<?xml version="1.0"?>
<News hasArchived="false" page="72" pageCount="221" pageSize="10" timestamp="Fri, 01 May 2026 14:14:05 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=72">
<NewsItem contentIssues="true" id="66550" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66550">
<Title>Free screening: CODE: Debugging the Gender Gap, 3-5 Fri 3/31, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/03/code..png" style="max-width: 100%; height: auto;"></p>
    <p>Join the UMBC Computer Science Education Club and the Center for Women in Technology for a free screening of the award winning film, <a href="https://www.codedoc.co/" rel="nofollow external" class="bo">CODE: Debugging the Gender Gap</a>.  The documentary exposes the dearth of American female and minority software engineers and explores the reasons for this gender gap.  CODE raises the question: what would society gain from having more women and minorities code?</p>
    <p>CODE will be screened on Friday March 31 at 3:00-5:00pm in ITE 104.  A discussion about the film will immediately follow the screening. Snacks will be provided!  RSVP via <a href="http://my.umbc.edu/groups/cwitaffiliates/events/49029" rel="nofollow external" class="bo">myUMBC</a> to let the organizers know you will be there on Friday 3/31!.</p>
    <p>Here’s a trailer for the film:</p>
    <p><div class="embed-container"><iframe src="https://www.youtube.com/embed/8VVb6M8pTvE" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/03/code-debugging-gender-gap-film/" rel="nofollow external" class="bo">Free screening: CODE: Debugging the Gender Gap, 3-5 Fri 3/31, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Join the UMBC Computer Science Education Club and the Center for Women in Technology for a free screening of the award winning film, CODE: Debugging the Gender Gap.  The documentary exposes the...</Summary>
<Website>https://www.csee.umbc.edu/2017/03/code-debugging-gender-gap-film/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66550/guest@my.umbc.edu/cd549efc69bfcd71722b67dfddd22853/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cwit</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>education</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 16 Mar 2017 15:51:23 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="66465" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66465">
<Title>talk: Phase synchrony in heart-brain interactions predicts personality and emotions, 1pm 3/17</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/03/brain.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>UMBC CSEE Seminar Series</h3>
    <h2><strong>Phase synchrony in heart-brain interactions predicts personality and emotions</strong></h2>
    <h3><strong>Ehsan Shokri Kojori</strong><br><strong> NIH, National Institute on Alcoloh Abuse and Alcoholism</strong></h3>
    <h3>1:00-2:00pm Friday, 17 March 2017, ITE 231</h3>
    <p>Despite the historical interest in the link between brain and heart, it is unknown whether brain and heart interactions provide meaningful information about emotions and personality. Here we studied the phase and amplitude of coherence between cardiac pulse and resting state fMRI signals in 203 subjects. We show low-frequency (LF, &lt; 0.1 Hz) components of the resting-state networks (RSN) share significant content with corresponding components in physiological recordings. We found LF cardiovascular components precede those in RSNs, and LF respiratory components follow those in RSNs. Phase dispersion (in LF) between cardiac (but not respiratory) and RSN signals predicted a main positivity-negativity dimension of personality (r = 0.31, p &lt; 0.0001) and emotions (r = 0.24, p = 0.001). Specifically, higher phase dispersion between cardiac and brain RSNs predicted higher tendency toward negative inclinations. In summary, these results provide evidence that brain-wide sensitivity to cardiovascular signaling predicts a main dimension of personality and emotions. Finally, our analysis of phase dispersion may have diagnostic value in specific neuropsychiatric disorders.</p>
    <p>Dr. Ehsan Shokri Kojori joined the <a href="https://www.niaaa.nih.gov/research/niaaa-intramural-program/niaaa-laboratories/laboratory-neuroimaging" rel="nofollow external" class="bo">Laboratory of Neuroimaging</a> at the NIH National Institute on Alcohol Abuse and Alcoholism  as a postdoctoral IRTA fellow in August 2014 and became a Research Fellow in May 2016. He earned a PhD degree in cognitive neuroscience from the University of Texas at Dallas in Spring 2014. Ehsan also has a background in electrical engineering and signal processing. His interests include combining brain imaging modalities (e.g., fMRI, DTI, and PET) and behavioral measurements to understand the neurocognitive underpinnings of goal directed behavior. His current work involves studying how addiction and alcohol abuse affect efficiency and energetic cost of the brain networks. He is also working on developing novel methodologies to better characterize anatomical and functional brain connectivity indices.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/03/heart-brain-interactions-predict-personality-emotions/" rel="nofollow external" class="bo">talk: Phase synchrony in heart-brain interactions predicts personality and emotions, 1pm 3/17</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC CSEE Seminar Series   Phase synchrony in heart-brain interactions predicts personality and emotions   Ehsan Shokri Kojori  NIH, National Institute on Alcoloh Abuse and Alcoholism...</Summary>
