<?xml version="1.0"?>
<News hasArchived="true" page="4" pageCount="6" pageSize="10" timestamp="Sun, 26 Apr 2026 22:37:24 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=4&amp;tag=computer-science">
<NewsItem contentIssues="true" id="86106" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86106">
<Title>talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/05/cps.png" alt="" style="max-width: 100%; height: auto;"><h4>UMBC Cyber Defense Lab</h4>
    
    <h1>Security for Smart Cyber-Physical Systems</h1>
    
    <h3> Prof. Anupam Joshi, UMBC</h3>
    <h3>12:00–1:00pm, Friday, 3 May 2019, ITE 227</h3>
    
    
    
    <p>Smart <a href="https://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">Cyber-Physical Systems</a> (CPS) are increasingly embedded in our everyday life. Security incidents involving them are often high-profile because of their ability to control critical infrastructure. Stuxnet and the Ukrainian power-grid attack are some notorious attacks reported against CPS which impacted governmental programs to ordinary users. In addition to the deliberate attacks, device malfunction and human error can also result in incidents with grave consequences. Hence the detection and mitigation of abnormal behaviors resulting from security incidents is imperative for the trustworthiness and broader acceptance of smart cyber-physical systems. We propose an automatic behavioral abstraction technique, ABATe, which automatically learns their typical behavior by finding the latent “context” space using available operational data and is used to discern anomalies. We evaluate our technique using two real-world datasets (a sewage water treatment plant dataset and an automotive dataset) to demonstrate the multi-domain adaptability and efficacy of our approach.</p>
    
    
    
    <p>Anupam Joshi is the Oros Family Professor and Chair of Computer Science and Electrical Engineering Department at the University of Maryland, Baltimore County(UMBC). He is the Director of UMBC’s Center for Cybersecurity, and one of the USM leads for the National Cybersecurity FFRDC. He is a Fellow of IEEE. Dr. Joshi obtained a B.Tech degree from IIT Delhi in 1989, and a Masters and Ph.D. from Purdue University in 1991 and 1993 respectively. His research interests are in the broad area of networked computing and intelligent systems. His primary focus has been on data management and security/privacy in mobile/pervasive computing environments, and policy driven approaches to security and privacy. He is also interested in Semantic Web and Data/Text/Web Analytics, especially their applications to (cyber) security. He has published over 250 technical papers with an h-index of 79 and over 23,250 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National Science Foundation (NSF), NASA, Defense Advanced Research Projects Agency (DARPA), US Dept of Defense (DoD), NIST, IBM, Microsoft, Qualcom, Northrop Grumman, and Lockheed Martin amongst others</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/" rel="nofollow external" class="bo">talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab    Security for Smart Cyber-Physical Systems     Prof. Anupam Joshi, UMBC   12:00–1:00pm, Friday, 3 May 2019, ITE 227      Smart Cyber-Physical Systems (CPS) are...</Summary>
<Website>https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86106/guest@my.umbc.edu/2e4bbb97c805f4fd3d6ecbc7c7020288/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 01 May 2019 23:29:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="86107" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86107">
<Title>talk: The Evolution of Mobile Authentication, 1pm 4/30, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/5G-phone-altered.png" alt="" style="max-width: 100%; height: auto;"><h1>The Evolution of Mobile Authentication</h1>
    
    <h3>Prof. Keith Mayes, Royal Holloway University of London</h3>
    
    <h3> 1:00pm Tuesday 30 April 2019, ITE325, UMBC </h3>
    
    
    
    <p>Mobile communication is an essential part or modern life, however it is dependent on some fundamental security technologies. Critical amongst these technologies, is mobile authentication, the ability to identify valid users (and networks) and enable their secure usage of communication services. In the GSM standards and the <a href="https://en.wikipedia.org/wiki/3GPP" rel="nofollow external" class="bo">3GPP</a> standards that evolved from them, the subscriber-side security has been founded on a removable, attack-resistant smart card known as a <a href="https://en.wikipedia.org/wiki/SIM_card" rel="nofollow external" class="bo">SIM</a> (or USIM) card. The presentation explains how this situation came about, and how and why the protocols and algorithms have improved over time. It will cover some work by the author on a recent algorithm for 3GPP and then discuss how Machine-to-Machine and IoT considerations have led to new standards, which may herald the demise of the conventional removable SIM, in favour of an embedded <a href="https://en.wikipedia.org/wiki/SIM_card#Embedded-SIM" rel="nofollow external" class="bo">eSIM</a>.</p>
    
