<?xml version="1.0"?>
<News hasArchived="false" page="76" pageCount="221" pageSize="10" timestamp="Sat, 02 May 2026 13:33:02 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=76">
<NewsItem contentIssues="true" id="63523" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63523">
<Title>Understanding Ambiguity in Privacy &amp; Security Requirements</Title>
<Tagline>talk by Prof. Aaron Massey (IS), 11:15am Fri. Nov 4, ITE229</Tagline>
<Body>
<![CDATA[
    <div class="html-content">The UMBC Cyber Defense Lab presents<div><div><strong><br></strong></div><h5><strong>Regulatory Compliance Software Engineering: Understanding Ambiguity in Privacy and Security Requirements</strong></h5><div><strong><br></strong></div><div><strong>Aaron Massey, UMBC Department of Information Systems</strong></div><div><strong><br></strong><p>11:15am-12:30pm Friday, 4 November  2016, ITE 229</p>
    
    Software engineers building software systems in regulated environments must ensure that software requirements accurately represent obligations described in laws and regulations. Ambiguities in legal texts can make the difference between compliance and non-compliance. Ensuring alignment and compatibility is challenging because policy analysts who write laws and regulations approach ambiguity differently than the software engineers who implement software in regulated environments. Although software regulation continues to increase in visibility, prevalence, and importance–particularly for security and privacy, few software processes address challenge of identifying, classifying, and understanding regulatory ambiguity. Herein, we develop an ambiguity taxonomy based on software engineering, legal, and linguistic approaches to ambiguity. We also present two case studies of policy analysts and technologists identifying and classifying ambiguities in a portion of the Health Insurance Portability and Accountability Act (HIPAA) using this taxonomy. Results of this work suggest that the taxonomy developed can serve as a guide for identifying and classifying ambiguity but participants were not able to consistently agree on a rationale defending their ambiguity classification. These results suggest a strategy for addressing ambiguities in regulatory text—software engineers are likely to be successful at identifying elements of a legal text that then require supplemental expertise to resolve. The contributions of this work include the ambiguity taxonomy developed as well as mechanism for reporting identified ambiguities in a legal text which we call Ambiguity Intensity Maps.<strong> </strong></div><div><strong><br></strong></div><div><a href="http://userpages.umbc.edu/~akmassey/" rel="nofollow external" class="bo">Aaron Massey</a> is an Assistant Professor of Software Engineering at UMBC and the Co-Director of <a href="http://theprivacyplace.org/" rel="nofollow external" class="bo">ThePrivacyPlace.org</a>.  His research interests include computer security, privacy, software engineering, and regulatory compliance in software systems.  Aaron is a recipient of the Walter H. Wilkinson Graduate Research Ethics Fellowship and a recipient of a Google Policy Fellowship.  Before coming to UMBC, he was a Postdoctoral Fellow at Georgia Tech's School of Interactive Computing.  Aaron earned a PhD and MS in Computer Science from North Carolina State University and a BS in Computer Engineering from Purdue University.  He is a member of the ACM, IEEE, IAPP, and the USACM Public Policy Council. </div><div><br></div>
    <div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu" rel="nofollow external" class="bo">sherman@umbc.edu</a>
    </div></div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents     Regulatory Compliance Software Engineering: Understanding Ambiguity in Privacy and Security Requirements     Aaron Massey, UMBC Department of Information...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/25793/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63523/guest@my.umbc.edu/cef8fdc30c0737a1813ce402b4f0f743/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/xxlarge.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/xlarge.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/large.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/medium.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/small.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/xsmall.jpg?1477831503</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/063/523/5f17a08edf4239f97bb5941712168905/xxsmall.jpg?1477831503</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 30 Oct 2016 08:45:40 -0400</PostedAt>
<EditAt>Sun, 30 Oct 2016 08:52:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="63418" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/63418">
<Title>Online discussion: Building the Cyber Workforce</Title>
<Tagline>Watch discussion online 10-11 Fri, Oct. 28</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Today's cybersecurity industry is expected to grow by almost $100 billion dollars by 2020. That means that there will be an unprecedented number of jobs to fill to meet the demand and keep to our economic and national security intact. Job postings for cybersecurity positions have increased 74%  in the past five years, with a global projection of 1.5 million unfilled jobs over the next five years. <div><br></div><div>Many are calling the increasing shortage of workers a national crisis.
    
