<?xml version="1.0"?>
<News hasArchived="false" page="129" pageCount="221" pageSize="10" timestamp="Tue, 05 May 2026 05:10:27 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=129">
<NewsItem contentIssues="true" id="41326" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/41326">
<Title>talk: Pescatore on Understanding Cybersecurity Market Dynamics, 3/4</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/02/bwtech_700.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h1>Understanding Cybersecurity Market Dynamics</h1>
    <h2>John Pescatore<br>
    SANS Institute</h2>
    <h3>1:00-3:00 Tuesday, 4 March 2014<br>
    Suite 130, bwtech@UMBC, 5520 Research Park Drive, UMBC</h3>
    <p>There is no single cybersecurity market, and the factors that drive business decisions around security practices and purchases are complex and continually evolving. Based on more than 20 years of experience with cybersecurity technology and startups, this presentation will provide an understanding of the dynamics of the various markets that make up cybersecurity, as well as provide predictions of merging demand areas.</p>
    <p>John Pescatore is SANS Director of Emerging Security Trends. He joined SANS in January 2013 after 14 years as Gartner’s lead security analyst. Before coming to Gartner he lead consulting groups at two early Internet security IPOs (Trusted Information Systems and Entrust) and spent 11 years in telecoms and computer security at GTE. He began his career at NSA and the US Secret Service. Follow him as <a href="https://twitter.com/john_pescatore" rel="nofollow external" class="bo">@john_pescatore</a> on Twitter or via his <a href="http://www.sans.org/security-trends/author/jpescatore" rel="nofollow external" class="bo">Security Trend Line</a> blog on the SANS website.</p>
    <p>Send your RSVP for this event to Sorry, you need javascript to view this email address.  at BWTech.</p></div>
]]>
</Body>
<Summary>Understanding Cybersecurity Market Dynamics   John Pescatore  SANS Institute   1:00-3:00 Tuesday, 4 March 2014  Suite 130, bwtech@UMBC, 5520 Research Park Drive, UMBC   There is no single...</Summary>
<Website>http://www.csee.umbc.edu/2014/02/talk-pescatore-on-understanding-cybersecurity-market-dynamics-34/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/41326/guest@my.umbc.edu/bcbc685bf0554f345d580fe86f318eb9/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Feb 2014 10:14:08 -0500</PostedAt>
<EditAt>Thu, 13 Feb 2014 10:14:08 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="41298" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/41298">
<Title>Paid Federal Internship Opportunities</Title>
<Tagline>Paid Fully Funded Summer Federal Internship Positions!!!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><br></span><span><span> <strong>The Washington Center (</strong></span>TWC<strong>) </strong>has internships available during the <strong>summer 2014 semester via the <a href="http://click.icptrack.com/icp/relay.php?r=27458043&amp;msgid=263870&amp;act=K8CV&amp;c=1165043&amp;destination=http://www.twc.edu/federal" rel="nofollow external" class="bo">Federal Diversity Internship Initiative</a></strong> - and these internships will go fast! Specifically, positions are available with the <strong>United States' Veterans Administration</strong> (VA), <strong>Federal Aviation Administration</strong> (FAA), <strong>Federal Deposit Insurance Corporation</strong> (FDIC), <strong>National Archives and Records Administration</strong> (NARA), <strong>Department of Health and Human Services</strong> (HHS) and <strong>U.S. Department of Treasury</strong>.<br><br>Students
     with <strong>Business/Human Resources</strong>, <strong>Communication</strong>, <strong>Computer &amp; 
    Information Technology</strong>, <strong>Engineering</strong>, <strong>Public Administration</strong> and 
    <strong>Healthcare</strong>-related backgrounds <u>are needed</u>. Internships through the <strong>Federal Diversity Internship Initiative</strong> are <strong>fully-funded and paid opportunities</strong>. In addition, some support is provided for travel and other expenses. <u>There is no out-of-pocket cost for participation.</u><br><br>To be considered for this opportunity, <strong><span>applications must be received by <span><span>March 3, 2014</span></span></span></strong>.<br><br>To
     submit the application, you must include <u>basic academic and personal 
    information</u>, <u>your resume and an essa</u>y. <u>Letters of recommendation</u> are 
    required, but can arrive after submission. An<u> official transcript</u> will 
    also be required and should be sent as soon as possible. <u><em><strong>Be sure to 