    
    
    <p><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Professor Keith Mayes</a> B.Sc. Ph.D. CEng FIET A.Inst.ISP, is a professor of information security within the Information Security Group (ISG) at Royal Holloway University of London. Prior to his sabbatical, he was the Director of the ISG and Head of the School of Mathematics and Information Security. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His current research interests are diverse, including, mobile communications, smart cards/RFIDS, the Internet of Things, and embedded systems. Keith joined the ISG in 2002, originally as the Founder Director of the ISG Smart Card Centre, following a career in industry working for Pye TVT, Honeywell Aerospace and Defence, Racal Research and Vodafone. Keith is a Chartered Engineer, a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and an experienced company director and consultant. He is active in the UK All Party Parliamentary Group (APPG) on Cyber Security and is an adjunct professor at UMBC.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-the-evolution-of-mobile-authentication-1pm-4-30-ite325-umbc-3gpp-esim/" rel="nofollow external" class="bo">talk: The Evolution of Mobile Authentication, 1pm 4/30, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Evolution of Mobile Authentication    Prof. Keith Mayes, Royal Holloway University of London     1:00pm Tuesday 30 April 2019, ITE325, UMBC       Mobile communication is an essential part or...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-the-evolution-of-mobile-authentication-1pm-4-30-ite325-umbc-3gpp-esim/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86107/guest@my.umbc.edu/f459a33f3816eb7fdefc2ff80cc3a4b5/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 29 Apr 2019 18:34:04 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="83516" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/83516">
<Title>talk: Why are memory-corruption bugs still a thing?, 10:30am Mon 4/8, ITE325</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/vulnerability-1024x461.png" alt="" style="max-width: 100%; height: auto;"><h3><strong>Why are memory-corruption bugs still a thing? </strong></h3>
    <h3><strong>The challenges of securing software at an assembly level</strong></h3>
    
    
    
    <p><strong>Doug Britton</strong><br><strong>CTO, RunSafe Security Inc.</strong></p>
    
    
    
    <p><strong>10:30-11:30 Monday, 8 April 2019, ITE346</strong><br></p>
    
    
    
    <p>Methods to chip away at the danger of memory-corruption bugs have been available for some time.  Why has the going-price of memory-corruption-based exploits not spiked?  If the methods were have a broad-based result in mitigating exploit vectors, there would be a reduction in supply, causing an increase in prices.  Also, there would be a reduction in the pool of people qualified to develop zero-days, allowing them to push the prices up.  The data suggest that prices have remained generally stable and attackers are able to move with impunity.  What are the challenges to large-scale adoption of memory-corruption based mitigation methods.  <br></p>
    
    
    