<Website>https://www.csee.umbc.edu/2017/03/heart-brain-interactions-predict-personality-emotions/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66465/guest@my.umbc.edu/571df0504daefe21e6e989e13f82cee2/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Mar 2017 12:13:01 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="66343" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66343">
<Title>Drs. Joshi and Forno assess CIA Wikileaks &#8216;Vault7&#8217;</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <br><img src="https://cdn.theconversation.com/files/160100/width754/image-20170309-21018-1gx6ex.jpg" alt="Image 20170309 21018 1gx6ex" style="max-width: 100%; height: auto;"><p><br><span><a href="https://www.shutterstock.com/image-vector/wikileaks-document-leaked-secret-confidential-digital-550243126" rel="nofollow external" class="bo">Graphic via shutterstock.com</a></span><br></p><p>This week’s WikiLeaks release of what is apparently a <a href="https://wikileaks.org/ciav7p1/" rel="nofollow external" class="bo">trove of Central Intelligence Agency information related to its computer hacking</a> should surprise no one: Despite its complaints of being targeted by cyberattackers from other countries, the U.S. does a fair amount of its own hacking. Multiple federal agencies are involved, including the CIA and the <a href="https://theintercept.com/2016/12/29/top-secret-snowden-document-reveals-what-the-nsa-knew-about-previous-russian-hacking/" rel="nofollow external" class="bo">National Security Agency</a>, and <a href="https://www.theguardian.com/world/2013/dec/02/history-of-5-eyes-explainer" rel="nofollow external" class="bo">even friendly nations</a>. These latest disclosures also remind us of the cybersecurity truism that any electronic device connected to a network can be hacked.  </p>
    <p>As cybersecurity researchers conducting a preliminary review of the data released in what WikiLeaks calls “Vault 7,” we find the documents mostly confirm existing knowledge about how common hacking is and <a href="https://arstechnica.com/security/2017/03/wikileaks-publishes-what-it-says-is-trove-of-cia-hacking-tools/" rel="nofollow external" class="bo">how many potential targets</a> there are in the world. </p>
    <p>This round of leaks, of documents dating from 2013 to 2016, also reinforces perhaps the most troubling piece of information we already knew: Individuals and the government itself must step up cyberdefense efforts to protect sensitive information.</p>
    <h2>Almost everything is hackable</h2>
    <p>For years, security experts and researchers have warned that if something is connected to the internet it is <a href="http://www.pcworld.com/article/227576/everything_is_hackable_and_cyber_criminals_cant_be_tracked.html" rel="nofollow external" class="bo">vulnerable to attack</a>. And spies around the world <a href="http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm" rel="nofollow external" class="bo">routinely gather intelligence electronically</a> for diplomatic, economic and national security purposes.</p>
    <p>As a result, we and <a href="https://law.vanderbilt.edu/news/snowden-revelations-not-surprising-to-those-following-expansion-of-government-surveillance-programs-according-to-christopher-slobogin/" rel="nofollow external" class="bo">others in the cybersecurity community</a> were not surprised by the <a href="https://www.theguardian.com/us-news/the-nsa-files" rel="nofollow external" class="bo">2013 revelations from former NSA contractor Edward Snowden</a>. We knew that the spying programs he disclosed were possible if not likely. By contrast, the <a href="https://theconversation.com/snowden-a-picture-of-the-cybersecurity-state-65310" rel="nofollow external" class="bo">general public and many politicians were astounded</a> and worried by the Snowden documents, just as many citizens are surprised by this week’s WikiLeaks disclosure.</p>
    <p>One element of the new WikiLeaks “Vault 7” release provides more insight into the scope of government spying. In a project called “<a href="https://www.cnet.com/news/weeping-angel-hack-samsung-smart-tv-cia-wikileaks/" rel="nofollow external" class="bo">Weeping Angel</a>,” CIA hackers and their U.K. counterparts worked to turn <a href="https://wikileaks.org/ciav7p1/cms/page_12353643.html" rel="nofollow external" class="bo">Samsung F8000 smart television sets into remote surveillance tools</a>. Hacked TV’s could record what their owners said nearby, even when they appeared to be turned off.</p>
    <p>The fact that the CIA specifically targeted smart televisions should serve as yet another a wake-up call to the general public and technology manufacturers about <a href="http://www.snopes.com/2016/02/12/samsung-smart-tvs-spying/" rel="nofollow external" class="bo">cybersecurity issues inherent in modern devices</a>. Specifically, “<a href="https://theconversation.com/security-risks-in-the-age-of-smart-homes-58756" rel="nofollow external" class="bo">smart home</a>” and <a href="https://theconversation.com/its-the-year-2020-hows-your-cybersecurity-57868" rel="nofollow external" class="bo">Internet of Things devices</a> represent a massive vulnerability. They are open to attack not only by government organizations seeking intelligence on national security information, but terrorists, criminals or other adversaries.</p>