    choose option 2 (the Federal Diversity Internship Initiative) on the 
    application! </strong></em></u>To apply to the Federal Diversity Internship Initiative, <strong><a href="http://click.icptrack.com/icp/relay.php?r=27458043&amp;msgid=263870&amp;act=K8CV&amp;c=1165043&amp;destination=http://portal.e.twc.edu/" rel="nofollow external" class="bo">click here</a></strong>.<br><br>If you have any questions about the opportunity to pursue <strong>a paid, federal internship</strong>,
     please do not hesitate to contact us. The Washington Center is happy to
     assist with the application in any way and we look forward to working 
    with you this year.<br><br><br>Reid May<br>Office of Admissions &amp; Institutional Relations<br>The Washington Center for Internships and Academic Seminars<br><a href="mailto:info@twc.edu" rel="nofollow external" class="bo">info@twc.edu</a><br><a href="http://click.icptrack.com/icp/relay.php?r=27458043&amp;msgid=263870&amp;act=K8CV&amp;c=1165043&amp;destination=http://www.twc.edu/federal" rel="nofollow external" class="bo">www.twc.edu/federal</a><br><a rel="nofollow external" class="bo">202-238-7900</a> (main line)<br><br></span><h3><span><strong>Please Paw if you've read this so I know to keep posting things like this ! THANKS</strong></span></h3><h4></h4></div>
]]>
</Body>
<Summary> The Washington Center (TWC) has internships available during the summer 2014 semester via the Federal Diversity Internship Initiative - and these internships will go fast! Specifically, positions...</Summary>
<Website>http://www.twc.edu/internships/additional-programs/federal-diversity-internship-initiative</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/41298/guest@my.umbc.edu/a69589841655ce98266f546f57992804/api/pixel</TrackingUrl>
<Tag>computer</Tag>
<Tag>diversity</Tag>
<Tag>federal</Tag>
<Tag>government</Tag>
<Tag>health</Tag>
<Tag>information</Tag>
<Tag>internship</Tag>
<Tag>issa</Tag>
<Tag>job</Tag>
<Tag>paid</Tag>
<Tag>science</Tag>
<Tag>technology</Tag>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/xxlarge.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/xlarge.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/large.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/medium.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/small.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/xsmall.jpg?1392234532</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/041/298/490d3a9dd72716b3101890d0d8241c51/xxsmall.jpg?1392234532</ThumbnailUrl>
<PawCount>11</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 12 Feb 2014 14:53:42 -0500</PostedAt>
<EditAt>Wed, 12 Feb 2014 16:11:36 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="40883" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40883">
<Title>Apply to the UMBC Cyber Scholars Program by 14 February</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/Cyber-Prac1.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>Computer Engineering, Computer Science, and Information Systems majors with at least a 3.25 GPA and an interest in cybersecurity are encouraged to apply for 2014-15 cohort of the UMBC Cyber Scholars Program.</p>
    <p>The <a href="http://cybersecurity.umbc.edu/cyberscholars/" rel="nofollow external" class="bo">Cyber Scholars Program</a> is a merit-based scholarship program for talented undergraduates majoring in computer science, information systems of computer engineering who are interested in pursuing a career within the field of cybersecurity. Cyber Scholars are supported financially and incorporated into a scholarship community, unique courses, mentoring, and the chance to take part in cybersecurity research and internships during in their academic careers.</p>
    <p>Apply by 14 February 2014 by submitting a <a href="http://cybersecurity.umbc.edu/cyberscholars/cyber-application-2014/" rel="nofollow external" class="bo">application</a> along with two letters of recommendation and an official college transcript.</p></div>
]]>
</Body>
<Summary>Computer Engineering, Computer Science, and Information Systems majors with at least a 3.25 GPA and an interest in cybersecurity are encouraged to apply for 2014-15 cohort of the UMBC Cyber...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/apply-to-the-umbc-cyber-scholars-program-by-14-february/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40883/guest@my.umbc.edu/28b80125fc6c27ecd4e711a2cd1089d4/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 31 Jan 2014 23:07:07 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="40879" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40879">
<Title>Cyber Scholars Program Scholarships Available</Title>