    <hr><p>Doug Britton serves as Chief Technology Officer and Director of <a href="https://runsafesecurity.com/" rel="nofollow external" class="bo">RunSafe Security</a>, Inc. Mr. Britton Co-founded Kaprica Security, Inc., in 2011 and serves as its Chief Executive Officer. Prior to his leadership role in Kaprica, Mr. Britton was a cyber-security focused research and development manager at Lockheed Martin. He has an MBA and MS from University of Maryland and a BS in Computer Science from the University of Illinois.<br></p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-why-are-memory-corruption-bugs-still-a-thing-umbc-cybersecurity/" rel="nofollow external" class="bo">talk: Why are memory-corruption bugs still a thing?, 10:30am Mon 4/8, ITE325</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Why are memory-corruption bugs still a thing?    The challenges of securing software at an assembly level      Doug Britton CTO, RunSafe Security Inc.      10:30-11:30 Monday, 8 April 2019, ITE346...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-why-are-memory-corruption-bugs-still-a-thing-umbc-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83516/guest@my.umbc.edu/52431b447531c3ba39864f7200ff8c47/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 07 Apr 2019 11:00:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="81984" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81984">
<Title>talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <h1><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/iotsecurity.png" alt="" style="max-width: 100%; height: auto;"></h1>
    <h1><strong>Exploiting IoT Vulnerabilities</strong></h1>
    <h3>Dr. Yatish Joshi, Senior Engineer, Cisco Systems</h3>
    <h4>11:45am-1:00pm Monday, 18 February 2019, ITE 325-B</h4>
    <p>The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance. In most cases, setup simply requires using a web or phone app to configure Wi-Fi credentials. Digital home assistants, security cameras, smart locks, home appliances, smart switches, toys, vacuum cleaners, thermostats, leakage sensors etc are examples of IoT devices that are widely used and deployed in home and enterprise environments.</p>
    <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/livedemo.png" alt="" style="max-width: 100%; height: auto;"></div>
    <p>The threat landscape is constantly evolving and threat actors are always on the prowl for new vulnerabilities they can exploit. With traditional attack methods yielding fewer exploits   due to the increased focus on security testing, frequent patches, increased user awareness, Threat actors have turned their attention on IoT devices and are exploiting inherent vulnerabilities in these devices. The vulnerabilities, always ON nature, and autonomous mode of operation allow attackers to spy on users, spoof data, or leverage them as botnet infrastructure to launch devastating attacks on third parties. Mirai, a well known IoT malware utilized hundreds and thousands of enslaved IoT devices to launch DDoS attacks on Dyn affecting access to Netflix, Twitter, Github and many other websites. With the release of the Mirai source code numerous variants of the malware are infecting IoT devices across the world and using them to carry out attacks.</p>
    <p>These attacks are made possible because the devices are manufactured without security in mind!. In this talk I will demonstrate how one can hack a widely available off-the-shelf IP Camera and router by exploiting the vulnerabilities present in these devices to get on the network, steal personal data, spy on a user, disrupt operation etc. We will also look at what can be done to mitigate the dangers posed by IOT devices.</p>
    <p>So attend hack &amp; defend!</p>
    <p>Dr. <a href="https://www.linkedin.com/in/yatish-joshi-aa064b13/" rel="nofollow external" class="bo">Yatish Joshi</a> is a software engineer in the Firepower division at Cisco Systems where he works on developing new features for Cisco’s security offerings. Yatish has a PhD in Computer Engineering from UMBC. Prior to Cisco Yatish worked as a lecturer at UMBC, and was a senior software engineer developing TV software at Samsung Electronics. When not working, he enjoys reading spy thrillers and fantasy novels.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/" rel="nofollow external" class="bo">talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Exploiting IoT Vulnerabilities   Dr. Yatish Joshi, Senior Engineer, Cisco Systems   11:45am-1:00pm Monday, 18 February 2019, ITE 325-B   The past decade has seen explosive growth in the use and...</Summary>
<Website>https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81984/guest@my.umbc.edu/9dfa6538945e4c821638d88994576150/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 08 Feb 2019 22:21:57 -0500</PostedAt>
<EditAt>Sun, 17 Feb 2019 16:00:57 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81612">
<Title>talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/machine_room-1024x536.png" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Using Deep Learning in Identifying Network Intrusions</h1>
    <h3>Dr. Rajeev Agrawal<br>
    Information Technology Laboratory<br>
    US Army Engineer Research and Development Center</h3>
    <h3>10:30-11:30 Monday, February 11, 2019, ITE325</h3>
