<?xml version="1.0"?>
<News hasArchived="false" page="51" pageCount="221" pageSize="10" timestamp="Wed, 29 Apr 2026 15:16:29 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=51">
<NewsItem contentIssues="false" id="82855" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82855">
<Title>Technical Interview Prep with the Career Center is Tomorrow!</Title>
<Tagline>A few more RSVPS Needed to make the event happen</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>Hey ISSA'ers,</span><div><br></div><div>Have you been selected as a potential candidate for a job you've applied for? Or are curious about how to prepare for an interview?</div><div><br></div><div>We have the workshop for you! If you have any doubts or want advice when preparing for an in person interview, be sure to attend our Technical Interview Workshop. You will learn tips and tricks on How to Ace Your Interview.</div><div><br></div><div>Also, it is required that you <strong>RSVP by Wednesday March 13th by 9 am</strong> <strong>(*Changed*)</strong> for this event on myUMBC if you plan to attend. </div><div><br></div><div>Please RSVP by 9 am and tell your friends to come too.</div><div><br></div><div>We hope to see you there!</div><div><br></div><div>~Your ISSA Board</div></div>
]]>
</Body>
<Summary>Hey ISSA'ers,    Have you been selected as a potential candidate for a job you've applied for? Or are curious about how to prepare for an interview?     We have the workshop for you! If you have...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82855/guest@my.umbc.edu/113dc0897a5433a601a8e1e8184b99a0/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 12 Mar 2019 21:11:42 -0400</PostedAt>
<EditAt>Tue, 12 Mar 2019 21:12:18 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="82734" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82734">
<Title>Technical Interview Prep ft. the Career Center-RSVP Required</Title>
<Tagline>Learn tips and tricks at our Technical Interview Workshop!</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Hey ISSA'ers,<div><br></div><div>This is a reminder about our upcoming Technical Interview Workshop with the Career Center on <strong>Wednesday, March 13th </strong>from<strong> 12-12:50 </strong>in<strong> ITE 237</strong>.</div><div><br></div><div>Come and learn tips and tricks on How to Ace your Interview! If you have any doubts or want advice when preparing for an interview, be sure to attend our Technical Interview Workshop on <strong>March 13th</strong> from <strong>12-12:50</strong> in <strong>ITE 237</strong>.<strong> </strong></div><div><br></div><div><strong>RSVP is required</strong> so please make sure that you <strong>RSVP</strong> by <strong>Monday March 11th</strong> on myUMBC if you plan to attend. It is required in order to attend the event. </div><div><br></div><div>We hope to see you there!</div><div><br></div><div>~Your ISSA Board </div><div><br></div></div>
]]>
</Body>
<Summary>Hey ISSA'ers,    This is a reminder about our upcoming Technical Interview Workshop with the Career Center on Wednesday, March 13th from 12-12:50 in ITE 237.     Come and learn tips and tricks on...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82734/guest@my.umbc.edu/85b964699e639b931665167965607481/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/xxlarge.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/xlarge.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/large.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/medium.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/small.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/xsmall.jpg?1552061746</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/082/734/94b4052c12c8a1b9c1b30598153dfdf4/xxsmall.jpg?1552061746</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 08 Mar 2019 11:17:15 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="82652" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82652">
<Title>Group Study with your Major is TODAY in ITE 238 from 12-1 pm</Title>
<Tagline>Room has Changed!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>This will be an open classroom for anyone who wants to do homework, study, or work on group projects. Be sure to bring your friends and laptops.</span><div><br></div><div>Come study with us <strong>this</strong> <strong>Wednesday</strong>,<strong> March 6th</strong> from <strong>12-1pm</strong> in <strong>ITE 238</strong>.</div></div>
]]>
</Body>
<Summary>This will be an open classroom for anyone who wants to do homework, study, or work on group projects. Be sure to bring your friends and laptops.    Come study with us this Wednesday, March...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82652/guest@my.umbc.edu/3047a3cb980404e668a1b03c18d47136/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/xxlarge.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/xlarge.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/large.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/medium.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/small.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/xsmall.jpg?1551886850</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/082/652/dbcf16fe2b1bc3033876be456f1e1c3d/xxsmall.jpg?1551886850</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 06 Mar 2019 10:33:26 -0500</PostedAt>
<EditAt>Wed, 06 Mar 2019 12:03:42 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="82553" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82553">
<Title>Group Study with your Major on March 6th @ 12-1pm in ITE 237</Title>
<Tagline>Great way to study and work on homework and projects!</Tagline>
<Body>
<![CDATA[
    <div class="html-content">This will be an open classroom for anyone who wants to do homework, study, or work on group projects. Be sure to bring your friends and laptops and feel free to use the whiteboard.<div><br></div><div>Come study with us <strong>this</strong> <strong>Wednesday</strong>,<strong> March 6th</strong> from <strong>12-1pm</strong> in <strong>ITE 237</strong>.</div></div>
]]>
</Body>
<Summary>This will be an open classroom for anyone who wants to do homework, study, or work on group projects. Be sure to bring your friends and laptops and feel free to use the whiteboard.    Come study...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82553/guest@my.umbc.edu/67fdf5330595ebf475aeb64b561828a3/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 04 Mar 2019 10:11:02 -0500</PostedAt>
<EditAt>Mon, 04 Mar 2019 10:18:18 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="82291" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82291">
<Title>talk: Does Wireless and Mobile Networking Research Still Matter? 12pm Wed 2/27, ITE325</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/wirelessNetworking-1-1024x364.jpg" alt="" style="max-width: 100%; height: auto;"><h2><strong>Does Wireless and Mobile Networking Research Still Matter?</strong></h2>
    
