<?xml version="1.0"?>
<News hasArchived="false" page="75" pageCount="221" pageSize="10" timestamp="Sat, 02 May 2026 14:37:07 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=75">
<NewsItem contentIssues="false" id="64598" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64598">
<Title>talk: Biomedical Engineering Projects at UMBC&#8217;s Center for Advanced Sensor Technology</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/NIH_Grant-2569-copy.jpg" alt="UMBC Center for Advanced Sensor Technology" style="max-width: 100%; height: auto;"></h4>
    <h4><em>UMBC CSEE Research Seminar</em></h4>
    <h2><em> </em><strong>Biomedical Engineering Projects at CAST</strong></h2>
    <h3>Dr. Yordan Kostov</h3>
    <h3>UMBC Center for Advanced Sensing Technology</h3>
    <h3>1-2pm, Friday, 9 December 2016, ITE 229</h3>
    <p>The Center for Advanced Sensor Technology is currently leading two projects: “Biologics manufacturing on demand,” funded by DARPA, and “A wearable asthma trigger monitoring system with integrated physiological monitor,” funded by NIH.  The first project is focused on shrinking the footprint of a pharmaceutical factory down to suitcase, capable of producing biologics within twelve hours from the start. There is an ample need for drastically rethinking every detail of the process, with the need to miniaturize all the fluidic components (tanks, mixers, purification columns) and to create networked versions of the shakers, pumps, valves and sensors. The presentation highlights the need for novel sensing devices for process control and drug release. The second project is focused on development of three separate sensors for measuring CO2 in blood, concentration of dust particulate in air, and respiration rate.  These sensors must be networked together to collect real time data and transfer them to a central depository via a cell phone app. The presentation highlights the different challenges in creating the sensors.</p>
    <p> </p>
    <p>Dr. Yordan Kostov holds the B.Sc. and M.Sc. in Electrical Engineering, from Odessa Politechnic Institute, Ukraine. He received a Ph.D. Degree in Electrical/Chemical Engineering from Bulgarian Academy of Sciences for his work in the area of optical chemical sensors and biosensors. His post-doctoral training includes fellowships at University of Hannover, Germany and University of Maryland Biotechnology Institute. He was an assistant professor in the Department of Biotechincs, Sofia Technical University, Bulgaria. Since 2000, he is a research professor in the Department of Chemical and Biochemical Engineering, University of Maryland, Baltimore County (UMBC), with an appointment as assistant director of the UMBC Center for Advanced Sensor Technology. He is an affiliate professor in CSEE.  Dr. Kostov is involved in the development of chemical and biochemical sensors for biotechnology and biomedical applications.</p>
    <p><strong>Organizers: </strong>Tulay Adali (*protected email*) and Alan T. Sherman (*protected email*)</p>
    <p><strong>About the CSEE Seminar Series: </strong>The UMBC Department of Computer Science and Electrical Engineering presents technical talks on current significant research projects of broad interest to the Department and the research community.  Each talk is free and open to the public.  We welcome your feedback and suggestions for future talks.</p>
    <p><strong>Other UMBC CSEE Seminar Series: </strong>The UMBC Cyber Defense Lab (CDL) meets biweekly Fridays 11:15am-12:30pm in ITE 229, for research talks about cybersecurity.</p>
    <p> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2016/12/biomedical-engineering-projects-umbc-cast/" rel="nofollow external" class="bo">talk: Biomedical Engineering Projects at UMBC’s Center for Advanced Sensor Technology</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC CSEE Research Seminar    Biomedical Engineering Projects at CAST   Dr. Yordan Kostov   UMBC Center for Advanced Sensing Technology   1-2pm, Friday, 9 December 2016, ITE 229   The Center for...</Summary>
<Website>https://www.csee.umbc.edu/2016/12/biomedical-engineering-projects-umbc-cast/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64598/guest@my.umbc.edu/8828a07043ea67cf8a78a34039c2d4d7/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 01 Dec 2016 23:13:30 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="64599" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64599">
<Title>Event: Wanted, One Million IT Security Specialists by 2018</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2015/09/students_computers.jpg" style="max-width: 100%; height: auto;"></p>
    <p>Students, faculty, staff and community members are invited to join <a href="https://www.cwit.umbc.edu/" rel="nofollow external" class="bo">CWIT</a> and  <a href="http://stemrules.com/about-us/" rel="nofollow external" class="bo">STEMRules</a> for a lunch event to hear from and network with diverse professionals from across the cybersecurity industry.</p>
    <h3>Wanted: One Million IT Security Specialists by 2018</h3>
    <h4><em>You Could be One of Them</em></h4>
    <p>12-1:30pm Friday, 2 December 2016<br>
    Albin O. Kuhn Library Gallery (1st floor)<br>
    Lunch will be provided</p>
    <p><a href="https://docs.google.com/forms/d/e/1FAIpQLSdIouhsAybQhBcttmOJzCL95OYhn9aOIhboNix3ikscxKJ32w/viewform" rel="nofollow external" class="bo">RSVP: Please respond by December 1, 2016</a></p>
    <p>UMBC CWIT and <a href="http://stemrules.com/" rel="nofollow external" class="bo">STEMRules</a> host cyber professionals from the public, private, and nonprofit sectors who will relate their personal/professional journeys, answer questions and be available for networking. Speakers  will include the following individuals:</p>
    <ul><li><strong>Veda Woods  </strong>is an executive at an undisclosed Fortune 500 financial institution, a member of multiple boards and the executive director of the <a href="https://icmcp.org/" rel="nofollow external" class="bo">International Consortium of Minority Cybersecurity Professionals</a>.</li>
    <li><strong>William McBorrough</strong> is a second-generation engineer is the founder and Managing Director of Washington, DC-based <a href="http://mcglobaltech.com/" rel="nofollow external" class="bo">McGlobalTech</a> and an information security and risk management consultant.</li>
    <li><strong>Pamela E. Carbajal</strong> is a Cyber Security Compliance and Policy Analyst, Senior Consultant, at <a href="http://www.boozallen.com/" rel="nofollow external" class="bo">Booz Allen Hamilton</a>, a global management and technology consulting and engineering services firm.</li>
    <li><strong>Mahalakshmi “Maha” Venkataraman</strong> is a Senior Manager in the Software Engineering unit, and the technology lead for the anti-money laundering investigation team at <a href="https://www.capitalone.com/" rel="nofollow external" class="bo">Capital One</a>, a major bank holding company.</li>
    <li><strong>Lisa Jiggetts </strong>is the founder of the <a href="http://womenscyberjutsu.org/" rel="nofollow external" class="bo">Women’s Society of Cyberjutsu</a>, a nonprofit dedicated to empowering women to succeed in the cybersecurity field. She is a also a freelance mobile security consultant.</li>
    </ul><p> </p>
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/LisaJiggetts.jpg" alt="lisajiggetts" style="max-width: 100%; height: auto;"><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/MahaVenkataraman.jpg" alt="mahavenkataraman" style="max-width: 100%; height: auto;"><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/PamelaCarbajal.jpg" alt="pamelacarbajal" style="max-width: 100%; height: auto;"><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/VedaWoods.jpg" alt="vedawoods" style="max-width: 100%; height: auto;"><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/12/William-McBorrough.jpg" alt="william-mcborrough" style="max-width: 100%; height: auto;"></p>
    