    <p>Deep Learning algorithms have been very successful in computer vision, natural language processing, and speech recognition. However, there is a big challenge in applying it in cyber security domain due to non‐availability of ‘real’ cybersecurity data. Many researchers have tried using synthetic data such as KDD‐NSL or newer UNSW-NB15 network intrusion datasets, however, it is difficult to determine the performance of the proposed research on a dataset captured from an enterprise network. The DoD’s High Performance Computing Modernization Program (HPCMP) operates Defense Research Engineering network (DREN), which has multiple security software and hardware tools installed across the network. A variety of cybersecurity logs are captured using these tools. We use a TensorFlow based framework to analyze DREN’s Bro alert data generated under Cybersecurity Environment for Detection, Analysis and Reporting (CEDAR) project. These alerts are marked as bad or normal by the cybersecurity analysts and used as ground truths. This labeled data is used to measure the performance of our approach in identifying network intrusions. We are able to achieve high level accuracy by tuning hyper-parameters used in any deep learning approach. In this presentation, we will discuss the results of our approach which harnesses the power of HPC systems to train our proposed model.</p>
    <p><a href="https://www.linkedin.com/in/ragrawal2/" rel="nofollow external" class="bo"><strong>Dr. Rajeev Agrawal</strong></a> joined Cyber Engineering and Analysis branch (CEAB), Information Technology Laboratory in 2016. He is the Data Science lead of the High Performance Computing Architecture (HPC) for Cyber Situational Awareness (HACSAW) Project. The goal of this project is to analyze the cybersecurity data captured across Defense Research and Engineering Network (DREN). He is also a member of the HPC-based deep learning project team and exploring deep learning applicability in cybersecurity domain. Dr. Agrawal received his Ph.D. in Computer Science with minor in Engineering from Wayne State University in 2009. Prior to joining ITL, he was an Associate Professor in the Department of Computer Systems Technology at North Carolina A&amp;T State University.  Dr. Agrawal’s research interests include Deep Learning, Cyber Security, SCADA/ICS, Machine Learning and Pattern Recognition. He has published more than 80 technical papers and book chapters in refereed conferences and journals in these areas. He was selected a Data Science Fellow by the National Consortium of Data Science (NCDS) in 2014. His research has been funded by NSF, US Army, John Deere, ACM, RedHat, National Consortium of Data Science and Michigan State University.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/" rel="nofollow external" class="bo">talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Using Deep Learning in Identifying Network Intrusions   Dr. Rajeev Agrawal  Information Technology Laboratory  US Army Engineer Research and Development Center   10:30-11:30 Monday, February...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81612/guest@my.umbc.edu/e67516e735d4bb31c91bfecf68c17168/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 24 Jan 2019 15:58:15 -0500</PostedAt>
<EditAt>Thu, 24 Jan 2019 15:58:15 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81499" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81499">
<Title>Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <a href="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1-1024x536.png" style="max-width: 100%; height: auto;"></a></p>
    <h1>MD Data Science Conference<br>
    <span>Friday, 25 January, PAH Concert Hall, UMBC</span></h1>
    <p><a href="https://minerkasch.com/" rel="nofollow external" class="bo">Miner &amp; Kasch</a>, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">Data Science Conference</a> at UMBC on Friday, January 25 in the <a href="https://artscalendar.umbc.edu/about/umbc-concert-hall/" rel="nofollow external" class="bo">Linehan Concert Hall</a> of the UMBC Performing Arts &amp; Humanities Building. A limited number of <strong>free tickets</strong> are available for current UMBC students. To attend, you need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">register here</a>.</p>
    <p>The event was originally scheduled for January 14, but had to be rescheduled due to inclement weather. If you had registered and obtained a ticket earlier, you will need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">re-register</a>.</p>
    <p>The event brings together local companies and professionals to share what new and exciting things they are doing with their data. It will be attended by business managers, startup founders, software engineers, data scientists, students, and other curious people that want to learn more about the cutting edge of data science, machine learning, and AI. See the <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">conference website</a> for topics and speakers.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/" rel="nofollow external" class="bo">Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD Data Science Conference  Friday, 25 January, PAH Concert Hall, UMBC   Miner &amp; Kasch, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day Data Science...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81499/guest@my.umbc.edu/a7c10e8671c1c437df7c93a02b6663ae/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 18 Jan 2019 10:24:02 -0500</PostedAt>