    <p>It’s not necessarily a good idea to have always-on and network-enabled microphones or cameras in every room of the house. Despite many of these devices being sold with <a href="https://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/" rel="nofollow external" class="bo">insecure default settings</a>, the market is <a href="https://www.verizon.com/about/sites/default/files/state-of-the-internet-of-things-market-report-2016.pdf" rel="nofollow external" class="bo">growing very rapidly</a>. More and more people are buying <a href="http://www.computerworld.com/article/3128791/data-privacy/how-google-homes-always-on-will-affect-privacy.html" rel="nofollow external" class="bo">Google Home</a> or <a href="https://www.theguardian.com/technology/2015/nov/21/amazon-echo-alexa-home-robot-privacy-cloud" rel="nofollow external" class="bo">Amazon Echo</a> devices, <a href="http://www.cbsnews.com/news/baby-monitors-connect-internet-vulnerable-hackers-cybersecurity/" rel="nofollow external" class="bo">Wi-Fi enabled baby monitors</a> and even <a href="http://www.pcmag.com/article2/0,2817,2498510,00.asp" rel="nofollow external" class="bo">internet-connected home-security equipment</a>.</p>
    <p>These have already caused problems for families whose <a href="http://www.theverge.com/2017/1/7/14200210/amazon-alexa-tech-news-anchor-order-dollhouse" rel="nofollow external" class="bo">devices overheard a TV newscaster and ordered dollhouses</a> or whose <a href="https://arstechnica.com/security/2017/02/creepy-iot-teddy-bear-leaks-2-million-parents-and-kids-voice-messages/" rel="nofollow external" class="bo">kids were tracked by a teddy bear</a>. And large parts of the internet were disrupted when many “smart” devices were <a href="https://krebsonsecurity.com/2016/11/akamai-on-the-record-krebsonsecurity-attack/" rel="nofollow external" class="bo">hijacked and used to attack other networked systems</a>.</p>
    <h2>Phones were a key target</h2>
    <p>The CIA also explored ways to take control of <a href="https://theintercept.com/2017/03/07/the-cia-didnt-break-signal-or-whatsapp-despite-what-youve-heard/" rel="nofollow external" class="bo">smartphone operating systems</a>, allowing the agency to monitor everything a phone’s user did, said or typed on the device. Doing so would provide a way around <a href="https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp/" rel="nofollow external" class="bo">post-Snowden encrypted communications apps</a> like WhatsApp and Signal. However, some of the CIA’s methods of attack have <a href="https://www.engadget.com/2017/03/08/apple-ios-wikileaks-cia-exploits/" rel="nofollow external" class="bo">already been blocked</a> by technology vendors’ security updates.</p>
    <p>The CIA’s apparent ability to hack smartphones casts doubt on the need for <a href="https://www.nytimes.com/2015/11/19/us/politics/fbi-director-repeats-call-that-ability-to-read-encrypted-messages-is-crucial.html" rel="nofollow external" class="bo">officials’ repeated calls</a> to <a href="https://theconversation.com/in-fbi-versus-apple-government-strengthened-techs-hand-on-privacy-55353" rel="nofollow external" class="bo">weaken mobile phone encryption features</a>. It also weakens the <a href="https://www.techdirt.com/articles/20140413/07094726892/obama-tells-nsa-to-reveal-not-exploit-flaws-except-all-times-it-wants-to-do-opposite.shtml" rel="nofollow external" class="bo">government’s claim</a> that it must strengthen surveillance by <a href="https://wikileaks.org/ciav7p1/cms/page_13205587.html" rel="nofollow external" class="bo">not telling tech companies when it learns of security weaknesses</a> in everyday products. Just like the door to your house, technological vulnerabilities work equally well in providing access to both “good guys” and “bad guys.”</p>
    <p>Ultimately, as a society, we must continue to debate the trade-offs between the conveniences of modern technologies and security/privacy. There are definite benefits and conveniences from pervasive and wearable computing, smart cars and televisions, internet-enabled refrigerators and thermostats, and the like. But there are very real security and privacy concerns associated with installing and using them in our personal environments and private spaces. Additional problems can come from how our governments address these issues while respecting popular opinion and acknowledging the capabilities of modern technology.</p>
    <p>As citizens, we must decide what level of risk we – as a nation, a society and as individuals – are willing to face when using internet-connected products.</p>
    <h2>We’re frequent attackers – but bad defenders</h2>
    <p>The WikiLeaks release also reconfirms a reality the U.S. might prefer to keep quiet: While the government objects to others’ offensive cyberattacks against the United States, we launch them too. This isn’t news, but it hurts America’s reputation as a fair and aboveboard player on the international stage. It also also reduces American officials’ credibility when they object to other countries’ electronic activities. </p>
