Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas
|
|
- Emerald Sullivan
- 8 years ago
- Views:
Transcription
1 Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas January /29/2014 1
2 Our History NSA/DHS Center for Excellence in Cyber Security Education June 2004 Cyber Security Research Center (CSRC) Established October 4, 2004 NSA/DHS Center for Excellence in Cyber Security Research June 2008 Cyber Security Research and Education Center (CySREC) Established September 2010 Cyber Security Research and Education Institute (CSI) Established April 1, 2013
3 Our Faculty Founder Bhavani Thuraisingham, PhD, DEng (U of Wales, U of Bristol - UK) Core Faculty Michael Baron, PhD (U of MD) - Statistical Methods for Security Alain Bensoussan, PhD (University of Paris) - Risk Analysis for Security Nathan Berg, PhD (U of Kansas) - Economics and Security Alvaro Cardenas, PhD (U of MD) - Control Systems Security Yvo Desmedt, PhD (U. Leuven-Belgium) - Cryptography Zygmunt Haas, PhD (Stanford) Wireless Network Security Kevin Hamlen, PhD (Cornell) - Language and Software Security Murat Kantarcioglu, PhD (Purdue) - Data Security and Privacy Latifur Khan, PhD (U of Southern CA) - Big Data Analytics for Security Daniel Krawczyk, PhD (UCLA) - Psychosocial Aspects of Security Zhiqiang Lin, PhD (Purdue) - Systems Security and Forensics Yiorgos Makris, PhD (UC San Diego) - Hardware Security Kamil Sarac, PhD (UC Santa Barbara) - Education, Network Measurements
4 Our Accomplishments NSA/DHS Center for Excellence in Education (2004) and Research (2008) $22m in research funding and $3m in education funding Prestigious grants and contracts including: Multiple NSF Career, AFOSR YIP, DoD MURI Fellowships and Awards: IEEE, AAAS, IACR Fellowships; IBM Faculty Award, IEEE and ACM Awards e.g., IEEE CS Technical Achievement, IEEE SMC/Homeland Security Technical Achievement, ACM SIGSAC Outstanding Contributions Award Numerous keynote addresses, top-tier journal and conference publications, open source tools and prototypes, patents Collaborative research with AFRL, Raytheon, Rockwell, IBM (joint projects) Known for Interdisciplinary Research PhD Student placements at IBM TJ Watson, Google Privacy, Microsoft, Amazon, E-Bay, Raytheon, L-3, UCSD Medical School, Vanderbilt Medical School, UT Southwestern Medical Center, Blue Cross Blue Shield, Cisco, Clemson U,
5 Our Sponsors
6 Our Academic Collaborators
7 Research Thrust 1 Active Malware Defense Sponsors: AFOSR, NSF, NASA, Sandia, ONR Reactively Adaptive Malware and Frankenstein Reverse Engineering for Malware Detection Android Malware Detection Novel Data/Stream Mining Techniques for: Malware detection Insider threat analysis Intrusion detection Host Health Management Risk Analysis for Botnets
8 Research Thrust 2 Data Security and Privacy Sponsors: AFOSR, NSF, NIH, ARO Privacy Preserving Record Linkage and Mining Adversarial Data Mining Secure Data Provenance Policy and Incentive-based Assured Information Sharing Security and Privacy for Social Networks Inference Control Risk-aware Data Security and Privacy
9 Research Thrust 3 Secure Cloud Computing Sponsors: AFOSR, VMware Virtual Machine Introspection and VM Space Traveler Secure Virtualization Hybrid Cloud Security Secure Cloud Data Storage Secure Cloud Query Processing Cloud-based Assured Information Sharing Cloud-based Malware Detection Cloud Forensics
10 Research Thrust 4 Systems/Language/Networks/Hardware Security Sponsors: AFOSR, NSF, ARO, DARPA, CISCO Safe Re-use Oriented Reverse Engineering Binary Code Analysis In-Line Reference Monitor Hardware Trojan Detection Network Measurements Control Systems Security Cryptographic Techniques
11 Research Thrust 5 Data/Security Analytics Sponsors: IARPA, Raytheon, Tektronix, Nokia, NASA, NGA, AFOSR, MITRE Semantic Web Data Management and Integration Geospatial Data Management and Integration Stream-based Novel Class Detection for Text Social Network Data Analytics Multimedia Data Management and Mining
12 Education Thrust Sponsors: NSF, DoD NSF SFS Scholarship for Service DoD IA Scholarship NSF Assured Cloud Computing Degrees and Certificates Courses Offered Computer/Information Security, Network Security, Data and Applications Security, Digital Forensics, Cryptography, Data Privacy, Secure Web Services, Secure Cloud Computing, Hardware Security, CISSP Modules Secure Social Networks, Data Mining for Security, Big Data Analytics, Critical Infrastructure Protection, Biometrics, Security Engineering
13 Intellectual Property and Technology Transfer Tweethood Dr. Latifur Khan Patent pending technology that started with location mining on Tweets and extended to mining several demographic attributes Complete system built around Tweethood Presented to CIA and USAF, and CIA will introduce the technology to IN-Q-TEL VM Space Traveler Dr. Zhiqiang Lin Patent pending technology on virtualization security VMware has expressed interest in licensing; 70K gift from VMware for further development SNOD Stream-based Novel Class Detection Patent-pending technology jointly by Dr. Latifur Khan and Dr. Jiawei Han (UIUC) System being developed around SNOD IBM has expressed interest in licensing