    <p>The post <a href="https://www.csee.umbc.edu/2016/12/event-wanted-one-million-security-specialists-2018/" rel="nofollow external" class="bo">Event: Wanted, One Million IT Security Specialists by 2018</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Students, faculty, staff and community members are invited to join CWIT and  STEMRules for a lunch event to hear from and network with diverse professionals from across the cybersecurity industry....</Summary>
<Website>https://www.csee.umbc.edu/2016/12/event-wanted-one-million-security-specialists-2018/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64599/guest@my.umbc.edu/5a63c156cfe59a27c1cae240b007cf07/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cwit</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>jobs</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 01 Dec 2016 09:16:52 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="64600" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64600">
<Title>talk: Genetic ancestry predicts striatal dopamine D2 receptors, 1pm Dec 2, ITE229</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4>UMBC CSEE Seminar Series</h4>
    <h2>Genetic ancestry predicts striatal dopamine D2 receptors</h2>
    <h3>Dr. Corinde Wiers<br>
    National Institute on Alcohol Abuse and Alcoholism, Bethesda, MD</h3>
    <h3>1-2pm Friday, 2 December 2016, ITE 229, UMBC</h3>
    <p>Genetic ancestry was recently found to be associated with cortical geometry, cortical surface, and total brain volume in humans. Despite ethnic differences in allele frequency in dopaminergic genes associated with dopamine D2/D3 receptor availability (D2R), no study to date has investigated the relationship between genetic ancestry and striatal D2R. Here, we show that genetic informative markers significantly predict dorsal striatal D2R in 117 healthy ethnically diverse residents of the New York metropolitan area using Positron Emission Tomography (PET) with [11C]raclopride, while correcting for age, sex, BMI, education years, and estimated socioeconomic status based on individuals’ ZIP codes. Striatal D2R may thus be modulated by genetic ancestry, although differences in environmental factors between ethnic groups could mediate these effects. Findings may have implications for pharmacological treatment targeting D2R, such as antipsychotic D2R antagonists.</p>
    <p>Corinde Wiers, PhD, is a Research Fellow at the National Institute on Alcohol Abuse and Alcoholism, in the Laboratory of Neuroimaging of Nora D. Volkow, M.D. After her studies in Psychology and Psychobiology at the University of Amsterdam (Netherlands) and Sussex University (UK) in 2010, she completed her PhD in Psychology at the Berlin School of Mind and Brain and Free University Berlin (Germany) in 2014, where she investigated neural underpinnings of automatic approach behavior to alcohol cues, and neural effects of behavioral trainings in patients with alcohol use disorder. The main goal of Dr. Wiers’ research is to understand cognitive, neurobiological and (epi)genetic processes involved in drug addiction, using functional MRI, PET, psychophysics and molecular techniques. She currently works on how peripheral epigenetic markers relate to brain functioning in drug addiction and other psychiatric disorders. Further research interests include the neurobiology of sleep, effects of sleep deprivation, comorbidities of sleep and substance use disorders, and how neuroimaging techniques can be of use for treatment in psychiatry.</p>
    <p>Host: Tulay Adali</p>
    <p>About the CSEE Seminar Series: The UMBC Department of Computer Science and Electrical Engineering presents technical talks on current significant research projects of broad interest to the Department and the research community. Each talk is free and open to the public. We welcome your feedback and suggestions for future talks.</p>
    <p>Organizers: Tulay Adali and Alan Sherman</p>
    <p>The post <a href="https://www.csee.umbc.edu/2016/11/genetic-ancestry-predicts-striatal-dopamine-d2-receptors/" rel="nofollow external" class="bo">talk: Genetic ancestry predicts striatal dopamine D2 receptors, 1pm Dec 2, ITE229</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC CSEE Seminar Series   Genetic ancestry predicts striatal dopamine D2 receptors   Dr. Corinde Wiers  National Institute on Alcohol Abuse and Alcoholism, Bethesda, MD   1-2pm Friday, 2 December...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/genetic-ancestry-predicts-striatal-dopamine-d2-receptors/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64600/guest@my.umbc.edu/2eb9b42760edf9e99e3bb080dc41dac3/api/pixel</TrackingUrl>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 30 Nov 2016 22:59:45 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="64210" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64210">
<Title>Talk: The need for speed in cybersecurity</Title>
<Tagline>DHS Dpty Under Sec. of Cybersecurity Dr. Phyllis A. Schneck</Tagline>
<Body>
<![CDATA[
    <div class="html-content">CHMPR Distinguished Lecturers Series<div><br></div><div><a href="https://www.csee.umbc.edu/2016/11/talk-phyllis-schneck-dhs-cybresecurity/" rel="nofollow external" class="bo">The Need for Speed</a></div><div><br></div><div>
    