<EditAt>Fri, 18 Jan 2019 10:24:02 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81075" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81075">
<Title>Workshop on Usable Security, 10-4 Tue 12/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h4>The UMBC Cyber Defense Lab</h4>
    <h1>Workshop on Usable Security</h1>
    <h3>Nikola K. Blanchard<br>
    10am-4pm, Tuesday, 18 December, 2018, ITE 228, UMBC</h3>
    <p> </p>
    <p>We invite people interested in cybersecurity to join us for research conversations with Nikola Blanchard, an expert in usable security. Visitors are welcome to participate in any or all of the workshop.</p>
    <p>How do we make better codes and passwords? As security constraints increased at the expense of usability, we saw no real improvement in practical performance. This session will introduce some basic notions of usability of security (with applications to voting technology), and the first mental-only password management algorithm. Participants will then be presented with the problem of evaluating such algorithms, and will have a brainstorming activity on designing alternative methods.</p>
    <p><strong>Biographical Sketch.</strong> After an initial training in mathematics and informatics at ENS Paris, <a href="http://www.koliaza.com/" rel="nofollow external" class="bo">Nikola K. Blanchard</a> started a PhD at IRIF, supervised by Nicolas Schabanel and Ted Selker. In 2015, they joined the Random Sample Voting Project to develop voting protocols, prevent vote selling and improve the deployment of new voting technologies, organizing multiple test elections. They recently started doing research on usability of security with Ted Selker, initially for secure voting technologies but expanding into the field of password research. As e-democracy research requires not just security or usability but also political science, they joined the Chôros think tank and teamed up with Géza Tessényi to co-found the Public Opinion Platform, adding the deliberation aspect needed for any e-democracy project. They are currently in the process of publishing a book on the use of randomness in political institutions.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>Biweekly Cyber Defense Lab meetings will resume in the spring term, 12noon-1pm on Fridays</p>
    <p>This event is supported in part by the National Science Foundation under <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1241576" rel="nofollow external" class="bo">SFS Grant 1241576</a></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/12/workshop-usable-security-umbc/" rel="nofollow external" class="bo">Workshop on Usable Security, 10-4 Tue 12/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    The UMBC Cyber Defense Lab   Workshop on Usable Security   Nikola K. Blanchard  10am-4pm, Tuesday, 18 December, 2018, ITE 228, UMBC       We invite people interested in cybersecurity to join...</Summary>
<Website>https://www.csee.umbc.edu/2018/12/workshop-usable-security-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81075/guest@my.umbc.edu/e29f7a9b6410944c8642db1ebc0bd356/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 17 Dec 2018 09:31:39 -0500</PostedAt>
<EditAt>Mon, 17 Dec 2018 09:31:39 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80330" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80330">
<Title>talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/blockchain.jpg" alt="" style="max-width: 100%; height: auto;"></p><strong>
    <h1>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain</h1>
    </strong><p></p>
    <h3>Dr. Jacob Mendel, Tel Aviv University</h3>
    <h3>11:00am Thursday, 15 November 2018, ITE 459, UMBC</h3>
    <p>The last decades have witnessed unprecedented population and urbanization growth with the implication that today, for the first time in human history, more than half of the world’s population lives in cities. The consequences of the cybersecurity threats of this urbanization trend along with the notion of smart cities are the main subject of this session. The smart city (system of systems) integrates Big-data and the Internet of Things (IoT) to optimize the operation cost, efficiency and to provide a better services to the residents. Smart cities worldwide are checking blockchain as the foundation for urban living. Using blockchain technology in smart city can create a marketplace for Smart Grid.</p>
    <p>The increased complexity of smart cities (system of systems), globally connected, economic and political systems has increased the cybersecurity vulnerability. The cybersecurity threats get magnified by the city big-data and its dependency on the technology. The cybersecurity challenges that smart cities faces demand for research and investment in physical security and economic security. In this session we will highlight various cybersecurity and blockchain parameters of a smart city, existing cybersecurity challenges and possible solutions.</p>