14 Contact Ms. Rhonda Walls, Project Coordinator (972) Dr. Bhavani Thuraisingham, Founding Executive Director (972)
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD) http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD) http://csi.utdallas.edu 4 February 2015 2/3/2015 1 Our History NSA/DHS Center for Academic Excellence in Cyber
More informationHOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham
HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham Louis A. Beecherl, Jr. I Distinguished Professor of Computer Science Director of the Cyber Security Research Center
More informationCYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD)
CYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD) 1. INTRODUCTION 1.1 Overview of UTD s Cyber Security Research and Education Institute (CSI) UTD s Cyber Security Research
More informationStrategic Initiative Overview An Ecosystem Approach
Strategic Initiative Overview An Ecosystem Approach Cyber Texas Conference San Antonio Apr 2015 University of Texas Panel Dr. Michelle S. Atchison UT System Associate Vice Chancellor for Federal Relations
More informationNSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationCyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
More informationInformation Assurance and Computer Security at UB
Information Assurance and Computer Security at UB Shambhu Upadhyaya (CSE) and Raghav Rao (MIS) 3 rd Joint Cyber Security Workshop August 27, 2009 1 Outline History Advisory Board IA Related Courses IA
More informationDeveloping. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business
Developing and Securing the Cloud Bhavani Thuraisingham @ CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informs business AN AUERBACH
More informationDepartment of Computer Science: Graduate Catalog http://cs.utdallas.edu/ Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András
Department of Computer Science: Graduate Catalog http://cs.utdallas.edu/ Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András Faragó, Gopal Gupta, Dung T. Huynh, Jason Jue, Dan Moldovan,
More informationWORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas
WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas ABSTRACT This report describes the issues surrounding
More informationRealization of Your Dream: Higher Study, Partnership, Collaboration Opportunities
Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities Dr. Ashutosh Dutta, Ph.D. Lead Scientist, AT&T New Jersey, USA Email: ashutosh.dutta@ieee.org Realization of Your Dream
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationCyber-security Research at Stony Brook
http://ccs.cs.stonybrook.edu Cyber-security Research at Stony Brook Radu Sion Network Security and Applied Cryptography Lab http://crypto.cs.stonybrook.edu USS Yorktown September, 1997: USS Yorktown is
More informationBig Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
More informationTime: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists
Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationKeynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego
Keynote 1 Scale and Programmability in Google s Software Defined Data Center WAN Amin M. Vahdat University of California San Diego We present the design, implementation, and evaluation of B4, a private
More informationPurdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationSunnie Chung. Cleveland State University
Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments
More informationAssured Information Sharing for Security Applications: Malicious Code Detection
Assured Information Sharing for Security Applications: Malicious Code Detection Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin Hamlen The University of Texas at Dallas
More informationUNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
More informationUniversity of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
More informationInformation Assurance and Computer Security at UB
Information Assurance and Computer Security at UB Shambhu Upadhyaya (CSE) and Raghav Rao (MIS) Advisory Board Meeting May 8, 2008 1 Outline History Advisory Board IA Related Courses IA Certificate Program
More informationBSc in Information Technology Degree Programme. Syllabus
BSc in Information Technology Degree Programme Syllabus Semester 1 Title IT1012 Introduction to Computer Systems 30 - - 2 IT1022 Information Technology Concepts 30 - - 2 IT1033 Fundamentals of Programming
More informationInformation Assurance Program at West Point
Information Assurance Program at West Point Daniel-Ragsdale@usma.edu John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support
More informationData Mining for Security Applications
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing Data Mining for Security Applications Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen The University
More informationPlease see web page for the course information.