    <a href="https://www.dhs.gov/person/phyllis-schneck" rel="nofollow external" class="bo">Dr. Phyllis A. Schneck</a>
     </div><div>Deputy Under Secretary of Cybersecurity</div><div>Department of Homeland Security 
    </div><div><br></div><div>3:30pm Thur, 1 Dec 2016, UCC 310 </div><div>3:00pm Coffee, tea, and cookies</div><div><br></div><div> As computers get faster, they change the world. Processors get smaller, the number of devices with processors gets bigger, and the amount of information that can be produced and transported grows exponentially. Everything on the planet, unless one can eat it, is likely to have electronic logic within - and, most recently, to be connected to other devices. Our way of life and critical infrastructures, from power and water to finance is enabled by this ability to process light, and transport information at that speed. The speed of computing is enabling new conveniences and capabilities, and furthering science in directions never before imagined from DNA studies to particle physics. This amazingly connected world, however, introduces new vulnerabilities as many connected devices were not designed to be safe from unauthorized access and use. We must pay special attention to protecting infrastructure components such as information and the intricate signaling systems that generate and distribute electricity. This requires specialized algorithms to mine the masses of data to recognize normal internet activity from potential threat indicators. The goal is to create a more self-healing network, accomplishing with information what nature does with biological responses - creating an electronic immune system. Cognitive computing can provide groundbreaking results in data mining and analysis that will enhance the Cybersecurity to protect the other applications such as genomic and physics research. Software and hardware developers need to work together to create the algorithms and custom hardware to minimize heat, maximize computation and, finally, create a secure design.
    
