Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

Size: px
Start display at page:

Download "Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu"

Transcription

1 Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas January /29/2014 1

2 Our History NSA/DHS Center for Excellence in Cyber Security Education June 2004 Cyber Security Research Center (CSRC) Established October 4, 2004 NSA/DHS Center for Excellence in Cyber Security Research June 2008 Cyber Security Research and Education Center (CySREC) Established September 2010 Cyber Security Research and Education Institute (CSI) Established April 1, 2013

3 Our Faculty Founder Bhavani Thuraisingham, PhD, DEng (U of Wales, U of Bristol - UK) Core Faculty Michael Baron, PhD (U of MD) - Statistical Methods for Security Alain Bensoussan, PhD (University of Paris) - Risk Analysis for Security Nathan Berg, PhD (U of Kansas) - Economics and Security Alvaro Cardenas, PhD (U of MD) - Control Systems Security Yvo Desmedt, PhD (U. Leuven-Belgium) - Cryptography Zygmunt Haas, PhD (Stanford) Wireless Network Security Kevin Hamlen, PhD (Cornell) - Language and Software Security Murat Kantarcioglu, PhD (Purdue) - Data Security and Privacy Latifur Khan, PhD (U of Southern CA) - Big Data Analytics for Security Daniel Krawczyk, PhD (UCLA) - Psychosocial Aspects of Security Zhiqiang Lin, PhD (Purdue) - Systems Security and Forensics Yiorgos Makris, PhD (UC San Diego) - Hardware Security Kamil Sarac, PhD (UC Santa Barbara) - Education, Network Measurements

4 Our Accomplishments NSA/DHS Center for Excellence in Education (2004) and Research (2008) $22m in research funding and $3m in education funding Prestigious grants and contracts including: Multiple NSF Career, AFOSR YIP, DoD MURI Fellowships and Awards: IEEE, AAAS, IACR Fellowships; IBM Faculty Award, IEEE and ACM Awards e.g., IEEE CS Technical Achievement, IEEE SMC/Homeland Security Technical Achievement, ACM SIGSAC Outstanding Contributions Award Numerous keynote addresses, top-tier journal and conference publications, open source tools and prototypes, patents Collaborative research with AFRL, Raytheon, Rockwell, IBM (joint projects) Known for Interdisciplinary Research PhD Student placements at IBM TJ Watson, Google Privacy, Microsoft, Amazon, E-Bay, Raytheon, L-3, UCSD Medical School, Vanderbilt Medical School, UT Southwestern Medical Center, Blue Cross Blue Shield, Cisco, Clemson U,

5 Our Sponsors

6 Our Academic Collaborators

7 Research Thrust 1 Active Malware Defense Sponsors: AFOSR, NSF, NASA, Sandia, ONR Reactively Adaptive Malware and Frankenstein Reverse Engineering for Malware Detection Android Malware Detection Novel Data/Stream Mining Techniques for: Malware detection Insider threat analysis Intrusion detection Host Health Management Risk Analysis for Botnets

8 Research Thrust 2 Data Security and Privacy Sponsors: AFOSR, NSF, NIH, ARO Privacy Preserving Record Linkage and Mining Adversarial Data Mining Secure Data Provenance Policy and Incentive-based Assured Information Sharing Security and Privacy for Social Networks Inference Control Risk-aware Data Security and Privacy

9 Research Thrust 3 Secure Cloud Computing Sponsors: AFOSR, VMware Virtual Machine Introspection and VM Space Traveler Secure Virtualization Hybrid Cloud Security Secure Cloud Data Storage Secure Cloud Query Processing Cloud-based Assured Information Sharing Cloud-based Malware Detection Cloud Forensics

10 Research Thrust 4 Systems/Language/Networks/Hardware Security Sponsors: AFOSR, NSF, ARO, DARPA, CISCO Safe Re-use Oriented Reverse Engineering Binary Code Analysis In-Line Reference Monitor Hardware Trojan Detection Network Measurements Control Systems Security Cryptographic Techniques

11 Research Thrust 5 Data/Security Analytics Sponsors: IARPA, Raytheon, Tektronix, Nokia, NASA, NGA, AFOSR, MITRE Semantic Web Data Management and Integration Geospatial Data Management and Integration Stream-based Novel Class Detection for Text Social Network Data Analytics Multimedia Data Management and Mining