Course Introduction to Data and Application Security (Cs 4389) Professor Murat Kantarcioglu Term Spring 2009 Meetings Tu/Th 2:30-3:45pm Professor s Contact Information Office Phone 6616 Other Phone none
More informationNATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationEnd to End Defense against Rootkits in Cloud Environment Sachin Shetty
End to End Defense against Rootkits in Cloud Environment Sachin Shetty Associate Professor Electrical and Computer Engineering Director, Cybersecurity Laboratory Tennessee State University Tennessee State
More informationCurriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu
More informationComputer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
More informationWhat is going on in Operating Systems Research: The OSDI & SOSP Perspective. Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm.
What is going on in Operating Systems Research: The OSDI & SOSP Perspective Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm.com 16 July 2006 Slide 2 Main OS conferences OSDI Operating
More informationNetwork Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
More informationMaster s Degree Programs. Global Technology Leadership
Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and
More informationWelcome to our Online Information Session! November 2014
Welcome to our Online Information Session! November 2014 Master of Information Systems Management (MISM) Master of Science in Information Security Policy and Management (MSISPM) Sean Beggs, Director of
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationThe Future of Cybersecurity Education
The Future of Cybersecurity Education Being Better than Best Practices Mark Heckman, Ph.D., CISSP, CISA Center for Cyber Security Engineering and Technology University of San Diego Severe Cybersecurity
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationOutline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,
More informationGLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com
GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com EDUCATION: Ph.D. Computer Science, The George Washington University, Washington, DC, 2011 Research interests include human-computer
More informationNo Free Lunch in Cyber Security
No Free Lunch in Cyber Security George Cybenko gvc@dartmouth.edu Jeff Hughes jeff.hughes@tenet3.com MTD Workshop Scottsdale AZ November 3, 2014 Acknowledgements Kate Farris, Ph.D. Student, Dartmouth Dr.
More informationTerry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation
Terry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation Background Cyber-threat continues to accelerate Far fewer cyber-defense technologies Gap between
More informationHow To Research Security And Privacy Using Data Science
Research Topics in Security and Privacy using Data Science School of Informatics University of Edinburgh David Aspinall David.Aspinall@ed.ac.uk http://secpriv.inf.ed.ac.uk/ http://cybersec.ed.ac.uk/ Outline
More informationSecurity Issues for Cloud Computing
International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010 39 Security Issues for Cloud Computing Kevin Hamlen, The University of Texas at Dallas, USA Murat Kantarcioglu, The
More informationComputer Standards & Interfaces
Computer Standards & Interfaces 35 (2013) 1 5 Contents lists available at SciVerse ScienceDirect Computer Standards & Interfaces journal homepage: www.elsevier.com/locate/csi Data security services, solutions
More informationScience or Security. George O. Strawn NSF & NITRD (retired)
Science or Security George O. Strawn NSF & NITRD (retired) Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline Anecdotes about IT security Observations
More informationTRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
More informationSECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK
SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK Pranav Parikh, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham, Latifur Khan The University of Texas at Dallas Abstract In
More information2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu
2015-16 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
More informationINFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG
INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG March 04, 2014 Integrity Service Excellence Dr. Robert Herklotz Program Officer INFORMATION OPERATIONS & SECURITY Air Force Office of Scientific Research
More informationMeeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
More informationcapabilities statement
capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional
More information2014 Career Development Report
The U.VA. School of Engineering and Applied Science Center for Engineering Career Development 2014 Career Development Report Using the UVa Engineering Viz Lab to Explore the Night Sky For more information,
More informationCenter for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department
Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the
More informationCurriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University
More informationMaster of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
More informationBasic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.