    <p><a href="https://www.linkedin.com/in/dr-jacob-mendel-83650062/" rel="nofollow external" class="bo">Dr. Jacob Mandel</a> is The Moshe Hogeg Blockchain Research Institute managing director at the Tel Aviv University, and former the General Manager Cyber Security COE at Intel. He is a serial cyber security entrepreneur; He has been the CEO and Co-Founder of SCsquare Ltd., where he founded a business enabler for cybersecurity technologies. Dr. Jacob holds 16 approved patents in the area of cybersecurity. His career in cybersecurity over the past 20 years is a unique mixture of broad practical experience and research expertise. His practice included extensive involvement in cybersecurity offensive projects (software and hardware), business development and product management. Proven worldwide track records in secure operating systems, digital rights management, security certification (CC, FIPS), penetration test, reverses engineering, Machine Learning, Blockchain, IoT security and Smart Grid cybersecurity.</p>
    <p>His current main research interest is on The Economic Perspective on Smart Grid Cybersecurity and Blockchain technology with a special focus on malware attacks, privacy issues and business continuation. He holds a PhD in Economics from Poznan University of Economics and Business, Poland and Masters of Business Administration (MBA) degree from Ben-Gurion University of the Negev, Israel.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/" rel="nofollow external" class="bo">talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain     Dr. Jacob Mendel, Tel Aviv University   11:00am Thursday, 15 November 2018, ITE 459, UMBC   The last decades have...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80330/guest@my.umbc.edu/2a2bf81bd171488351077035c9b9804a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Nov 2018 08:15:00 -0500</PostedAt>
<EditAt>Tue, 13 Nov 2018 08:15:00 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80129" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80129">
<Title>Richard Forno: Threats remain to US voting system &#8211; and voters&#8217; perceptions of reality</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/file-20181106-74772-egm5dt_slider.jpg" style="max-width: 100%; height: auto;">As Americans go to the polls, the voting process and the information environment are still not secure. <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Election-2018-Georgia/c0c2653a5cff44eeb562ada74c3d17bc/3/0" rel="nofollow external" class="bo">AP Photo/David Goldman</a></span>
    <h1><strong>Threats remain to US voting system – and voters’ perceptions of reality</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.</p>
    <p>On the day of the election, there were a number of <a href="https://www.propublica.org/article/oops-we-forgot-to-plug-in-the-voting-machine" rel="nofollow external" class="bo">early hitches in voting at individual polling places</a>, such as <a href="https://bklyner.com/sloppy-start-on-election-day/" rel="nofollow external" class="bo">polling places opening late</a> and vote-counting machines not plugged in. But there seem not – at least not yet – to be major <a href="https://www.propublica.org/electionland/" rel="nofollow external" class="bo">problems across the country</a>.</p>
    <p>However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.</p>
    <h2>Securing election systems</h2>
    <p>America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.</p>
    <p>Across the country, though, many districts’ voters will cast ballots with the <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">help of machines</a> that have <a href="https://theconversation.com/americas-aging-voting-machines-managed-to-survive-another-election-68100" rel="nofollow external" class="bo">long-standing</a> <a href="https://theconversation.com/aging-voting-machines-threaten-election-integrity-54523" rel="nofollow external" class="bo">security concerns</a>. Fortunately, <a href="https://www.axios.com/five-states-without-paper-trail-of-votes-32801015-4ba1-4b41-80ca-ebab2cdda087.html" rel="nofollow external" class="bo">45 states</a> keep a paper record of each vote cast – whether for fear of threats to voting integrity or just <a href="https://www.the-parallax.com/2018/11/03/funding-secure-voting/" rel="nofollow external" class="bo">budget constraints preventing purchase</a> of newer gear. But that means <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">five states</a> – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.</p>
    <p><a href="https://www.politico.com/newsletters/morning-cybersecurity/2018/07/12/voting-machine-vendors-under-pressure-277054" rel="nofollow external" class="bo">Voting machine vendors have been reluctant</a> to appear before Congress to explain their systems’ security practices – <a href="https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/" rel="nofollow external" class="bo">and shortcomings</a>. However, <a href="https://fcw.com/articles/2018/10/02/nielsen-election-cyber-dhs.aspx" rel="nofollow external" class="bo">federal agencies have helped some states</a> reduce the likelihood of voting machines being hacked or physically tampered with.</p>
    <h2>Beyond voting machines</h2>
    <p>Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that <a href="https://www.forbes.com/sites/daveywinder/2018/10/30/81-5m-voter-records-for-sale-on-dark-web-ahead-of-midterm-elections/" rel="nofollow external" class="bo">81 million voter records from 20 states</a> are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?</p>