12 Education Thrust Sponsors: NSF, DoD NSF SFS Scholarship for Service DoD IA Scholarship NSF Assured Cloud Computing Degrees and Certificates Courses Offered Computer/Information Security, Network Security, Data and Applications Security, Digital Forensics, Cryptography, Data Privacy, Secure Web Services, Secure Cloud Computing, Hardware Security, CISSP Modules Secure Social Networks, Data Mining for Security, Big Data Analytics, Critical Infrastructure Protection, Biometrics, Security Engineering

13 Intellectual Property and Technology Transfer Tweethood Dr. Latifur Khan Patent pending technology that started with location mining on Tweets and extended to mining several demographic attributes Complete system built around Tweethood Presented to CIA and USAF, and CIA will introduce the technology to IN-Q-TEL VM Space Traveler Dr. Zhiqiang Lin Patent pending technology on virtualization security VMware has expressed interest in licensing; 70K gift from VMware for further development SNOD Stream-based Novel Class Detection Patent-pending technology jointly by Dr. Latifur Khan and Dr. Jiawei Han (UIUC) System being developed around SNOD IBM has expressed interest in licensing

14 Contact Ms. Rhonda Walls, Project Coordinator (972) Dr. Bhavani Thuraisingham, Founding Executive Director (972)

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD) http://csi.utdallas.edu

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD) http://csi.utdallas.edu Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD) http://csi.utdallas.edu 4 February 2015 2/3/2015 1 Our History NSA/DHS Center for Academic Excellence in Cyber

More information

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham Louis A. Beecherl, Jr. I Distinguished Professor of Computer Science Director of the Cyber Security Research Center

More information

CYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD)

CYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD) CYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD) 1. INTRODUCTION 1.1 Overview of UTD s Cyber Security Research and Education Institute (CSI) UTD s Cyber Security Research

More information

Strategic Initiative Overview An Ecosystem Approach

Strategic Initiative Overview An Ecosystem Approach Strategic Initiative Overview An Ecosystem Approach Cyber Texas Conference San Antonio Apr 2015 University of Texas Panel Dr. Michelle S. Atchison UT System Associate Vice Chancellor for Federal Relations

More information

NSF Workshop on Big Data Security and Privacy

NSF Workshop on Big Data Security and Privacy NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

Information Assurance and Computer Security at UB

Information Assurance and Computer Security at UB Information Assurance and Computer Security at UB Shambhu Upadhyaya (CSE) and Raghav Rao (MIS) 3 rd Joint Cyber Security Workshop August 27, 2009 1 Outline History Advisory Board IA Related Courses IA

More information

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH

More information

Department of Computer Science: Graduate Catalog http://cs.utdallas.edu/ Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András

Department of Computer Science: Graduate Catalog http://cs.utdallas.edu/ Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András Department of Computer Science: Graduate Catalog http://cs.utdallas.edu/ Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András Faragó, Gopal Gupta, Dung T. Huynh, Jason Jue, Dan Moldovan,

More information

WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas

WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas ABSTRACT This report describes the issues surrounding

More information

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: ashutosh.dutta@ieee.org Realization of Your Dream

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Cyber-security Research at Stony Brook

Cyber-security Research at Stony Brook http://ccs.cs.stonybrook.edu Cyber-security Research at Stony Brook Radu Sion Network Security and Applied Cryptography Lab http://crypto.cs.stonybrook.edu USS Yorktown September, 1997: USS Yorktown is

More information

Big Data R&D Initiative

Big Data R&D Initiative Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment

More information

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Keynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego

Keynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego Keynote 1 Scale and Programmability in Google s Software Defined Data Center WAN Amin M. Vahdat University of California San Diego We present the design, implementation, and evaluation of B4, a private

More information

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of

More information

US Federal Cyber Security Research Program. NITRD Program

US Federal Cyber Security Research Program. NITRD Program US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related

More information

Sunnie Chung. Cleveland State University

Sunnie Chung. Cleveland State University Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments

More information

Assured Information Sharing for Security Applications: Malicious Code Detection

Assured Information Sharing for Security Applications: Malicious Code Detection Assured Information Sharing for Security Applications: Malicious Code Detection Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin Hamlen The University of Texas at Dallas

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Information Assurance and Computer Security at UB

Information Assurance and Computer Security at UB Information Assurance and Computer Security at UB Shambhu Upadhyaya (CSE) and Raghav Rao (MIS) Advisory Board Meeting May 8, 2008 1 Outline History Advisory Board IA Related Courses IA Certificate Program

More information

BSc in Information Technology Degree Programme. Syllabus

BSc in Information Technology Degree Programme. Syllabus BSc in Information Technology Degree Programme Syllabus Semester 1 Title IT1012 Introduction to Computer Systems 30 - - 2 IT1022 Information Technology Concepts 30 - - 2 IT1033 Fundamentals of Programming

More information

Information Assurance Program at West Point

Information Assurance Program at West Point Information Assurance Program at West Point Daniel-Ragsdale@usma.edu John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support

More information

Data Mining for Security Applications

Data Mining for Security Applications 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing Data Mining for Security Applications Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen The University

More information

Please see web page for the course information.