    
    
    <h3><strong>Dr. Dmitri Perkins, </strong>National Science Foundation</h3>
    
    
    
    <h3><strong>12:00pm Wed. Feb. 27, 2019, ITE325, UMBC</strong></h3>
    
    
    
    <p>The miniaturization of radio and communication technologies has led to the widespread proliferation of wireless-enabled devices and to an explosion of mobile applications and services. Without question, wireless networking has become an enabling and critical component in practically every business sector. Wireless technologies and terms, such as, WiFi, Bluetooth, and broadband cellular are now embedded in our world and have become a part of society’s regular vocabulary. Given this ever-increasing success, one might be tempted to opine whether any core research challenges remain in the wireless and mobile networking domain.  </p>
    
    
    
    <p>In this talk, I will present the case that the answer is most certainly “yes” and that the promise of a truly ubiquitous Wireless Internet of Everything, capable of seamlessly interconnecting billions of devices, humans, intelligent systems, information sources, and enabling transformative applications (e.g., remote healthcare monitoring) still faces a plethora of inter-related challenges. These include, for example, exponential growth in mobile traffic, dynamic spectrum allocation, real-time management of network resources, design of intelligent radio technology, energy-efficient protocol designs, and network security/trust/privacy. I will highlight our most recent work on the topic of opportunistic wireless spectrum access, which focused on practical and implementable radio spectrum management frameworks and related spectrum sensing and sharing protocols, using today’s front-end communication technology. I will also discuss my vision for developing a sustainable and nationally recognized wireless networking research program, which includes emerging areas such as networked cyber-physical systems and mobile IoT.  </p>
    
    
    