    <p>Leaks like this reveal America’s methods to the world, providing plenty of direction for adversaries who want to replicate what government agents do – or even potentially launch attacks that appear to come from American agencies to conceal their own involvement or deflect attribution.</p>
    <p>But perhaps the most disturbing message the WikiLeaks disclosure represents is in the leak itself: It’s another high-profile, high-volume breach of information from a major U.S. government agency – and at least the third significant one from the secretive intelligence community. </p>
    <p>Perhaps the largest U.S. government data loss incident was the 2014 <a href="https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/" rel="nofollow external" class="bo">Office of Personnel Management breach</a> that affected <a href="https://www.opm.gov/cybersecurity/cybersecurity-incidents/" rel="nofollow external" class="bo">more than 20 million current and former federal workers</a> and their families (including this article’s authors). But the U.S. has never truly secured its digital data against cyberattackers. In the 1990s there was <a href="http://www.politico.com/magazine/story/2016/03/russia-cyber-war-fred-kaplan-book-213746" rel="nofollow external" class="bo">Moonlight Maze</a>; in the 2000s there was <a href="https://www.schneier.com/blog/archives/2005/12/titan_rain_1.html" rel="nofollow external" class="bo">Titan Rain</a>. And that’s just for starters.</p>
    <p>Our government needs to focus more on the mundane tasks of cyberdefense. Keeping others out of key systems is crucial to American national security, and to the proper function of our government, military and civilian systems.</p>
    <p>Achieving this is no easy task. In the wake of this latest WikiLeaks release, it’s certain that the CIA and other agencies will further step up their <a href="https://theconversation.com/how-governments-and-companies-can-prevent-the-next-insider-attack-72235" rel="nofollow external" class="bo">insider-threat protections</a> and other defenses. But part of the problem is the amount of data the country is trying to keep secret in the first place.</p>
    <p>We recommend the federal government review its classification policies to determine, frankly, if too much information is needlessly declared secret. Reportedly, as many as <a href="https://www.dni.gov/files/documents/Newsroom/Reports%20and%20Pubs/2015-Annual_Report_on_Security_Clearance_Determinations.pdf" rel="nofollow external" class="bo">4.2 million people</a> – federal employees and contractors – have security clearances. If so many people need or are given access to handle classified material, is there just too much of it to begin with? In any case, the information our government declares secret is available to a very large group of people.</p>
    <p>If the U.S. is going to be successful at securing its crucial government information, it must do a better job managing the volume of information generated and controlling access to it, both authorized and otherwise.  Granted, neither is an easy task. However, absent fundamental changes that fix the proverbial <a href="https://www.stratfor.com/analysis/i-could-tell-you-id-have-kill-you-cult-classification-intelligence" rel="nofollow external" class="bo">cult of classification</a>, there likely will be many more WikiLeaks-type disclosures in the future.</p>
    <p><span><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em> and <a href="https://theconversation.com/profiles/anupam-joshi-152246" rel="nofollow external" class="bo">Anupam Joshi</a>, Oros Family Professor and Chair, Department of Computer Science &amp; Electrical Engineering, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></span></p>
    <p>This article was originally published on <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a>. Read the <a href="https://theconversation.com/the-wikileaks-cia-release-when-will-we-learn-74226" rel="nofollow external" class="bo">original article</a>.</p>
    <p></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/03/joshi-forno-assess-cia-wikileaks-vault7/" rel="nofollow external" class="bo">Drs. Joshi and Forno assess CIA Wikileaks ‘Vault7’</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Graphic via shutterstock.com   This week’s WikiLeaks release of what is apparently a trove of Central Intelligence Agency information related to its computer hacking should surprise no one:...</Summary>
<Website>https://www.csee.umbc.edu/2017/03/joshi-forno-assess-cia-wikileaks-vault7/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66343/guest@my.umbc.edu/49076d5a03be0880d519152b4d3e5c35/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 09 Mar 2017 10:45:55 -0500</PostedAt>
<EditAt>Thu, 09 Mar 2017 10:45:55 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="66205" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66205">
<Title>UMBC Grand Challenge Scholars Program</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/Grand_Challenge-e1467399774973.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC Grand Challenge Scholars Program</h1>