Please see web page for the course information. Course Introduction to Data and Application Security (Cs 4389) Professor Murat Kantarcioglu Term Spring 2009 Meetings Tu/Th 2:30-3:45pm Professor s Contact Information Office Phone 6616 Other Phone none

More information

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative

More information

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity

More information

End to End Defense against Rootkits in Cloud Environment Sachin Shetty

End to End Defense against Rootkits in Cloud Environment Sachin Shetty End to End Defense against Rootkits in Cloud Environment Sachin Shetty Associate Professor Electrical and Computer Engineering Director, Cybersecurity Laboratory Tennessee State University Tennessee State

More information

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 ) Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

What is going on in Operating Systems Research: The OSDI & SOSP Perspective. Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm.

What is going on in Operating Systems Research: The OSDI & SOSP Perspective. Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm. What is going on in Operating Systems Research: The OSDI & SOSP Perspective Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm.com 16 July 2006 Slide 2 Main OS conferences OSDI Operating

More information

Network Security Using Job Oriented Architecture (SUJOA)

Network Security Using Job Oriented Architecture (SUJOA) www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In

More information

Master s Degree Programs. Global Technology Leadership

Master s Degree Programs. Global Technology Leadership Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and

More information

Welcome to our Online Information Session! November 2014

Welcome to our Online Information Session! November 2014 Welcome to our Online Information Session! November 2014 Master of Information Systems Management (MISM) Master of Science in Information Security Policy and Management (MSISPM) Sean Beggs, Director of

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

The Future of Cybersecurity Education

The Future of Cybersecurity Education The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego Severe Cybersecurity

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research? Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,

More information

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com EDUCATION: Ph.D. Computer Science, The George Washington University, Washington, DC, 2011 Research interests include human-computer

More information

No Free Lunch in Cyber Security

No Free Lunch in Cyber Security No Free Lunch in Cyber Security George Cybenko gvc@dartmouth.edu Jeff Hughes jeff.hughes@tenet3.com MTD Workshop Scottsdale AZ November 3, 2014 Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr.

More information

Terry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation

Terry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation Terry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation Background Cyber-threat continues to accelerate Far fewer cyber-defense technologies Gap between

More information

How To Research Security And Privacy Using Data Science

How To Research Security And Privacy Using Data Science Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline

More information

Security Issues for Cloud Computing

Security Issues for Cloud Computing International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010 39 Security Issues for Cloud Computing Kevin Hamlen, The University of Texas at Dallas, USA Murat Kantarcioglu, The

More information

Computer Standards & Interfaces

Computer Standards & Interfaces Computer Standards & Interfaces 35 (2013) 1 5 Contents lists available at SciVerse ScienceDirect Computer Standards & Interfaces journal homepage: www.elsevier.com/locate/csi Data security services, solutions

More information

Science or Security. George O. Strawn NSF & NITRD (retired)

Science or Security. George O. Strawn NSF & NITRD (retired) Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK

SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK Pranav Parikh, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham, Latifur Khan The University of Texas at Dallas Abstract In

More information

2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu

2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu 2015-16 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.

More information

INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG

INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG March 04, 2014 Integrity Service Excellence Dr. Robert Herklotz Program Officer INFORMATION OPERATIONS & SECURITY Air Force Office of Scientific Research

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

2014 Career Development Report

2014 Career Development Report The U.VA. School of Engineering and Applied Science Center for Engineering Career Development 2014 Career Development Report Using the UVa Engineering Viz Lab to Explore the Night Sky For more information,

More information

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

Master of Cyber Security

Master of Cyber Security Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

More information

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs. Course Introduction to Data Security (CS 4389) Professor Murat Kantarcioglu Term Fall 2012 Meetings Friday,10am-12:45pm ECSS 2.306 Professor s Contact Information Office Phone 6616 Other Phone Office Location

More information

Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*

Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* University of North Texas (UNT) received a NSF award to provide scholarships, including stipends, tuition, health insurance,

More information

Computer Science. College of Engineering

Computer Science. College of Engineering Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree

More information

http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. ayesha_sadaqat@yahoo.com,

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng. Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions

More information

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Cloud storage Security Mechanism with Authentication in Public Cloud