    We can use the speed of computing to enhance Cybersecurity as well - thus the paradox of the need for speed to protect itself. 
    </div><div><br></div><div>Dr. Phyllis Schneck is the Deputy Under Secretary for Cybersecurity &amp; Communications with the Department of Homeland Security, where she is also the Chief Cybersecurity Official. Previously held positions include Chief Technology Officer for Global Public Sector, McAfee, Inc.; VP of Enterprise Services, eCommSecurity; and VP of Corporate Strategy for SecureWorks, Inc. Schneck earned her Ph.D. in computer science from Georgia Tech and pioneered the field of info security and security-based high-performance computing at Georgia Tech. She holds seven information security patents and has six research publications in the areas of info security, real-time systems, telecom and software engineering.
    
    I</div><div><br></div><div>f you plan on attending, please RSVP to Michelle Bobovych at <a href="mailto:bobovych@umbc.edu">bobovych@umbc.edu</a> to ensure we have a sufficient number of chairs.</div></div>
]]>
</Body>
<Summary>CHMPR Distinguished Lecturers Series    The Need for Speed       Dr. Phyllis A. Schneck    Deputy Under Secretary of Cybersecurity  Department of Homeland Security       3:30pm Thur, 1 Dec 2016,...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/talk-phyllis-schneck-dhs-cybresecurity/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64210/guest@my.umbc.edu/b0fbcc7dcf1e2cfd694e7e772db4d65f/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>CHMPR , Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/xxlarge.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/xlarge.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/large.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/medium.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/small.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/xsmall.jpg?1480433730</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/064/210/26e5f52fb8c6201ef7f2850042b6b72e/xxsmall.jpg?1480433730</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 29 Nov 2016 10:38:00 -0500</PostedAt>
<EditAt>Tue, 29 Nov 2016 10:38:33 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="64601" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64601">
<Title>talk: Dr. Phyllis Schneck (DHS) on The Need for Speed in Cybersecurity</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><br><span> <span> </span> <span> </span><br><a href="https://www.csee.umbc.edu/wp-content/uploads/2016/11/dhs-cybersecurity-head.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/11/dhs-cybersecurity-head.jpg" alt="Dr. Phyllis Schneck is the Deputy Under Secretary for Cybersecurity &amp; Communications with the Department of Homeland Security, where she is also the Chief Cybersecurity Official." style="max-width: 100%; height: auto;"></a></span></p>
    <h3>CHMPR Distinguished Lecturers Series</h3>
    <h1>The Need for Speed</h1>
    <h2><a href="https://www.dhs.gov/person/phyllis-schneck" rel="nofollow external" class="bo">Dr. Phyllis A. Schneck</a></h2>
    <h2>Deputy Under Secretary of Cybersecurity<br>
    Department of Homeland Security</h2>
    <h3>3:30pm Thursday, 1 December 2016, UC 310<br>
    3:00pm Coffee, tea, and cookies</h3>
    <p>As computers get faster, they change the world. Processors get smaller, the number of devices with processors gets bigger, and the amount of information that can be produced and transported grows exponentially. Everything on the planet, unless one can eat it, is likely to have electronic logic within – and, most recently, to be connected to other devices. Our way of life and critical infrastructures, from power and water to finance is enabled by this ability to process light, and transport information at that speed. The speed of computing is enabling new conveniences and capabilities, and furthering science in directions never before imagined from DNA studies to particle physics. This amazingly connected world, however, introduces new vulnerabilities as many connected devices were not designed to be safe from unauthorized access and use. We must pay special attention to protecting infrastructure components such as information and the intricate signaling systems that generate and distribute electricity. This requires specialized algorithms to mine the masses of data to recognize normal internet activity from potential threat indicators. The goal is to create a more self-healing network, accomplishing with information what nature does with biological responses – creating an electronic immune system. Cognitive computing can provide groundbreaking results in data mining and analysis that will enhance the Cybersecurity to protect the other applications such as genomic and physics research. Software and hardware developers need to work together to create the algorithms and custom hardware to minimize heat, maximize computation and, finally, create a secure design.</p>
    <p>We can use the speed of computing to enhance Cybersecurity as well – thus the paradox of the need for speed to protect itself.</p>
    <p><a href="https://www.dhs.gov/person/phyllis-schneck" rel="nofollow external" class="bo">Dr. Phyllis Schneck</a> is the Deputy Under Secretary for Cybersecurity &amp; Communications with the Department of Homeland Security, where she is also the Chief Cybersecurity Official. Previously held positions include Chief Technology Officer for Global Public Sector, McAfee, Inc.; VP of Enterprise Services, eCommSecurity; and VP of Corporate Strategy for SecureWorks, Inc. Schneck earned her Ph.D. in computer science from Georgia Tech and pioneered the field of info security and security-based high-performance computing at Georgia Tech. She holds seven information security patents and has six research publications in the areas of info security, real-time systems, telecom and software engineering.</p>
    <p>If you plan on attending, please RSVP to Michelle Bobovych at *protected email* to ensure we have a sufficient number of chairs.</p>
    