    <p>There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That <a href="https://lmtribune.com/northwest/phishing-attempts-on-oregon-election-officials-increase/article_938cbf55-cc7d-532b-8f6c-f27bf0150040.html" rel="nofollow external" class="bo">state’s election officials were targeted by hackers</a> seeking to gain access to <a href="https://arstechnica.com/tech-policy/2018/11/file-sharing-software-on-state-election-servers-could-expose-them-to-intruders/" rel="nofollow external" class="bo">state email and database systems</a>. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.</p>
    <p>Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an <a href="https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes" rel="nofollow external" class="bo">11-year-old boy cracked the security</a> on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.</p>
    <h2>Managing information on social media</h2>
    <p>A more difficult threat to defend against is <a href="https://theconversation.com/how-the-russian-government-used-disinformation-and-cyber-warfare-in-2016-election-an-ethical-hacker-explains-99989" rel="nofollow external" class="bo">information warfare</a>, which doesn’t attack voting machines or election officials’ computers. Rather, it <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">targets voters’ perceptions and decisions</a>, seeking to influence how they vote.</p>
    <p>Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in <a href="https://www.washingtonpost.com/business/economy/russian-disinformation-on-facebook-targeted-ukraine-well-before-the-2016-us-election/2018/10/28/cc38079a-d8aa-11e8-a10f-b51546b10756_story.html" rel="nofollow external" class="bo">Ukraine</a>, <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html" rel="nofollow external" class="bo">Myanmar</a> and <a href="https://www.wired.co.uk/article/egypt-fake-news-facebook-oppress-women" rel="nofollow external" class="bo">Egypt</a>. But after 2016, <a href="https://www.theverge.com/2018/11/5/18056610/facebook-mark-warner-congress-cambridge-analytica" rel="nofollow external" class="bo">Facebook and Twitter came under intense scrutiny</a> for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began <a href="https://theconversation.com/if-the-12-indicted-russians-never-face-trial-in-the-us-can-anything-be-gained-99997" rel="nofollow external" class="bo">investigating Russians’ influence efforts</a>.</p>
    <p>In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with <a href="https://thehill.com/policy/national-security/412287-russian-woman-charged-with-interfering-in-midterm-elections" rel="nofollow external" class="bo">creating thousands of fake social media accounts</a> allegedly representing American citizens to “<a href="https://www.justice.gov/opa/pr/russian-national-charged-interfering-us-political-system" rel="nofollow external" class="bo">create and amplify divisive social media and political content</a>” before the election.</p>
    <p>This year, though, unlike two years ago, <a href="https://www.nytimes.com/2018/10/20/us/politics/2018-digital-misinformation-roundup.html" rel="nofollow external" class="bo">social media companies are taking action</a>. Twitter and Facebook have both <a href="https://theconversation.com/why-do-so-many-people-fall-for-fake-profiles-online-102754" rel="nofollow external" class="bo">deleted thousands of accounts</a> <a href="https://theconversation.com/hate-speech-is-still-easy-to-find-on-social-media-106020" rel="nofollow external" class="bo">they identified</a> as engaging in <a href="https://theconversation.com/even-a-few-bots-can-shift-public-opinion-in-big-ways-104377" rel="nofollow external" class="bo">propaganda and influence-peddling</a>. And they have <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">made other efforts</a> to <a href="https://www.wired.com/story/inside-facebooks-plan-to-safeguard-2018-election/" rel="nofollow external" class="bo">identify and fight falsehoods</a> on their platforms, too.</p>
    <p>Nevertheless, online misinformation continues to thrive. <a href="https://www.knightfoundation.org/reports/disinformation-fake-news-and-influence-campaigns-on-twitter" rel="nofollow external" class="bo">More than 80 percent</a> of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the <a href="https://theconversation.com/unlike-in-2016-there-was-no-spike-in-misinformation-this-election-cycle-105946" rel="nofollow external" class="bo">amount of online misinformation</a> is <a href="https://comprop.oii.ox.ac.uk/research/midterms2018/" rel="nofollow external" class="bo">higher than it was</a> two years ago.</p>
    <h2>Investigating alleged wrongdoing</h2>
    <p>U.S. intelligence and police agencies are concerned about the <a href="https://thehill.com/policy/cybersecurity/412863-officials-prepare-for-potential-false-claims-of-election-interference" rel="nofollow external" class="bo">potential effects of misinformation</a> on the American electorate. But large proportions of the country don’t <a href="https://www.newsmax.com/ronpaul/state-deep-trump-mueller/2018/07/16/id/872012/" rel="nofollow external" class="bo">trust those organizations</a> to be <a href="https://arstechnica.com/tech-policy/2018/11/with-no-evidence-georgias-top-voting-official-accuses-dems-of-cyberattack/" rel="nofollow external" class="bo">politically independent</a>. It doesn’t help that the White House continues to <a href="https://www.washingtonpost.com/politics/without-evidence-trump-and-sessions-warn-of-voter-fraud-in-tuesdays-elections/2018/11/05/e9564788-e115-11e8-8f5f-a55347f48762_story.html" rel="nofollow external" class="bo">claim, without evidence</a>, that <a href="https://www.cnn.com/2018/10/22/politics/donald-trump-voter-fraud/index.html" rel="nofollow external" class="bo">voter fraud</a> is a significant problem.</p>