    <p>Dr. Dmitri Perkins is currently a Program Director at the U.S. National Science Foundation (NSF), where he leads the Industry-University Cooperative Research Centers (IUCRC) Program for the Directorate of Computer &amp; Information Science &amp; Engineering (CISE). In this role, Dr. Perkins provides oversight of 25 multi-university industry-focused research centers, spanning all areas of CISE research and comprising over 75 U.S. academic institutions, 5 international sites, and 225+ industry partners. Prior to joining the NSF in 2015, Dr. Perkins was the Hardy Edmiston Endowed Professor of Computer Science and Engineering at the University of Louisiana at Lafayette, where he was the founding Director of the Wireless Systems and Performance Engineering Research (WiSPER) Laboratory. His core research interests include wireless and mobile communications, networking, and computing, with an emphasis on cognitive and adaptive protocols, formal design of experiments, performance engineering, dynamic resource and spectrum management, and security challenges. His research work spans multiple networking paradigms, including sensor/actuator networks, wireless broadband networks, multi-hop wireless networks, cognitive radio networks, and large-scale heterogeneous wireless systems. Dr. Perkins has published over 45 peer-reviewed journal articles and conference papers and is also the co-author of the book, Cognitive Radio Networks: From Theory to Practice. He received the NSF CAREER award in 2005 and was the recipient of the Outstanding Professor Award within the College of Sciences at the University of Louisiana in 2012. In 2013 and 2014, he was an ONR visiting research fellow at the Naval Research Laboratory (NRL), conducting research on dynamic spectrum awareness in heterogeneous wireless networks. Dr.  Perkins has held leadership roles at the university and national levels. He was elected to serve as the Chair of the University Graduate Council and served a two-year term as Associate Dean of the Ray P. Authement College of Sciences at the University of Louisiana in 2012-2013. He has served on the technical program committee of numerous IEEE and ACM international conferences and served on advisory committees for Computer and Networks Systems (CNS) Division of the NSF. He is currently an associate editor of IEEE Transactions on Mobile Computing. Dr. Perkins received the Ph.D. degree in computer science and engineering from Michigan State University in 2002 and the B.S. degree in computer science from Tuskegee University in 1995.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/02/talk-does-wireless-and-mobile-networking-research-still-matter/" rel="nofollow external" class="bo">talk: Does Wireless and Mobile Networking Research Still Matter? 12pm Wed 2/27, ITE325</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Does Wireless and Mobile Networking Research Still Matter?      Dr. Dmitri Perkins, National Science Foundation      12:00pm Wed. Feb. 27, 2019, ITE325, UMBC      The miniaturization of radio and...</Summary>
<Website>https://www.csee.umbc.edu/2019/02/talk-does-wireless-and-mobile-networking-research-still-matter/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82291/guest@my.umbc.edu/8fe88dabeb5101f6bb2bbf02965032ff/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 21 Feb 2019 19:50:54 -0500</PostedAt>
<EditAt>Thu, 21 Feb 2019 19:50:54 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="82167" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82167">
<Title>**TODAY is our First GBM in ITE 227 @ Noon</Title>
<Tagline>Hear from our Board about Upcoming Events this Semester</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>Our first GBM is TODAY, February 18th during Free Hour.</div><div><br></div><div>During the GBM, we will introduce our officers, give an overview of our upcoming events, and provide information on other computer or security related events happening on campus.</div><div><br></div><div>Plus feel free to stick around after the GBM and speak with our officers, we are looking for freshman representatives to support our club moving forward (this is also a great way to get some leadership experience).</div></div>
]]>
</Body>
<Summary>Our first GBM is TODAY, February 18th during Free Hour.     During the GBM, we will introduce our officers, give an overview of our upcoming events, and provide information on other computer or...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82167/guest@my.umbc.edu/97e99b13c2811d776f4cb106a220a150/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 18 Feb 2019 10:05:08 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="82128" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82128">
<Title>First GBM on Monday Feb 18 in ITE 227 during Free Hour!</Title>
<Tagline>Meet our officers &amp; Get an overview of upcoming events</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Hey ISSA'ers,<div><br></div><div>We hope you can make it to our first GBM this coming Monday. During the GBM, we will introduce our officers, give an overview of our upcoming events, and provide information on other computer or security related events happening on campus.</div><div><br></div><div>Plus feel free to stick around after the GBM and speak with our officers, we are looking for freshman representatives to support our club moving forward (this is also a great way to get some leadership experience).</div><div><br></div><div>~Your ISSA Executive Board</div></div>