    <h2>Engaging students in problems that matter</h2>
    <h2>Reviewing applications beginning April 1, 2017</h2>
    <p>Do you want to help solve important problems facing society? Would you like to join and be part of a vibrant interdisciplinary community? Do you want to be recognized by the <a href="https://www.nae.edu/" rel="nofollow external" class="bo">National Academy of Engineering</a> for your contributions? Apply to the <a href="http://gcsp.umbc.edu/" rel="nofollow external" class="bo">GCSP program</a> and become a Grand Challenge Scholar!  Open to all UMBC majors.</p>
    <h3>What are the NAE Grand Challenges?</h3>
    <p>✔ <span>Fourteen broad problems facing society in sustainability, health, security, and knowledge<br></span>✔ <span>Solutions will require interdisciplinary teams and years of sustained effort</span></p>
    <h3>What does a UMBC Grand Challenge Scholar do?</h3>
    <p>✔ <span>Design a personalized program<br></span>✔ <span>Explore a selected Grand Challenge through five program areas: </span>research, interdisciplinarity, entrepreneurship, global perspectives and service<br>
    ✔ <span><span>Receive formal designation as an NAE Grand Challenge Scholar at graduation</span></span></p>
    <h3>What are the program requirements?</h3>
    <p><span>✔ </span>Three one-credit <span>GCSP seminars </span>(GCSP 301, 302, 401)<br>
    ✔ <span>GC-related experiences </span><span>in the five program areas, such as </span>coursework, study abroad, internships and mentored research</p>
    <h3>How and when do I apply?</h3>
    <p>✔ <span>Apply online at the <strong><a href="http://gcsp.umbc.edu/" rel="nofollow external" class="bo">GCSP website</a></strong>. Applications after April 1 are subject to program capacity<br></span>✔ <span>Submit your transcript, short essay answers, two references and optionally a letter of support<br></span>✔ <span>Designed for students completing their sophomore year, but all students may apply<br></span>✔ Contact GCSP Director Professor Marie desJardins at *protected email**protected email*with any questions</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/03/umbc-grand-challenge-scholars-program/" rel="nofollow external" class="bo">UMBC Grand Challenge Scholars Program</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Grand Challenge Scholars Program   Engaging students in problems that matter   Reviewing applications beginning April 1, 2017   Do you want to help solve important problems facing society?...</Summary>
<Website>https://www.csee.umbc.edu/2017/03/umbc-grand-challenge-scholars-program/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66205/guest@my.umbc.edu/73b45c593a3897dbe833594e7e0746f4/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>students</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 05 Mar 2017 10:40:37 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="66027" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66027">
<Title>*Reminder* West 14 Event Monday 2/27</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>Hey Everyone, be sure to attend the West 14 event we are hosting tomorrow at 4-5 pm in ITE 457. Please RSVP here.</div><div><br></div><div><a href="http://my.umbc.edu/groups/issa/events/47977">http://my.umbc.edu/groups/issa/events/47977</a></div></div>
]]>
</Body>
<Summary>Hey Everyone, be sure to attend the West 14 event we are hosting tomorrow at 4-5 pm in ITE 457. Please RSVP here.     http://my.umbc.edu/groups/issa/events/47977</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66027/guest@my.umbc.edu/b4ec1e28e36cffe5c959ff957f5a0672/api/pixel</TrackingUrl>
<Tag>issa</Tag>
<Tag>spring2017</Tag>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 26 Feb 2017 21:01:07 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="66007" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/66007">
<Title>Prof.  Gymama Slaughter on the body as a battery at Baltimore&#8217;s Light City festival</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/LightCityLabs.png" width="100%" style="max-width: 100%; height: auto;"></p>
    <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/gymamaSlaughter2.jpg" style="max-width: 100%; height: auto;"></div>
    <p>How can we begin to use our body as a power source? The same way we use a battery: by harnessing its chemical energy. As part of the annual Baltimore Light City Festival: A Festival of Light, Music and Innovations, Dr. <a href="https://www.csee.umbc.edu/people/faculty/gymama-slaughter/" rel="nofollow external" class="bo">Gymama Slaughter</a> will present her research work on “The body as a battery – harnessing its chemical energy to power wearable and implantable sensors that diagnose and monitor diseases.” Dr. Slaughter will show how her team is converting the biochemical energy in blood sugar into electrical power, and how it is used to power wearable and implantable sensors.</p>
    <p>The <a href="http://lightcity.org/labs-at-light-city/health-lab/" rel="nofollow external" class="bo">HealthLab@LightCity</a> conference brings together innovators and leaders from Baltimore and across the nation to explore emerging technologies and innovative practices that have the potential to improve the quality of life and health outcomes for all people, here and around the world.</p>