Course Introduction to Data Security (CS 4389) Professor Murat Kantarcioglu Term Fall 2012 Meetings Friday,10am-12:45pm ECSS 2.306 Professor s Contact Information Office Phone 6616 Other Phone Office Location
More informationScholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*
Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration* University of North Texas (UNT) received a NSF award to provide scholarships, including stipends, tuition, health insurance,
More informationComputer Science. College of Engineering
Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree
More informationhttp://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. ayesha_sadaqat@yahoo.com,
More informationComputer Security and Investigations
Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,
More informationXianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 xmeng@cs.bu.edu www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
More informationDr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
More informationMS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
More informationCloud storage Security Mechanism with Authentication in Public Cloud
Cloud storage Security Mechanism with Authentication in Public Cloud Apurva Patidar 1, Mohsin Sheikh 2 Department of Computer Science & Engg. Medicaps Institute Of technology and Management, Indore,(M.P.),India
More informationGlobal Virtualization and Cloud Management Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3384076/ Global Virtualization and Cloud Management Software Market 2015-2019 Description: About Virtualization and Cloud Management
More informationDiscover Viterbi: Cyber Security Engineering & Informatics Programs
Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts
More informationAddressing Human Behavior in Cyber Security
Addressing Human Behavior in Cyber Security Image: Sileo.com Michael Orosz, Ph.D. USC Information Sciences Institute This discussion is proudly sponsored through a partnership between AFCEA, IEEE Computer
More informationNSF Cyber Trust Report
NSF Cyber Trust Report For US-Japan CIIP Experts Workshop, Sept 28-29 2004 Carl Landwehr (clandweh@nsf.gov) Cyber Trust Coordinator National Science Foundation Homeland Security Critical Infrastructure
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationPOSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
More informationCyber Security and Big Data: The Role of CCICADA
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Meeting Cyber Security and Big Data: The Role of CCICADA CCICADA Center, Rutgers University Fred S. Roberts, Director September 17, 2013 Team Profile
More informationThe Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)
The Science of Cyber Security Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all) Sponsor arranged a workshop S. King (OSD, sponsor) F. Schneider
More informationBig Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
More informationThe Pratt Community Fiscal Year 2013
The Pratt Community Fiscal Year 2013 125 faculty (100 tenure-track)* 91 post-docs 431 PhD students 436 masters students 1,227 undergraduates 220 staff The Pratt community comprises more than 2,500 people.
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More information2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu
2014-15 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
More informationCybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu
More informationCcybersecurity Education
Ccybersecurity Education The Obstacle and Challenges Panel Discussion Summer Workshop on Cyber Security Education for Community College Faculty in West Texas Texas Tech University August 13, 2013 COMPUTER
More informationS 2 ERC @ Virginia Tech Program Overview
S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc
More informationMurat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk)
Murat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk) 1 Cloud Computing App Server Database Cloud Computing Code Multimedia
More informationWhat s the Big Deal? Big Data, Cloud & the Internet of Things. Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego
What s the Big Deal? Big Data, Cloud & the Internet of Things Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego A Futurist s Near-Term View The Future Depends on Data Self-driving car
More informationProposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus
Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette
More informationCloud Computing: Outsourcing Computation without Outsourcing Control
Cloud Computing: Outsourcing Computation without Outsourcing Control Richard Chow, PARC Philippe Golle, PARC Markus Jakobsson, PARC Ryusuke Masuoka, Fujitsu Jesus Molina, Fujitsu Elaine Shi, PARC Jessica
More informationNITRD and Big Data. George O. Strawn NITRD
NITRD and Big Data George O. Strawn NITRD Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline What is Big Data? Who is NITRD? NITRD's Big Data Research
More informationd. City: State: Zip Code: i. Ethnicity: (check one) African American/Black Hispanic/Chicano(a)/Latino(a) Caucasian/White
CALIFORNIA STATE UNIVERSITY, LOS ANGELES MORE Programs RISE MS-to-PhD GRADUATE FELLOWSHIP APPLICATION Minority Biomedical Research Support-Research initiative for scientific enhancement Masters Programs
More informationAcademic and Professional Degree Students
Accountability Subreport on Academic and Professional Degree Students Steven Beckwith Vice President for Research & Graduate Studies Graduate Studies at UC Under the Master Plan, UC is responsible for
More informationCAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
More informationNorthrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
More informationPANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA
PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,
More informationFirewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationA Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)
Paper ID #9796 A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Dr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently
More informationInformation and Network Security & Privacy Research
Faculty of Engineering and Natural Sciences Computer Science and Engineering Information and Network Security & Privacy Research Albert Levi Sabancı University Computer Science and Engineering Cryptography
More informationTestimony of. Before the. May 25, 2011
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
More information