<Tagline>Money and good resume material</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Computer Engineering, Computer Science, and Information Systems majors 
    with at least a 3.25 GPA and an interest in cybersecurity (and who are 
    not already part of another scholar program, such as Meyerhoff, Sherman,
     CWIT, etc.) are encouraged to apply to be a part of the next cohort of 
    the Cyber Scholars Program, starting in Fall 2014.<br>
    <p>The<strong><a href="http://cybersecurity.umbc.edu/cyberscholars/" rel="nofollow external" class="bo"><span><span><span>Cyber</span></span> <span><span>Scholars</span></span> <span>Program</span></span></a> </strong>is a merit-based <span>scholarship</span> <span>program</span> for 
    talented undergraduates majoring in computer science, information 
    systems, and computer engineering at UMBC who are interested in pursuing a career within the field of cybersecurity.  <br></p><p><span><span>Cyber</span></span> <span><span>Scholars</span></span> are supported financially and incorporated into a <span>scholarship</span> 
    community, unique courses, 
    mentoring, and the chance to take part in cybersecurity research and 
    internships during in their academic careers. <br></p><div><div><p><strong>Deadline: <span><span><span><span>February 14th, 2014</span></span></span></span></strong> <br></p><p><span><span>Cyber</span></span> <span><span>Scholar</span></span> Applicants must submit the following materials:</p>
    
    
    </div></div><div>
    
    
    
    
    <div>
    <div><ul><li><a href="http://cybersecurity.umbc.edu/cyberscholars/cyber-application-2014/" rel="nofollow external" class="bo"><span><span>Cyber</span></span> Application 2014</a></li><li>Two Letters of Recommendation</li><li>
    
    
    
    
    Official College Transcript<br></li></ul></div></div></div><div><div>Mail or drop off completed application to:<br><strong>Attn: Cindy Greenwood<br>Center for Women in Technology (CWIT)</strong><br>
    
    
    
    <strong>1000 Hilltop Circle, ITE 452</strong><br><strong>Baltimore, MD 21250<br><br></strong></div></div>Please contact CWIT’s Assistant Director, Cindy Greenwood <a rel="nofollow external" class="bo">(410-455-3881</a>; <a href="mailto:cindyg@umbc.edu" rel="nofollow external" class="bo">cindyg@umbc.edu</a>) with any questions about the <span><span>Cyber</span></span> <span><span>Scholars</span></span> <span>Program</span>.</div>
]]>
</Body>
<Summary>Computer Engineering, Computer Science, and Information Systems majors  with at least a 3.25 GPA and an interest in cybersecurity (and who are  not already part of another scholar program, such as...</Summary>
<Website>http://cybersecurity.umbc.edu/cyberscholars/cyber-application-2014/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40879/guest@my.umbc.edu/dd8443af65f0e2ce4a60134167744863/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 31 Jan 2014 19:14:53 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="40412" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40412">
<Title>Tim Finin appointed co-editor of CACM Viewpoints</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/cacm2.png" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>CSEE professor <a href="http://umbc.edu/~finin/" rel="nofollow external" class="bo">Tim Finin</a> has been appointed as a co-editor of the Viewpoints section of the Communications of the ACM, the monthly magazine of the Association for Computing Machinery.  <a href="http://cacm.acm.org/" rel="nofollow external" class="bo">ACM</a> was founded in 1947 and is the world’s largest educational and scientific computing society with the mission of providing resources that advance computing as a science and a profession.</p>
    <p>The <a href="http://cacm.acm.org/" rel="nofollow external" class="bo">Communications of the ACM</a> was started in 1957 and is sent to all ACM members (currently over 100,000) and is considered “the leading print and online publication for the computing and information technology fields”. CACM’s Viewpoints section is publishes short articles expressing opinions and views that pertain to issues of broad interest to the computing community, covering a wide range of topics, including scientific, technical, educational and social. Each month a handful of articles are published from those contributed by a set of distinguished ACM columnists and submitted by ACM members and computing professionals.</p></div>
]]>
</Body>