    <p><a href="http://lightcity.org/labs-at-light-city/health-lab/" rel="nofollow external" class="bo">HealthLab@lightcity</a> is presented by Kaiser Permanente and will be held 8:00am-6:00pm on Monday, 3 April 2017 at the IMET Columbus Center (701 E Pratt St, Baltimore, MD 21202) as part of Baltimore’s annual <a href="http://lightcity.org/about-the-festival/about/" rel="nofollow external" class="bo">Light City Festival</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/02/prof-gymama-slaughter-body-battery-baltimores-light-city-festival/" rel="nofollow external" class="bo">Prof.  Gymama Slaughter on the body as a battery at Baltimore’s Light City festival</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>How can we begin to use our body as a power source? The same way we use a battery: by harnessing its chemical energy. As part of the annual Baltimore Light City Festival: A Festival of Light,...</Summary>
<Website>https://www.csee.umbc.edu/2017/02/prof-gymama-slaughter-body-battery-baltimores-light-city-festival/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/66007/guest@my.umbc.edu/b02151b6ccada13712fcb0e23e97988b/api/pixel</TrackingUrl>
<Tag>baltimore</Tag>
<Tag>computer-engineering</Tag>
<Tag>events</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 24 Feb 2017 16:55:24 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="65953" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/65953">
<Title>UMBC Cyber Dawgs to hold student cybersecurity competition on Saturday, March 11</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/MACCDC_2015-1024x768.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The <a href="http://umbccd.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Dawgs</a> will hold a cybersecurity Capture the Flag competition on Saturday, March 11th from 9am-5pm in the Public Policy building. The event will be a jeopardy-style competition where individual competitors answer questions about aspects of cybersecurity, including network forensics, reverse engineering, reconnaissance, and cryptography.</p>
    <p>The competition is open to all current UMBC students, both beginners and experts alike. Participants will learn and execute both offensive and defensive security practices that are relevant in today’s computing environments using their laptops to access a system that provides hints and guidance on completing the challenges.</p>
    <p>Top performers will receive prizes, including a new ChromeBook, a Wireless Pineapple Nano and a YARD Stick One. There will also be door prizes for a few randomly selected, lucky participants, including some Raspberry PIs. Breakfast and lunch will be provided. Some of the Cyber Dawg club’s sponsors will be at the event for students to network with, so bring your resumes.</p>
    <p>Students who are interested must register <a href="http://bit.ly/umbcCTF" rel="nofollow external" class="bo">online</a> in advance and bring a laptop to the event. Registration and participation is free but space is limited.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/02/umbc-cyber-dawgs-student-cybersecurity-competition/" rel="nofollow external" class="bo">UMBC Cyber Dawgs to hold student cybersecurity competition on Saturday, March 11</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Dawgs will hold a cybersecurity Capture the Flag competition on Saturday, March 11th from 9am-5pm in the Public Policy building. The event will be a jeopardy-style competition where...</Summary>
<Website>https://www.csee.umbc.edu/2017/02/umbc-cyber-dawgs-student-cybersecurity-competition/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/65953/guest@my.umbc.edu/0386ca3389a23909826667ce3f70ee4e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 23 Feb 2017 09:37:30 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="65897" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/65897">
<Title>UMBC CSEE alumnus Josiah Dykstra receives PECASE award for cybercrime work</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/The-White-House-1920x768.jpg" style="max-width: 100%; height: auto;"></p>
    <p><strong>Josiah Dykstra</strong>, Ph.D. ‘13, computer science, has received the prominent <a href="https://www.nsf.gov/awards/pecase.jsp" rel="nofollow external" class="bo">Presidential Early Career Award in Science and Engineering</a> (PECASE) for his work on digital forensics cloud computing, with applications in tackling cybercrime.</p>
    <p>While he was a graduate student at UMBC, Dykstra worked full-time at the National Security Agency, where he remains a cybersecurity researcher, but for his dissertation took a fresh path and selected an area of research very different from his projects at the agency. Dykstra worked in UMBC’s Cyber Defense Lab with <strong>Alan Sherman</strong>, professor of computer science and electrical engineering, and studied how crimes using computers are tracked through information stored on the computers themselves and in email accounts.</p>
    <p></p>