    <p>Mainstream news organizations can find themselves under scrutiny too, either for <a href="https://www.washingtonpost.com/outlook/2018/10/24/russians-didnt-swing-election-trump-fox-news-might-have/" rel="nofollow external" class="bo">reporting falsehoods</a> that <a href="https://www.pbs.org/newshour/arts/after-a-week-of-russian-propaganda-i-was-questioning-everything" rel="nofollow external" class="bo">appear to gain traction online</a> or for failing to <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world" rel="nofollow external" class="bo">filter out or properly identify inaccurate information</a> for their readers.</p>
    <h2>Looking ahead</h2>
    <p>Protecting democracy is a huge challenge. I’ve written before that it involves <a href="https://theconversation.com/this-election-was-not-hacked-but-it-was-attacked-67511" rel="nofollow external" class="bo">more than technical solutions</a> to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.</p>
    <p>Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “<a href="https://theconversation.com/detecting-deepfake-videos-in-the-blink-of-an-eye-101072" rel="nofollow external" class="bo">deepfake</a>” technology is already helping <a href="https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy" rel="nofollow external" class="bo">create convincing videos of people appearing to say</a> and do things they never said or did. In addition, intelligent social media <a href="https://www.theverge.com/2018/10/15/17980026/social-media-bot-human-difference-ai-study" rel="nofollow external" class="bo">bots are becoming more human-like</a>, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.</p>
    <p>Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.<a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/threats-remain-to-us-voting-system-and-voters-perceptions-of-reality-105545" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/" rel="nofollow external" class="bo">Richard Forno: Threats remain to US voting system – and voters’ perceptions of reality</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>As Americans go to the polls, the voting process and the information environment are still not secure. AP Photo/David Goldman  Threats remain to US voting system – and voters’ perceptions of...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80129/guest@my.umbc.edu/cfde4542edba58ca31cbea1ce67bb24d/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 15:03:32 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 15:03:32 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80114" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80114">
<Title>talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/data_privacy_2018.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1>Legal Aspects of Privacy and Data Protection</h1>
    <h3>Razvan Miutescu<br>
    Privacy Counsel, Whiteford, Taylor &amp; Preston</h3>
    <h3>12:00–1:00pm Friday, 9 November 2018, ITE 227, UMBC</h3>
    <p>Privacy and data security continue to be topics of interest for organizations of all sizes. In addition to being concerned about cyber crimes and data breaches occurring more frequently and with higher operational impact, consumers and regulators around the world are focusing on privacy. Individuals are becoming increasingly aware of the value and the use of the information that identifies them or analyzes their conduct and behavior. Privacy laws around the world are becoming stricter. The European Union’s <a href="https://en.wikipedia.org/wiki/General_Data_Protection_Regulation" rel="nofollow external" class="bo">General Data Protection Regulation</a> (GDPR) is viewed as a flagship law that imposes data protection requirements well beyond the borders of the European Economic Area. California recently passed its Consumer Privacy Act, which borrows concepts from the GDPR, leaving no doubt that privacy laws in the United States are also on track to become more complex. In this context, we will discuss practical legal approaches to an organization’s privacy and data security program.</p>
    <p><a href="https://www.wtplaw.com/professionals/razvan-e-miutescu" rel="nofollow external" class="bo">Razvan Miutescu</a> is a technology and information governance attorney with Whiteford, Taylor &amp; Preston. His practice focuses on privacy and data security, information technology transactions and licensing, intellectual property, and data management, including data broker transactions, cloud services, distributed ledgers/blockchain, and related regulatory and compliance matters. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The <a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/" rel="nofollow external" class="bo">talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Legal Aspects of Privacy and Data Protection   Razvan Miutescu  Privacy Counsel, Whiteford, Taylor &amp; Preston   12:00–1:00pm Friday, 9 November 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80114/guest@my.umbc.edu/e8a22fb19468481f39cdcfa024b0c615/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 12:26:47 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 12:26:47 -0500</EditAt>
</NewsItem>

</News>