]]>
</Body>
<Summary>Hey ISSA'ers,    We hope you can make it to our first GBM this coming Monday. During the GBM, we will introduce our officers, give an overview of our upcoming events, and provide information on...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82128/guest@my.umbc.edu/f16d973f2ad1a8b1c767e49cfc7e65f4/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 14 Feb 2019 22:32:44 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="82075" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/82075">
<Title>talk: OMI, Invisible Technology that will Revolutionize Supercomputing and AI; 3pm Thr Feb 14, ITE325</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <h4><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/fasterservers.png" alt="" style="max-width: 100%; height: auto;"></h4>
    <h4>Distinguished Lecture Series</h4>
    <h1>OMI: The Invisible Technology that will Revolutionize Supercomputing and AI</h1>
    <h3>Prof. Harm Peter Hofstee<br>
    Delft University of Technology<br>
    Distinguished Research Staff, IBM Austin Research Laboratory</h3>
    <h3>3:00pm Thursday 14 February, 2019, ITE325, UMBC</h3>
    <p>In this talk, we present some major trends in compute, memory/storage, and networking, and for each we will discuss how OpenCAPI Memory Interface (OMI) and related interface technologies are set to transform how we build, program, and think about our computer systems. For the first of these trends, it allows us to compensate for the reduced growth in processor performance (per dollar) and performance per Watt. Accelerators are sharing memory and other resources over NVLink or OpenCAPI with conventional IBM POWER cores and are driving performance in the world’s largest supercomputers and IBM’s systems are targeting AI and other workloads. The second addresses the reduced improvement in memory cost and capacity. OMI allows us to use technologies other than DRAM as memory, and because many of these technologies are nonvolatile, the line between memory and storage is becoming blurred. The third, OpenCAPI-based networking leverages the rapid improvements in cost per Gb/s and allows us to contemplate systems that extend memory beyond the node using commodity infrastructure.</p>
    <p><a href="https://en.wikipedia.org/wiki/Peter_Hofstee" rel="nofollow external" class="bo">Harm Peter Hofstee</a> is a Dutch physicist and computer scientist who currently is a distinguished research staff member at the IBM Austin Research Laboratory, USA, and a part-time Professor in Big Data Systems at Delft University of Technology, Netherlands. Hofstee is best known for his contributions to Heterogeneous computing as the chief architect of the Synergistic Processor Elements in the Cell Broadband Engine processor used in the Sony PlayStation 3, and the first supercomputer to reach sustained Petaflop operation. His early research work on coherently attached reconfigurable acceleration on POWER7 paved the way for the new coherent attach processor interface on POWER8. Hofstee is an IBM Master Inventor with more than 100 issued patents and a member of the IBM Academy of Technology. Hofstee was born in Groningen and obtained his master’s degree in theoretical physics of the University of Groningen in 1988. He continued to study at the California Institute of Technology where he wrote a master’s thesis Constructing Some Distributed Programs in 1991 and obtained a Ph.D. with a thesis titled Synchronizing Processes in 1995. He joined Caltech as a lecturer for two years and moved to IBM in the Austin, Texas, Research Laboratory, where he had staff member, senior technical staff member and distinguished engineer positions.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/02/umbc-talk-omi-the-invisible-technology-that-will-revolutionize-supercomputing-and-ai-memory/" rel="nofollow external" class="bo">talk: OMI, Invisible Technology that will Revolutionize Supercomputing and AI; 3pm Thr Feb 14, ITE325</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Distinguished Lecture Series   OMI: The Invisible Technology that will Revolutionize Supercomputing and AI   Prof. Harm Peter Hofstee  Delft University of Technology  Distinguished Research Staff,...</Summary>
<Website>https://www.csee.umbc.edu/2019/02/umbc-talk-omi-the-invisible-technology-that-will-revolutionize-supercomputing-and-ai-memory/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/82075/guest@my.umbc.edu/0bfd9f5d78db97cdd7d289f5ff8d51d5/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 13 Feb 2019 10:42:40 -0500</PostedAt>
<EditAt>Wed, 13 Feb 2019 10:42:40 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81991" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/81991">
<Title>IS Graduate Programs &amp; Research on Data Privacy &amp; Security</Title>