<Summary>CSEE professor Tim Finin has been appointed as a co-editor of the Viewpoints section of the Communications of the ACM, the monthly magazine of the Association for Computing Machinery.  ACM was...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/tim-finin-appointed-co-editor-of-cacm-viewpoints/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40412/guest@my.umbc.edu/f8899a07c79406155490499376970ca7/api/pixel</TrackingUrl>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 20 Jan 2014 09:23:19 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="40196" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40196">
<Title>CSEE PhD student presents research at 2014 Quantum Information Processing Conference</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2013/11/DWave_128chip.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2013/11/DWave_128chip.jpg" alt="from wikipedia" width="700" height="308" style="max-width: 100%; height: auto;"></a></p>
    <p>CSEE Ph.D. student <a href="https://sites.google.com/a/umbc.edu/shehab/" rel="nofollow external" class="bo">Omar Shehab</a> received a travel grant to present his research, UNKNOTTING as a k-local Hamiltonian problem, at the 2014 <a href="http://benasque.org/2014QIP/" rel="nofollow external" class="bo">Quantum Information Processing</a> conference, which will be held early in February in Barcelona, Spain.  Later in February he will also attend the <a href="http://simons.berkeley.edu/workshops/qhc2014-1" rel="nofollow external" class="bo">Workshop on Quantum Games and Protocols</a> at the Simons Institute for the Theory of Computing, UC Berkeley.</p>
    <p>Omar’s research include adiabatic quantum Hamiltonian complexity, quantum computational simulation of topology and use of quantum optics to understand device independent cryptography.  His work on quantum computing is done in collaboration with his mentor, CSEE Professor <a href="http://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel Lomonaco</a>.</p></div>
]]>
</Body>
<Summary>CSEE Ph.D. student Omar Shehab received a travel grant to present his research, UNKNOTTING as a k-local Hamiltonian problem, at the 2014 Quantum Information Processing conference, which will be...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/csee-student-presents-quantum-computing-research-at-quantum-information-processing-conference/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40196/guest@my.umbc.edu/f0fa5f5857eb27c46cd0b0871eb55223/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Jan 2014 23:09:57 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="40188" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40188">
<Title>UMBC project to study what influences home energy use</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/mpssbig.png" alt="mpssbig" width="700" height="547" style="max-width: 100%; height: auto;"></p>
    <p>UMBC’s <a href="http://bit.ly/MPSSL" rel="nofollow external" class="bo">Mobile Pervasive and Sensor Systems Laboratory</a> is looking for subjects who live in Baltimore City to interview for a study about what influences their energy use at home.  The study is part of an NSF-sponsored <a href="http://www.greenhomestudy.com/" rel="nofollow external" class="bo">Green Home Study</a> project that aims to make it easier for off-grid and grid-tied home residents to make smart choices about managing energy.</p></div>
]]>
</Body>
<Summary>UMBC’s Mobile Pervasive and Sensor Systems Laboratory is looking for subjects who live in Baltimore City to interview for a study about what influences their energy use at home.  The study is part...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/umbc-project-to-study-what-influences-home-energy-use/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40188/guest@my.umbc.edu/b6606b3255ca7aeffa95d4e54477267d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Jan 2014 17:21:06 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="40146" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40146">
<Title>PhD Defense: Chris Morris, Multi-Modal Saliency Fusion for Illustrative Image Enhancement</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/morris.png" width="700" height="351" style="max-width: 100%; height: auto;"></p>
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h3>Ph.D. Dissertation Defense</h3>
    <h2>Multi-Modal Saliency Fusion for Illustrative Image Enhancement</h2>
    <h2>Christopher J. Morris</h2>
    <h3>10:30-12:30, Wednesday, 15 January 2013, ITE 365 &amp; 352</h3>
    <p>Digitally manipulated or augmented images are increasingly prevalent. Multisensor systems produce augmented images that integrate data into a single context. Mixed-reality images are generated from insertion of computer generated objects into a natural scene. Digital processing for application-specific tasks (e.g., compression or network transmission) can create images distorted with processing artifacts. Digital image augmentation can lead to the inclusion of artifacts that influence the perception of the image.</p>