    <p>The post <a href="https://www.csee.umbc.edu/2016/11/talk-phyllis-schneck-dhs-cybresecurity/" rel="nofollow external" class="bo">talk: Dr. Phyllis Schneck (DHS) on The Need for Speed in Cybersecurity</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>CHMPR Distinguished Lecturers Series   The Need for Speed   Dr. Phyllis A. Schneck   Deputy Under Secretary of Cybersecurity  Department of Homeland Security   3:30pm Thursday, 1 December 2016, UC...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/talk-phyllis-schneck-dhs-cybresecurity/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64601/guest@my.umbc.edu/c232c85dcd5cfcaa03d8c06fb777f31f/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 29 Nov 2016 10:23:42 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="64602" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/64602">
<Title>UMBC Hour of Code, 11-2 Dec 7-8, Main Street</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2016/11/hourOfCode.png" alt="hourofcode" style="max-width: 100%; height: auto;"></p>
    <p>The <a href="http://my.umbc.edu/groups/cs-ed" rel="nofollow external" class="bo">CS Education</a> student org, with support from the <a href="http://ce21maryland.umbc.edu/projects/cs-matters/" rel="nofollow external" class="bo">CS Matters in Maryland </a>CS education project, is planning UMBC’s first-ever <strong>Hour of Code</strong> event. Hour of Code is an initiative that organizes hands-on learning experiences for students of all ages during CS Education Week (December 5-11, 2016, coinciding with Admiral Grace Hopper’s birthday).</p>
    <p><strong>UMBC’s Hour of Code</strong> will offer a hands-on experience for anybody who wants to try their hand at coding, December 7 and 8 from 11am-2pm on Main Street. We will have several special guests on Thursday — some students from Lakeland Elementary School will learn to code along with President Freeman Hrabowski from 11am-noon that day.</p>
    <p>We need many<strong> volunteers</strong> to help make this event a success! Although coding experience is useful, it is NOT necessary! We will have training events in advance of the event for everyone who volunteers, and we also have some no-coding-required jobs as well, including running a <a href="http://makeymakey.com/" rel="nofollow external" class="bo">Makey Makey</a> activity and helping out with the elementary school students.</p>
    <p>Please <a href="http://www.signupgenius.com/go/10c0f45aaab2aabfc1-hour" rel="nofollow external" class="bo">sign up to volunteer</a>. Stephanie Milani (Psychology major / CS minor) is organizing the volunteer effort — please feel free to contact her if you have any questions at *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2016/11/umbc-hour-of-code-2016/" rel="nofollow external" class="bo">UMBC Hour of Code, 11-2 Dec 7-8, Main Street</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The CS Education student org, with support from the CS Matters in Maryland CS education project, is planning UMBC’s first-ever Hour of Code event. Hour of Code is an initiative that organizes...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/umbc-hour-of-code-2016/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/64602/guest@my.umbc.edu/8f8b8c40ab2c88d63c9c71be59e7fd8d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>education</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 21 Nov 2016 13:43:31 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="63726" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63726">
<Title>Boosting Base-Station Anonymity in Wireless Sensor Networks</Title>
<Tagline>Sami Alsemairi PhD DIssertation Defense, 9:30 Wed Nov. 9, IT</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>Dissertation Defense Announcement</p>
    <p>Cross-Layer Techniques for Boosting Base-Station Anonymity in Wireless Sensor Networks</p>
    <p>Sami Alsemairi</p>
    <p>9:30 Wednesday, 9 November 2016, ITE 346</p>
    