    Northrop Grumman will host an online event to discuss <strong>Building the Cyber Workforce</strong> from 10:00-11:00am on Friday, 28 October 2016. </div><div><br></div><div>The discussion features UMBC president <a href="http://president.umbc.edu/" rel="nofollow external" class="bo">Freeman Hrabowski</a> and two UMBC alumni: <a href="https://www.themuse.com/companies/northropgrumman/people/lauren" rel="nofollow external" class="bo">Lauren Mazzoli</a> ('15 CS, Math) who is currently a Northrop Grumman Cyber Software Engineer and <a href="https://www.linkedin.com/in/eric-conn-255b492" rel="nofollow external" class="bo">Eric Conn</a> ('85 CS) who is the founder and CEO of <a href="http://www.leverege.com/" rel="nofollow external" class="bo">Leverege</a> and a bwtech@UMBC <a href="http://www.bwtechumbc.com/cync/" rel="nofollow external" class="bo">Cync Incubator</a> participant.  The discussion will be moderated by <a href="http://federalnewsradio.com/author/tom-temin/" rel="nofollow external" class="bo">Tom Temin</a> of Federal News Radio.</div><div><br></div><div>You can watch the discussion live this Friday on the <a href="http://livestream.com/northropgrumman/events/6518185" rel="nofollow external" class="bo">Web</a>, tweet questions to <a href="https://twitter.com/ngcnews" rel="nofollow external" class="bo">@NGCNews</a> and follow <a href="https://twitter.com/UMBC" rel="nofollow external" class="bo">@UMBC</a>, which will be live tweeting the #NGcyber event.</div></div>
]]>
</Body>
<Summary>Today's cybersecurity industry is expected to grow by almost $100 billion dollars by 2020. That means that there will be an unprecedented number of jobs to fill to meet the demand and keep to our...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/online-discussion-building-the-cyber-workforce/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/63418/guest@my.umbc.edu/5710ab9c10c95bb111db16ecdae1b463/api/pixel</TrackingUrl>
<Tag>ngcyber</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/xxlarge.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/xlarge.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/large.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/medium.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/small.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/xsmall.jpg?1477483351</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/063/418/dc6247ffedc204bfcb35353601e18e89/xxsmall.jpg?1477483351</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Oct 2016 08:04:28 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="62980" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62980">
<Title>Credibility, Privacy and Policing on Online Social Media</Title>
<Tagline>talk at 1:00pm Friday, 14 October 2016, in ITE 229 at UMBC</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h6><strong>Credibility, Privacy and Policing on Online Social Media</strong></h6><h6><strong><br></strong></h6>
    <p>Prof. Ponnurangam Kumaraguru ("PK")<br>Indraprastha Institute of Information Technology, Delhi, India</p>
    <p>1:00-2:00pm Friday, 14 October 2016, ITE 229, UMBC</p>
    With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way the Internet is being used. There is a dire need to investigate, measure, and understand privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and privacy issues on online social media. I will describe briefly some cool projects that we work on: TweetCred, OSM &amp; Policing, OCEAN, and Call Me MayBe. Many of our research work is made available for public use through tools or online services. Our work derives techniques from Computational Social Science, Data Science, Statistics, Network Science, and Human Computer Interaction. In particular, in this talk, I will focus on the following:
    <ul>
     	<li>TweetCred, a tool to extract intelligence from Twitter which can be useful to security analysts. TweetCred is backed by award-winning research publications in international and national venues.</li>
     	<li>How police in India are using online social media, how we can use computer science understanding to help police engage more with citizens and increase the safety in society.</li>
     	<li>OCEAN: Open source Collation of eGovernment data and Networks, how publicly available information on Government services can be used to profile citizens in India. This work obtained the Best Poster Award at Security and Privacy Symposium at IIT Kanpur, 2013 and it has gained a lot of traction in Indian media.</li>
     	<li>Given an identity in one online social media, we are interested in finding the digital foot print of the user in other social media services, this is also called digital identity stitching problem. This work is also backed by award-winning research publication.</li>
    </ul>
    <a href="http://precog.iiitd.edu.in/people/pk/Home.html" rel="nofollow external" class="bo">Ponnurangam Kumaraguru</a> ("PK") is an Associate Professor, at the <a href="https://www.iiitd.ac.in/" rel="nofollow external" class="bo">Indraprastha Institute of Information Technology</a> (IIIT), Delhi, India from Aug 2009. He is currently the Hemant Bharat Ram Faculty Research Fellow, and the Founding Head of <a href="https://research.iiitd.edu.in/groups/security/" rel="nofollow external" class="bo">Cybersecurity Education and Research Centre</a>. PK is an ACM Distinguished Speaker. He received his Ph.D. from the School of Computer Science at Carnegie Mellon University. He is primarily excited about and works with a bunch of smart students and collaborators around the world on the issues related to Privacy and Security in Online Social Media, Computational Social Science, and Data Science for Social Good. In the past seven years of his faculty life, he has managed projects close to a $800,000 USDs. PK has received research funds from multiple departments of the Government of India, National Science Foundation, Adobe, RSA, and International Development Research Centre. PK is part of multiple government initiatives / projects in the area of Cybersecurity in India. Technology that PK and his students have developed at IIIT Delhi is currently being used by 40+ different State and Central Government agencies in India. PK has spent his summer sabbaticals at IBM India Research Labs, Adobe Research Labs - India, and Universidade Federal de Minas Gerais. He is currently visiting Max Planck Institute for Software Systems for Summer 2016. PK regularly serves as a PC member at prestigious conferences like WWW, ICWSM, CSCW, AsiaCCS and he also serves as a reviewer for International Journal of Information Security and ACM's Transactions on Internet Technology. PK's Ph.D. thesis work on anti-phishing research at CMU has contributed in creating an award winning start-up <a href="http://wombatsecurity.com/" rel="nofollow external" class="bo">Wombat Security Technologies</a>, which recently raised Series C funding and also acquired a company. PK founded and manages the <a href="http://precog.iiitd.edu.in/" rel="nofollow external" class="bo">PreCog</a> research group at IIIT-Delhi.
    