    <p>Visual cues (e.g., depth or size cues) may no longer be perceptually consistent in an augmented image. A feature deemed important in its local context may no longer be in the broader integrated context. Inserted synthetic objects may not possess the appropriate visual cues for proper perception of the overall scene. Finer cues that distinguish critical features may be lost in compressed images. Enhancing augmented images to add or restore visual cues can improve the image’s perceptibility.</p>
    <p>This dissertation presents a framework for illustrating images to enhance critical features. The enhancements improve the perception and comprehension of the augmented image. The framework uses a linear combination of image (2D), surface topology (3D), and task based saliency measures to identify the critical features in the image. The use of multi-modal saliency allows the visualization designer to adjust the definition of critical features based on the attributes of the scene and the task at hand. Upon identification, the features are enhanced using a non-photorealistic rendering (NPR) deferred illustration technique. The enhancements, inspired by an analysis of artists’ techniques, bolster the features’ perceptual cues.</p>
    <p>To measure the amount of similar salient features between the enhanced image and the original image, the framework describes the Saliency Similarity Metric (SSM). The SSM is feedback with which to make informed decisions to tune the visualization. The benefits of illustrative enhancement are analyzed using objective and subjective evaluations. Using conventional metrics, illustrative enhancements improve the perceptual image quality of images distorted by noise or compression artifacts. User survey results reveal that enhancements must be carefully applied for perceptual improvement. The framework can be effectively utilized in mobile rendering, augmented reality, and sensor fusion applications.</p>
    <p>Committee: Drs. Penny Rheingans (chair), Dan Bailey, Jian Chen, Thomas Jackman (Desert Research Institute), Anupam Joshi and Marc Olano</p></div>
]]>
</Body>
<Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Ph.D. Dissertation Defense   Multi-Modal Saliency Fusion for Illustrative Image Enhancement   Christopher J....</Summary>
<Website>http://www.csee.umbc.edu/2014/01/phd-defense-chris-morris-multi-modal-saliency-fusion-for-illustrative-image-enhancement/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40146/guest@my.umbc.edu/fae9b302bf932ef4b473dd8885a4dd8f/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 11 Jan 2014 10:46:33 -0500</PostedAt>
<EditAt>Sat, 11 Jan 2014 10:46:33 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="40080" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40080">
<Title>PhD proposal: Yunsu Lee, Functional Reference Ontology Development</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/yunsu21.png" width="700" height="302" style="max-width: 100%; height: auto;"></p>
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h3>Ph.D. Dissertation Proposal</h3>
    <h2>Functional Reference Ontology Development: a Design Pattern Approach</h2>
    <h2>Yunsu Lee</h2>
    <h3>1:00pm Friday, January 10, 2014, ITE325b, UMBC</h3>
    <p>The next generation of smart manufacturing systems will be developed by composing advanced manufacturing components and IT services introducing new technologies. These new technologies can lead to dramatic improvements in the ability to monitor, control, and optimize all aspects of manufacturing. The ability to compose advanced manufacturing components and IT services enhances agility, resiliency, and productivity of a manufacturing system. In order to make the composition possible, functional knowledge of manufacturing components and IT services should be captured and shared explicitly. Recent researches have shown that a semantically precise and rich reference functional ontology enables effective composition. However, since domains of factories and production networks are large, evolving, and heterogeneous, developing a reference functional ontology is a challenging task. Specifically, conceptual functionality modeling that characterizes various features of manufacturing components and IT services at different levels of abstraction is a difficult task. Even if the reference functional ontology is developed successfully, there will certainly be interoperability issues between the reference functional ontology and local proprietary information models. Firstly, the conceptual conflict issues may arise primarily from the fact that the reference functional ontology does not reflect actual users’ or providers’ conceptualizations. Secondly, structural conflict issues may arise from diverse modeling choices in local, proprietary information models.</p>