    <p>To determine whether and how a crime occurred, Dykstra explains, a law enforcement official may need to extract data from a phone or computer using a third party vendor. He looked at whether law enforcement could trust that the data they are having analyzed to have not been manipulated. The legal and trust issues associated with accessing such data, and the technical and legal challenges associated with information stored on electronics, formed the central focus of Dykstra’s graduate work.</p>
    <p>Reflecting on his PECASE award, Dykstra shares, “I didn’t know when I was doing the work at UMBC that it was a possibility” to receive this kind of recognition. He hopes his achievement offers encouragement for students currently working through their dissertations, tackling challenging research questions. “It’s helpful for students to see people who have done work like this,” he says.</p>
    <p>The PECASE is one of the highest honors the federal government can bestow on early-stage science and engineering researchers. PECASE award recipients are presented with their awards during a ceremony at the White House, which will be held in the coming months.</p>
    <p>Other recent PECASE recipients from UMBC include <strong>Kafui Dzirasa</strong> ‘01, chemical engineering, now an assistant assistant professor of psychiatry and behavioral sciences at Duke University, who received the award in spring 2016, and <strong>Justin Jacobs</strong> ‘14 Ph.D., statistics, who was recognized in spring 2014.</p>
    <p><em>Adapted from a <a href="http://news.umbc.edu/josiah-dykstra-receives-presidential-early-career-award-in-science-and-engineering-for-work-tackling-cybercrime/" rel="nofollow external" class="bo">UMBC News post</a>. Header image by Geoff Livingston, <a href="https://creativecommons.org/licenses/by-sa/2.0/" rel="nofollow external" class="bo">CC by 2.0</a>.  </em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/02/csee-alum-josiah-dykstra-receives-pecase-award-work-tackling-cybercrime/" rel="nofollow external" class="bo">UMBC CSEE alumnus Josiah Dykstra receives PECASE award for cybercrime work</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Josiah Dykstra, Ph.D. ‘13, computer science, has received the prominent Presidential Early Career Award in Science and Engineering (PECASE) for his work on digital forensics cloud computing, with...</Summary>
<Website>https://www.csee.umbc.edu/2017/02/csee-alum-josiah-dykstra-receives-pecase-award-work-tackling-cybercrime/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/65897/guest@my.umbc.edu/0a6efa42e69901ac7a8b6254508c17d0/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 21 Feb 2017 20:47:44 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="65869" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/65869">
<Title>talk: Securing Networks by Detecting Logical Flaws in Protocol Implementations</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/10/sdn.jpg" style="max-width: 100%; height: auto;"></p>
    <h2>Securing Networks by Detecting Logical Flaws in Protocol Implementations</h2>
    <h3>Dr. Endadul Hoque<br>
    Postdoctoral Research Associate, Northeastern University</h3>
    <h3>12:00pm Wednesday, 22 February 2017, ITE 325b, UMBC</h3>
    <p>Implementations of network protocols are integral components of various networked computing systems, spanning from Internet-of-Things (IoT) to enormous data centers. Research efforts to defend these implementations by introducing new designs for security and advocating best practices in secure programming are not always feasible, nor effective. Even rigorous analysis of the design of a protocol is not sufficient, as indicated by the frequent reports of bugs discovered in protocol implementations after deployment. Hence, it is crucial to develop automated techniques and tools to help programmers detect logical flaws in actual implementations of protocols.</p>
    <p>In this talk, I will first present an automated compliance checker to analyze operational behavior of a protocol implementation for detecting semantic bugs, which cause the implementation fail to comply with its specifications. Next, I will present an automated testing tool to analyze robustness of a protocol implementation against malicious attacks mounted to degrade its runtime performance (e.g., throughput). Finally, I will conclude with several directions for future research to aid the development of secure networked systems.</p>
    <p>Endadul Hoque is a Postdoctoral Research Associate in the College of Computer and Information Science at Northeastern University. He received his PhD in Computer Science from Purdue University in 2015. His research revolves around practical cybersecurity problems in the networking domain. His current research focuses on leveraging program analysis and formal verification techniques to create automated analysis tools for ensuring secure and reliable operations of networked systems. During his PhD, he received the Graduate Teaching Fellowship award in 2014 and the Bilsland Dissertation Fellowship award in 2015. His research on automated adversarial testing has also been integrated into course curriculum at Purdue University for teaching secure distributed systems programming.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/02/talk-securing-networks-detecting-logical-flaws-protocol-implementations/" rel="nofollow external" class="bo">talk: Securing Networks by Detecting Logical Flaws in Protocol Implementations</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Securing Networks by Detecting Logical Flaws in Protocol Implementations   Dr. Endadul Hoque  Postdoctoral Research Associate, Northeastern University   12:00pm Wednesday, 22 February 2017, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2017/02/talk-securing-networks-detecting-logical-flaws-protocol-implementations/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/65869/guest@my.umbc.edu/b200687f332b1e4376a0a52bf3721a5e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 21 Feb 2017 08:21:03 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="65833" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/65833">