    <p>Wireless Sensor Networks (WSNs) provide an effective solution for surveillance and data gathering applications in hostile environments where human presence is infeasible, risky or very costly. Examples of these applications include military reconnaissance, guarding boarders against human trafficking, security surveillance, etc. A WSN is typically composed of a large number of sensor nodes that probe their surrounding and transmit measurements over multi-hop paths to an in-situ Base-Station (BS). The BS not only acts as a sink of all collected sensor data but also provides network management and serves as a gateway to remote commend centers. Such an important role makes the BS a target of adversary attacks that opt to achieve Denial-of-Service (DoS) and nullify the WSN utility to the application. Even if the WSN applies conventional security mechanisms such as authentication and data encryption, the adversary may apply traffic analysis techniques to locate the BS and target it with attacks. This motivates a significant need for boosting BS anonymity to conceal its location.</p>
    
    <p>In this dissertation, we address the challenges of BS anonymity and develop a library of techniques to counter the threat of traffic analysis. The focus of our work is on the link and network layers. We first exploit packet combining as a means to vary the traffic density throughout the network. We call this technique combining the data payload of multiple packets (CoDa), where a node groups the payload of multiple incoming data packets into a single packet that is forwarded toward the BS. CoDa cuts on the number of transmissions that constitute evidences for implicating the BS as a destination of all traffic and thus degrades the adversary’s ability in conducting effective traffic analysis.</p>
    
    <p>Next we develop a novel technique for increasing BS anonymity by establishing a sleep/active schedule among the nodes that are far away from the BS, and increasing the traffic density in selected parts of the network in order to give the impression that the BS is located in the vicinity of the sleeping nodes. We call this technique Adaptive Sampling Rate for increased Anonymity (ASRA). Moreover, we develop three novel techniques based on a hierarchical routing topology. The first, which we call Hierarchical Anonymity-aware Routing Topology (HART), forms clusters and an inter-cluster-head routing topology so that a high traffic volume can be observed in areas away from the BS. The second is a novel cross-layer technique that forms a mesh topology. We call this technique cluster mesh topology to boost BS’s anonymity (CMBA). CMBA opts to establish a routing topology such that the traffic pattern does not implicate any particular node as a sink.</p>
    
    <p>The third technique creates multiple mesh-based routing topologies among the cluster-heads (CHs). By applying the closed space-filling curves such as the Moore curve, for forming a mesh, the CHs are offered a number of choices for disseminating aggregated data to the BS through inter-CH paths. Then, the BS forwards the aggregated data as well so that it appears as one of the CH. We call this technique boosting the BS anonymity through multiple mesh-based routing topologies (BAMT). We validate the effectiveness of all anonymity-boosting techniques through simulation and highlight the trade-off between anonymity and overhead.</p>
    