    <p>The objective of our research is to assess utility of design patterns in addressing the issues in the reference functional ontology development, specifically OWL ontology design patterns (ODPs). To achieve the objective, we will assess inductive approaches to identifying the ODPs, and explore development of a methodology for resolving structural differences between the reference functional ontology and local proprietary information models. The key potential contributions of this work include 1) new method to identify information patterns of functionalities in manufacturing components and IT services, 2) new inductive ODP development process which starts with the pattern definition of the specific functionality concepts, with subsequent grouping of these patterns into more general patterns, and 3) ODP-based ontology transformation to resolve structural conflicts between the reference functional ontology and local proprietary information models.</p>
    <p>Committee: Drs. Yun Peng (chair), Tim Finin, Yelena Yesha, Milton Halem, Nenad Ivezic (NIST) and Boonserm Kulvatunyou (NIST)</p></div>
]]>
</Body>
<Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Ph.D. Dissertation Proposal   Functional Reference Ontology Development: a Design Pattern Approach   Yunsu...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/phd-proposal-yunsu-lee-functional-reference-ontology-development-a-design-pattern-approach/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40080/guest@my.umbc.edu/035a57fc175ae42a5d2e2a7392c4efc1/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 09 Jan 2014 17:12:00 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="40038" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/40038">
<Title>NSA Best Scientific Cybersecurity Paper Competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/01/cyber.png" alt="" width="700" height="229" style="max-width: 100%; height: auto;"></p>
    <p>The National Security Agency is soliciting nominations for the 2013 <a href="http://cps-vo.org/group/sos/papercompetition/submit" rel="nofollow external" class="bo">Best Scientific Cybersecurity Paper Competition</a>. The competition is for scientific papers published between October 1, 2012 and December 31, 2013 that show an outstanding contribution to cybersecurity science. The nomination deadline is March 31, 2014.</p>
    <p>The competition was created to stimulate research toward the development of systems that are resilient to cyber attacks. Entries are judged on scientific merit, the strength and significance of the work reported, and the degree to which the papers exemplify how to perform and report scientific research in cybersecurity.</p>
    <p>The three <a href="http://cps-vo.org/group/sos/papercompetition2012" rel="nofollow external" class="bo">winning papers</a> from the 2012 cometition can be viewed at the <a href="http://cps-vo.org/" rel="nofollow external" class="bo">Cyber-Physical Systems</a> website.</p>
    <p>This year’s nominations will be reviewed by a panel of distinguished experts including Dr. Whitfield Diffie, Dr. Dan Geer (In-Q-Tel), Dr. John McLean (NRL), Professor Angela Sasse, (University College London), Prof. Fred Schneider (Cornell), Mr. Phillip Venables (Goldman Sachs), Prof. David Wagner (UC Berkeley), and Dr. Jeannette Wing (Microsoft Research).</p>
    <p>The contest winner and honorable mentions will be announced on the <a href="http://www.nsa.gov" rel="nofollow external" class="bo">NSA external web site</a> and the winner will be invited to present the winning paper to an audience of cybersecurity experts. For more information on eligibility criteria, criteria for judging and nomination procedures, see the <a href="http://cps-vo.org/group/sos/papercompetition/submit" rel="nofollow external" class="bo">2013 Best Scientific Cybersecurity Paper Competition</a> site.</p></div>
]]>
</Body>
<Summary>The National Security Agency is soliciting nominations for the 2013 Best Scientific Cybersecurity Paper Competition. The competition is for scientific papers published between October 1, 2012 and...</Summary>
<Website>http://www.csee.umbc.edu/2014/01/nsa-best-scientific-cybersecurity-paper-competition/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/40038/guest@my.umbc.edu/0b9fb561c056640d79ac79c4fc346d02/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 08 Jan 2014 11:48:25 -0500</PostedAt>
</NewsItem>

</News>