<Title>talk: Semantic Approach to Automating Big Data and Cloud, 12pm Mon 2/20</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/02/cloud-data-center.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>A Semantically Rich Approach to Automating Big Data and Cloud</h1>
    <h3>Dr. Karuna Joshi<br>
    University of Maryland, Baltimore County</h3>
    <h3>12:00pm Monday, 20 February 2017, ITE 325b, UMBC</h3>
    <p>With the explosion of Big Data and the growth of data science, there is an urgent need to automate the data lifecycle of generation, ingestion, analytics, knowledge extraction, and archival and deletion. With a promise of rapid provisioning, scalability and high computing capability, cloud based services are being adopted as the default computing environment for Big Data analytics.</p>
    <p>To effectively manage their data on cloud, organizations need to continuously monitor the rules/constraints and performance metrics listed in a variety of legal contracts. However, these documents, like Service Level Agreements (SLA), privacy policy, regulatory documents, etc., are currently managed as plain text files meant principally for human consumption. Additionally, providers often define their own performance metrics for their services. These factors hinder the automation of steps of the data lifecycle, leading to inefficiencies in using the dynamic and elastic elements of the Data+Cloud ecosystem and require manual effort to monitor the service performance. Moreover, Cloud-based service providers are collecting large amounts of data about their consumers including Personally Identifiable Information (PII) like contact addresses, credit card details, bank account details, etc. They are offering customized service level agreements which indicate how such data will be handled. To see whether these agreements meet individual or corporate requirements, or comply with statutory constraints, currently involves significant human effort.</p>
    <p>In this talk, we present the semantically rich approach that we have developed to automatically extract knowledge from large textual datasets, specially legal documents, using text analytics and Semantic Web technologies. We describe the OWL ontologies that we have developed, and the techniques to extract key terms and rules from textual legal documents. We will also illustrate application of our work in domains such as education, healthcare and cybersecurity.</p>
    <p><a href="https://www.csee.umbc.edu/~kjoshi1/" rel="nofollow external" class="bo">Karuna P. Joshi</a> is a Research Assistant Professor of Computer Science and Electrical Engineering at the University of Maryland, Baltimore County. Her research focuses on Data Science and Big Data Analytics, especially legal text analytics; knowledge representation and reasoning; privacy and security of Big Data and Cloud; and cloud enabled Health IT services. She has published over 30 papers, including in journals like IEEE Transactions on Service Computing and conferences like IEEE Big Data and IEEE CLOUD. Her research is supported by organizations like DoD, ONR, NIST, NSF, GE and IBM. She was also awarded the TEDCO MII award for exploring the commercialization of her research. She has been awarded the prestigious IBM PhD Fellowship. She also has over 15 years of industrial experience, primarily as an IT project manager. She worked at the International Monetary Fund for nearly a decade. Her managerial experience includes portfolio/program/project management across various domains. She received the MS and PhD degrees in Computer Science from UMBC and bachelor’s degree in Computer Engineering from the University of Mumbai, India.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/02/semantically-rich-approach-automating-big-data-cloud/" rel="nofollow external" class="bo">talk: Semantic Approach to Automating Big Data and Cloud, 12pm Mon 2/20</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>A Semantically Rich Approach to Automating Big Data and Cloud   Dr. Karuna Joshi  University of Maryland, Baltimore County   12:00pm Monday, 20 February 2017, ITE 325b, UMBC   With the explosion...</Summary>
<Website>https://www.csee.umbc.edu/2017/02/semantically-rich-approach-automating-big-data-cloud/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/65833/guest@my.umbc.edu/8ef95438be9ee6b6643c4f2efd20e6b9/api/pixel</TrackingUrl>
<Tag>data-science</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 18 Feb 2017 11:40:52 -0500</PostedAt>
</NewsItem>

</News>