    Committee: Drs. Mohamed Younis (Chair), Charles Nicholas, Chintan Patel, Richard Forno and Waleed Youssef</div>
]]>
</Body>
<Summary>Dissertation Defense Announcement   Cross-Layer Techniques for Boosting Base-Station Anonymity in Wireless Sensor Networks   Sami Alsemairi   9:30 Wednesday, 9 November 2016, ITE 346    Wireless...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/cross-layer-techniques-boosting-base-station-anonymity-wireless-sensor-networks/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63726/guest@my.umbc.edu/e3c3ac04a407a140aca27d4f21681882/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/xxlarge.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/xlarge.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/large.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/medium.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/small.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/xsmall.jpg?1478579259</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/726/a76d17856fa028a3edcc0af51f345410/xxsmall.jpg?1478579259</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 07 Nov 2016 23:27:56 -0500</PostedAt>
<EditAt>Mon, 07 Nov 2016 23:29:17 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="63667" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63667">
<Title>Engineering Plaintext Private Information Retrieval Systems</Title>
<Tagline>A talk by UMBC alumnus Dr. Russ Fink, 1pm Fri 11/4, ITE229</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><strong>Practical Engineering of Plaintext</strong>
    <strong> Private Information Retrieval Systems</strong></p>
    <p><strong>Dr. Russell Fink</strong></p>
    <p>Chief Engineer, Cyber Operations Branch<br>Johns Hopkins University Applied Physics Laboratory</p>
    <p>1-2pm Friday, 4 November 2016, ITE 229</p>
    
    Cloud computing has come a long way in the last decade, with many advances in supported platforms, security, and cost effectiveness. As organizations are increasingly turning to the cloud to outsource their big data storage and processing needs, both problems and opportunities arise for understanding and analyzing large repositories of data.
    
    One problem in particular is querying large data in a safe and secure way – querying a large data set can compromise search privacy, revealing the interests, motivations, and true identity of the data querier to the data owner, hindering legitimate uses including data analytics, security, and law enforcement. Alice, wishing to search Bob’s queue of plaintext data, may turn to Private Information Retrieval (PIR) techniques to maintain her privacy without sacrificing bandwidth or deploying a trusted device in Bob’s spaces.
     <div><br></div><div>We have prototyped a PIR system based on the homomorphic Paillier cryptosystem and Bethencourt/Song search method, and discovered important engineering techniques along the way that are useful for deploying a scalable system. In this talk, I will introduce and motivate the PIR problem and describe the Paillier homomorphic retrieval system and Bethencourt’s technique. I will give an overview of our specific advances, notably, a novel technique for private regular expression pattern searching over plaintext, including an algorithm for resisting a privacy attack against the resulting search automaton.
    
