece.gmu.edu/~hhomayou" rel="nofollow external" class="bo">Dr. Houman Homayoun</a> is an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. He also holds a courtesy appointment with the Department of Computer Science as well as Information Science and Technology Department. He is the director of GMU’s Accelerated, Secure, and Energy-Efficient Computing Laboratory (ASEEC).  Prior to joining GMU, Houman spent two years at the University of California, San Diego, as NSF Computing Innovation (CI) Fellow awarded by the CRA-CCC. Houman graduated in 2010 from University of California, Irvine with a Ph.D. in Computer Science. He was a recipient of the four-year University of California, Irvine Computer Science Department chair fellowship. Houman received the MS degree in computer engineering in 2005 from University of Victoria and BS degree in electrical engineering in 2003 from Sharif University of Technology. Houman conducts research in hardware security and trust, big data computing, and heterogeneous computing, where he has published more than 80 technical papers in the prestigious conferences and journals on the subject. Since 2012 he leads ten research projects, a total of $7.2 million in funding, supported by DARPA, AFRL, NSF, NIST, and GM on the topics of hardware security and trust, big data computing, heterogeneous architectures, and biomedical computing. Houman received the 2016 GLSVLSI conference best paper award for developing a manycore accelerator for wearable biomedical computing. Since 2017 he has been serving as an Associate Editor of IEEE Transactions on VLSI. He is currently serving as technical program co-chair of 2018 GLSVLSI conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/" rel="nofollow external" class="bo">talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Towards Hardware Cybersecurity   Professor Houman Homayoun  George Mason University    11:00am-12:00pm Tuesday, 20 Febuary 2018, ITE 325, UMBC   Electronic system security, trust and reliability...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73663/guest@my.umbc.edu/346faa5a3054d6e7d0b17a902843a9e0/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 19:08:51 -0500</PostedAt>
<EditAt>Sat, 17 Feb 2018 19:08:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="72612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72612">
<Title>talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/quantum_crypto.jpeg" style="max-width: 100%; height: auto;"></h4>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>An Introduction to Quantum Cryptography:</strong><br><strong>Or, How Alice Outwits Eve</strong></h1>
    <h3>Sam Lomonaco, CSEE, UMBC<br>
    12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC</h3>
    <p>Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg’s Uncertainty Principle, the Vernam cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve’s possible eavesdropping strategies, i.e., opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.</p>
    <p><a href="https://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel J. Lomonaco Jr</a>. received his PhD in mathematics from Princeton University. He has been a full professor of computer science and electrical engineering at the University of Maryland, Baltimore County (UMBC) since 1985, serving as founding chair of the CS Department from 1985 to 1991. Representative Awards, Accomplishments, and Honors include: (1) He was a visiting key research scientist at the Mathematical Sciences Research Institute (MSRI) at the University of California at Berkley in 2004. (2) He was a senior LaGrange fellow at the Institute for Scientific Exchange in Torino, Italy in 2005. (3) For contributions made to the development of the programming language Ada, he received an award from the United States Under Secretary of Defense for Research and Engineering, Dr. Richard DeLauer. (4) He was the first to introduce quantum information science to the American Mathematical Society (AMS) by organizing and giving a two-day AMS short course on quantum computation at the Annual Meeting of the AMS in Washington, DC, in January 2000. (5) He published four books on quantum computation and information science. (6) He accepted an invitation to be a guest editor of the Journal of Quantum Information Processing for a special issue on topological quantum computation.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/" rel="nofollow external" class="bo">talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   An Introduction to Quantum Cryptography: Or, How Alice Outwits Eve   Sam Lomonaco, CSEE, UMBC  12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC   Alice...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72612/guest@my.umbc.edu/54e3ce4738d132a9095207c57d198708/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 15 Nov 2017 08:10:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72613" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72613">
<Title>talk: A Practitioner&#8217;s Introduction to Deep Learning, 1pm Fri 11/17</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/deep_learning.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>ACM Tech Talk Series</h4>
    <h1><strong>​A Practitioner’s Introduction to Deep Learning</strong></h1>
    <h3>​Ashwin Kumar Ganesan, PhD student</h3>
    <h3>1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC</h3>
    <p>In recent years, Deep Neural Networks have been highly successful at performing a number of tasks in computer vision, natural language processing and artificial intelligence in general. The remarkable performance gains have led to universities and industries investing heavily in this space. This investment creates a thriving open source ecosystem of tools &amp; libraries that aid the design of new architectures, algorithm research as well as data collection.</p>
    <p>This talk (and hands-on session) introduce people to some of the basics of machine learning, neural networks and discusses some of the popular neural network architectures. We take a dive into one of the popular libraries, Tensorflow, and an associated abstraction library Keras.</p>
    <p>To participate in the hands-on aspects of the workshop, bring a laptop computer with Python installed and install the following libraries using pip.  For windows or (any other OS) consider doing an installation of anaconda that has all the necessary libraries.</p>
    <ul><li>numpy, scipy &amp; scikit-learn</li>
    <li>tensorflow / tensoflow-gpu (The first one is the GPU version)</li>
    <li>matplotlib for visualizations (if necessary)</li>
    <li>jupyter &amp; ipython (We will use python2.7 in our experiments)</li>
    </ul><p>Following are helpful links:</p>
    <ul><li><a href="https://www.tensorflow.org/install/" rel="nofollow external" class="bo">https://www.tensorflow.org/install/</a></li>
    <li><a href="https://www.scipy.org/install.html" rel="nofollow external" class="bo">https://www.scipy.org/install.html</a></li>
    </ul><p>Contact Nisha Pillai (NPillai1 at umbc.edu) with any questions regarding this event.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/" rel="nofollow external" class="bo">talk: A Practitioner’s Introduction to Deep Learning, 1pm Fri 11/17</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ACM Tech Talk Series   ​A Practitioner’s Introduction to Deep Learning   ​Ashwin Kumar Ganesan, PhD student   1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC   In recent years, Deep Neural...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72613/guest@my.umbc.edu/e6c0244a9107e67e192737ee9aca6200/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Nov 2017 14:56:17 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72618" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72618">
<Title>talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/smartcard.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Attacks on Smart Cards, RFIDs and Embedded Systems</h1>
    <h3><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Prof. Keith Mayes</a><br>
    Royal Holloway University of London</h3>
    <h3>10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC</h3>
    <p>Smart Cards and RFIDs exist with a range of capabilities and are used in their billions throughout the world. The simpler devices have poor security, however, for many years, high-end smart cards have successfully been used in a range of systems such as banking, passports, mobile communication, satellite TV etc. Fundamental to their success is a specialist design to offer remarkable resistance to a wide range of attacks, including physical, side-channel and fault. This talk describes a range of known attacks and the countermeasures that are employed to defeat them.</p>
    <p>Prof. Keith Mayes is the Head of the School of Mathematics and Information Security at Royal Holloway University of London. He received his BSc (Hons) in Electronic Engineering in 1983 from the University of Bath, and his PhD degree in Digital Image Processing in 1987. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His interests include the design of secure protocols, communications architectures and security tokens as well as associated attacks/countermeasures. He is a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and a member of the editorial board of the Journal of Theoretical and Applied Electronic Commerce Research (JTAER).</p>
    <p> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/" rel="nofollow external" class="bo">talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Attacks on Smart Cards, RFIDs and Embedded Systems   Prof. Keith Mayes  Royal Holloway University of London   10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC   Smart Cards and RFIDs exist...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72618/guest@my.umbc.edu/f693b6777313d350fc774fad7d734ed2/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 Oct 2017 21:46:20 -0400</PostedAt>
</NewsItem>

</News>