<Tagline>Friday March 1st @ Noon in ITE 456</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>Presented by the IS department's: </span><div><span>Dr. Zhiyuan Chen</span><div><br></div><div>Ever thought about graduate school? According to a Georgetown study on economic values of education, those who earn a graduate degree in business or computer majors earn on average 30% more than those with just a bachelor’s degree with the same major. Find out how to prepare for and apply to graduate programs in Information Systems. You will also learn some interesting research projects on data privacy and security and opportunities for undergraduates to get involved.</div><div><br></div><div><div><br></div><div>**Lunch will be provided**</div></div></div></div>
]]>
</Body>
<Summary>Presented by the IS department's:  Dr. Zhiyuan Chen    Ever thought about graduate school? According to a Georgetown study on economic values of education, those who earn a graduate degree in...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/81991/guest@my.umbc.edu/d6fad6b50a3e19732a402156de0d0c32/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/xxlarge.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/xlarge.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/large.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/medium.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/small.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/xsmall.jpg?1549831275</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/081/991/b05c6d34e08e19e5432ce06f7d419adb/xxsmall.jpg?1549831275</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 10 Feb 2019 15:39:02 -0500</PostedAt>
<EditAt>Thu, 21 Feb 2019 21:17:19 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81985" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/81985">
<Title>talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <h1><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/iotsecurity.png" alt="" style="max-width: 100%; height: auto;"></h1>
    <h1><strong>Exploiting IoT Vulnerabilities</strong></h1>
    <h3>Dr. Yatish Joshi, Senior Engineer, Cisco Systems</h3>
    <h4>11:45am-1:00pm Monday, 18 February 2019, ITE 325-B</h4>
    <p>The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance. In most cases, setup simply requires using a web or phone app to configure Wi-Fi credentials. Digital home assistants, security cameras, smart locks, home appliances, smart switches, toys, vacuum cleaners, thermostats, leakage sensors etc are examples of IoT devices that are widely used and deployed in home and enterprise environments.</p>
    <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/livedemo.png" alt="" style="max-width: 100%; height: auto;"></div>
    <p>The threat landscape is constantly evolving and threat actors are always on the prowl for new vulnerabilities they can exploit. With traditional attack methods yielding fewer exploits   due to the increased focus on security testing, frequent patches, increased user awareness, Threat actors have turned their attention on IoT devices and are exploiting inherent vulnerabilities in these devices. The vulnerabilities, always ON nature, and autonomous mode of operation allow attackers to spy on users, spoof data, or leverage them as botnet infrastructure to launch devastating attacks on third parties. Mirai, a well known IoT malware utilized hundreds and thousands of enslaved IoT devices to launch DDoS attacks on Dyn affecting access to Netflix, Twitter, Github and many other websites. With the release of the Mirai source code numerous variants of the malware are infecting IoT devices across the world and using them to carry out attacks.</p>
    <p>These attacks are made possible because the devices are manufactured without security in mind!. In this talk I will demonstrate how one can hack a widely available off-the-shelf IP Camera and router by exploiting the vulnerabilities present in these devices to get on the network, steal personal data, spy on a user, disrupt operation etc. We will also look at what can be done to mitigate the dangers posed by IOT devices.</p>
    <p>So attend hack &amp; defend!</p>
    <p>Dr. <a href="https://www.linkedin.com/in/yatish-joshi-aa064b13/" rel="nofollow external" class="bo">Yatish Joshi</a> is a software engineer in the Firepower division at Cisco Systems where he works on developing new features for Cisco’s security offerings. Yatish has a PhD in Computer Engineering from UMBC. Prior to Cisco Yatish worked as a lecturer at UMBC, and was a senior software engineer developing TV software at Samsung Electronics. When not working, he enjoys reading spy thrillers and fantasy novels.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/" rel="nofollow external" class="bo">talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Exploiting IoT Vulnerabilities   Dr. Yatish Joshi, Senior Engineer, Cisco Systems   11:45am-1:00pm Monday, 18 February 2019, ITE 325-B   The past decade has seen explosive growth in the use and...</Summary>
<Website>https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/81985/guest@my.umbc.edu/67ea9273678ebf0f510e538e435a78cd/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 08 Feb 2019 22:21:57 -0500</PostedAt>
<EditAt>Sun, 17 Feb 2019 16:00:57 -0500</EditAt>
</NewsItem>

</News>