      <div><br></div><div> 
    <strong>Russell A. (“Russ”) Fink</strong> is the Chief Engineer of the Cyber Operations Branch, Asymmetric Operations Sector, of the Johns Hopkins University Applied Physics Laboratory. He holds a Bachelor’s degree in computer science from the University of Maryland, College Park; a Master’s degree in computer systems management from the University of Maryland, University College; and a Ph.D. from the University of Maryland, Baltimore County for his work on electronic voting and trustworthy computing. His research interests include systems security engineering, trusted computing, machine learning, and privacy preserving cryptographic applications.
     </div><div><br></div><div>Organizers: Professors Tulay Adali (<a href="mailto:adali@umbc.edu">adali@umbc.edu</a>) and Alan T. Sherman (<a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>) 
    </div><div><br></div><div>About the CSEE Seminar Series: The UMBC Department of Computer Science and Electrical Engineering presents technical talks on current significant research projects of broad interest to the Department and the research community. Each talk is free and open to the public. We welcome your feedback and suggestions for future talks.</div></div></div>
]]>
</Body>
<Summary>Practical Engineering of Plaintext  Private Information Retrieval Systems   Dr. Russell Fink   Chief Engineer, Cyber Operations Branch Johns Hopkins University Applied Physics Laboratory   1-2pm...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/plaintext-private-information-retrieval/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63667/guest@my.umbc.edu/6861bc88e31bafc269cdb4649ac4f1b0/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/xxlarge.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/xlarge.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/large.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/medium.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/small.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/xsmall.jpg?1478268761</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/667/be926f9e17b097005319e9dd368b0dc6/xxsmall.jpg?1478268761</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 04 Nov 2016 10:13:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="63582" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63582">
<Title>talk: Statistics and Big Data at Google, 5-6 Thr 11/3, UC310</Title>
<Tagline>A general-audience, non-technical talk; no statistics needed</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4>Statistics and Big Data at Google</h4><p>Dr. Tim Hesterberg, Google<br>5:00-6:00pm Thursday, 3 November 2016<br>UC 310, UMBC</p>
    Google lives on data. Search, Ads, YouTube, Maps...they all live on data. Join Senior Quantitative Analyst (and <a rel="nofollow external" class="bo">Lady Statistician</a>) <a href="http://research.google.com/pubs/TimHesterberg.html" rel="nofollow external" class="bo">Tim Hesterberg</a>, as he shares stories about how we use data, how we're experimenting to make improvements (yes, this includes your searches), and how we adapt statistical ideas to do things that have never been done before. This will be a general-audience, non-technical talk. No statistics background is needed! <div><br></div><div><a href="http://research.google.com/pubs/TimHesterberg.html" rel="nofollow external" class="bo">Dr. Tim Hesterberg</a> is a Senior Statistician at Google. He previously worked at Insightful (S-PLUS), Franklin &amp; Marshall College, and Pacific Gas &amp; Electric Co. He received his Ph.D. in Statistics from Stanford University, under Brad Efron. Hesterberg is author of the "Resample" package for R and primary author of the "S+Resample" package for bootstrapping, permutation tests, jackknife, and other resampling procedures, is co-author of Chihara and Hesterberg "Mathematical Statistics with Resampling and R" (2011), and is lead author of "Bootstrap Methods and Permutation Tests" (2010), W. H. Freeman, ISBN 0-7167-5726-5, and numerous technical articles on resampling. </div><div><br></div><div> RSVP at <a href="http://goo.gl/MnqsMd" rel="nofollow external" class="bo">http://goo.gl/MnqsMd</a></div></div>
]]>
</Body>
<Summary>Statistics and Big Data at Google  Dr. Tim Hesterberg, Google 5:00-6:00pm Thursday, 3 November 2016 UC 310, UMBC  Google lives on data. Search, Ads, YouTube, Maps...they all live on data. Join...</Summary>
<Website>https://www.csee.umbc.edu/2016/11/hesterberg-statistcs-big-data-google/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63582/guest@my.umbc.edu/86f352aa7c055cfa9c35ba2d6f6198d8/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/xxlarge.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/xlarge.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/large.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/medium.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/small.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/xsmall.jpg?1478053110</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/582/7176562eb0d9aab6bacb1f87bfd5708c/xxsmall.jpg?1478053110</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 01 Nov 2016 22:20:44 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="63542" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63542">
<Title>Six new SFS cybersecurity scholars to join UMBC in 2017</Title>
<Body>
<![CDATA[
    <div class="html-content">Six new cybersecurity scholars were inducted into UMBC's NSF-sponsored Scholarship for Service program in an event held in Germantown on October 20. Three are currently students at <a href="https://www.montgomerycollege.edu/" rel="nofollow external" class="bo">Montgomery College</a> and three are from <a href="https://www.pgcc.edu/" rel="nofollow external" class="bo">Prince Georges Community College</a>. After they complete their associates degree in spring 2017, they will transfer to UMBC to complete their undergraduate degrees. 
    <div><br></div><div>This pioneering cooperation between UMBC, Montgomery College, and Prince Georges Community College in cybersecurity is made possible by a <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1241576" rel="nofollow external" class="bo">grant</a> from the National Science Foundation (Dr. <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a> (UMBC), <a href="https://cms.montgomerycollege.edu/EDU/Department.aspx?id=87119" rel="nofollow external" class="bo">Joe Roundy</a> (MC), and <a href="http://csrc.nist.gov/nice/2013workshop/speaker_bios/obrien/obrien_bio.html" rel="nofollow external" class="bo">Casey O'Brien</a> (PGCC), CoPIs). </div><div><br></div><div>As part of their education, the SFS scholars will solve IT security problems for their county government.
    
    As SFS Scholars, the students receive tuition, fees, annual reimbursement of professional development expenses, a nine-month stipend and assistance with federal cybersecurity internships and career placement.</div></div>
]]>
</Body>
<Summary>Six new cybersecurity scholars were inducted into UMBC's NSF-sponsored Scholarship for Service program in an event held in Germantown on October 20. Three are currently students at Montgomery...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/new-umbc-sfs-cybersecurity-scholars/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63542/guest@my.umbc.edu/7f7400a568ffeaf44dff4509a9aaa511/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/xxlarge.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/xlarge.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/large.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/medium.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/small.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/xsmall.jpg?1477935258</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/542/16a8377b6822cf94bd3e69f57df6dac6/xxsmall.jpg?1477935258</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 31 Oct 2016 13:35:19 -0400</PostedAt>
</NewsItem>

</News>