Cloud storage Security Mechanism with Authentication in Public Cloud Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India

More information

Global Virtualization and Cloud Management Software Market 2015-2019

Global Virtualization and Cloud Management Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3384076/ Global Virtualization and Cloud Management Software Market 2015-2019 Description: About Virtualization and Cloud Management

More information

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Discover Viterbi: Cyber Security Engineering & Informatics Programs Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts

More information

Addressing Human Behavior in Cyber Security

Addressing Human Behavior in Cyber Security Addressing Human Behavior in Cyber Security Image: Sileo.com Michael Orosz, Ph.D. USC Information Sciences Institute This discussion is proudly sponsored through a partnership between AFCEA, IEEE Computer

More information

NSF Cyber Trust Report

NSF Cyber Trust Report NSF Cyber Trust Report For US-Japan CIIP Experts Workshop, Sept 28-29 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation Homeland Security Critical Infrastructure

More information

Big Data - Security and Privacy

Big Data - Security and Privacy Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

Cyber Security and Big Data: The Role of CCICADA

Cyber Security and Big Data: The Role of CCICADA CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Meeting Cyber Security and Big Data: The Role of CCICADA CCICADA Center, Rutgers University Fred S. Roberts, Director September 17, 2013 Team Profile

More information

The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)

The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all) The Science of Cyber Security Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all) Sponsor arranged a workshop S. King (OSD, sponsor) F. Schneider

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

The Pratt Community Fiscal Year 2013

The Pratt Community Fiscal Year 2013 The Pratt Community Fiscal Year 2013 125 faculty (100 tenure-track)* 91 post-docs 431 PhD students 436 masters students 1,227 undergraduates 220 staff The Pratt community comprises more than 2,500 people.

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu

2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu 2014-15 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

Ccybersecurity Education

Ccybersecurity Education Ccybersecurity Education The Obstacle and Challenges Panel Discussion Summer Workshop on Cyber Security Education for Community College Faculty in West Texas Texas Tech University August 13, 2013 COMPUTER

More information

S 2 ERC @ Virginia Tech Program Overview

S 2 ERC @ Virginia Tech Program Overview S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc

More information

Murat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk)

Murat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk) Murat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk) 1 Cloud Computing App Server Database Cloud Computing Code Multimedia

More information

What s the Big Deal? Big Data, Cloud & the Internet of Things. Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego

What s the Big Deal? Big Data, Cloud & the Internet of Things. Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego What s the Big Deal? Big Data, Cloud & the Internet of Things Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego A Futurist s Near-Term View The Future Depends on Data Self-driving car

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

Cloud Computing: Outsourcing Computation without Outsourcing Control

Cloud Computing: Outsourcing Computation without Outsourcing Control Cloud Computing: Outsourcing Computation without Outsourcing Control Richard Chow, PARC Philippe Golle, PARC Markus Jakobsson, PARC Ryusuke Masuoka, Fujitsu Jesus Molina, Fujitsu Elaine Shi, PARC Jessica

More information

NITRD and Big Data. George O. Strawn NITRD

NITRD and Big Data. George O. Strawn NITRD NITRD and Big Data George O. Strawn NITRD Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline What is Big Data? Who is NITRD? NITRD's Big Data Research

More information

d. City: State: Zip Code: i. Ethnicity: (check one) African American/Black Hispanic/Chicano(a)/Latino(a) Caucasian/White

d. City: State: Zip Code: i. Ethnicity: (check one) African American/Black Hispanic/Chicano(a)/Latino(a) Caucasian/White CALIFORNIA STATE UNIVERSITY, LOS ANGELES MORE Programs RISE MS-to-PhD GRADUATE FELLOWSHIP APPLICATION Minority Biomedical Research Support-Research initiative for scientific enhancement Masters Programs

More information

Academic and Professional Degree Students

Academic and Professional Degree Students Accountability Subreport on Academic and Professional Degree Students Steven Beckwith Vice President for Research & Graduate Studies Graduate Studies at UC Under the Master Plan, UC is responsible for

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,

More information

Firewall and VPN Investigation on Cloud Computing Performance

Firewall and VPN Investigation on Cloud Computing Performance Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)

A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Paper ID #9796 A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Dr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently

More information

Information and Network Security & Privacy Research

Information and Network Security & Privacy Research Faculty of Engineering and Natural Sciences Computer Science and Engineering Information and Network Security & Privacy Research Albert Levi Sabancı University Computer Science and Engineering Cryptography

More information

Testimony of. Before the. May 25, 2011

Testimony of. Before the. May 25, 2011 Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and

More information