    Host: Anupam Joshi, <a href="mailto:joshi@umbc.edu">joshi@umbc.edu</a></div>
]]>
</Body>
<Summary>Credibility, Privacy and Policing on Online Social Media      Prof. Ponnurangam Kumaraguru ("PK") Indraprastha Institute of Information Technology, Delhi, India   1:00-2:00pm Friday, 14 October...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62980/guest@my.umbc.edu/734d7ab076315f70cdd1df99141d9bfe/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/xxlarge.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/xlarge.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/large.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/medium.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/small.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/xsmall.jpg?1476107238</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/980/9deec5c1baabab0fbe12eba3ce8af1ff/xxsmall.jpg?1476107238</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 10 Oct 2016 09:48:53 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="62894" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62894">
<Title>Security of Software Defined Networks</Title>
<Tagline>11:15am-12:30pm Friday, 7 Oct 2016, ITE 229</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p> The UMBC Cyber Defense Lab presents</p>
    
    <h4> An Introduction to the Security<br>of Software Defined Networks</h4>
    
    <h4>Enis Golaszewski </h4><div><br></div>
    
    <p>11:15am-12:30pm, Friday, 7 October, UMBC, ITE 229</p>
    
    
    <div>We introduce the concept of <a href="https://en.wikipedia.org/wiki/Software-defined_networking" rel="nofollow external" class="bo">Software Defined Networks</a> (SDNs) and the security challenges facing them. SDNs are a promising new network architecture that separates the data and control planes. By providing a central point of control and visibility over the network, SDNs allows a network to handle traffic with unprecedented flexibility, while simultaneously introducing potentially vulnerable lines of communication between a centralized controller and its constituent switches. To highlight the security challenges facing SDNs, we introduce and discuss several existing attacks. Anyone interested in networks and network security will want to know about the emerging trend of SDNs. 
    </div><div><br></div><div>About the Speaker. Enis Golaszewski (<a href="mailto:qy65378@umbc.edu">qy65378@umbc.edu</a>) is a first-semester PhD student and SFS scholar at UMBC working with Dr. Sherman on the security of software defined networks. 
    </div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>
     </div><div><br></div><div>The UMBC Cyber Defense Lab meets biweekly Fridays</div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents     An Introduction to the Security of Software Defined Networks    Enis Golaszewski        11:15am-12:30pm, Friday, 7 October, UMBC, ITE 229     We introduce...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/security-of-software-defined-networks-1115-fri-107-umbc/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62894/guest@my.umbc.edu/3c5c73de6a2982a8c7a95ba6a95b947b/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/xxlarge.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/xlarge.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/large.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/medium.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/small.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/xsmall.jpg?1475716357</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/894/55ae71e0e6385f11d276baab6a32fa56/xxsmall.jpg?1475716357</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Oct 2016 21:19:13 -0400</PostedAt>
<EditAt>Wed, 05 Oct 2016 21:23:28 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="62854" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62854">
<Title>talk: Against the Odds: How I Became a Computer Scientist</Title>
<Tagline>Claudia Pearce (UMBC MS&#8217;89, PhD&#8217;94) NSA 4:30 Tue 10/11</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>2016 ADVANCE Distinguished Lecture Series</p>
    <h5>Against the Odds: How I Became a Computer Scientist</h5>
    <h6>Dr. Claudia Pearce (UMBC MS '89, PhD '94)
    National Security Agency</h6><h6><br></h6>
    <p>4:30-5:30 Tuesday, 11 October 2016
    Library and Gallery, Albin O. Kuhn</p>
    
    <p>Dr. Claudia Pearce, UMBC Alumna and Senior Computer Science Authority at NSA, shares a personal story of perseverance in her educational, research, and career journey as a computer scientist.</p>
    
    <p>UMBC-ADVANCE is pleased to announce that alumna Dr. Claudia Pearce M.S., '89 and Ph.D., '94 and 2014 UMBC Alumna of the Year in COEIT is our 2016 ADVANCE Distinguished Speaker. Dr. Pearce is currently Senior Computer Science Authority at NSA, a member of UMBC's COEIT advisory board, and involved in collaborative research with our CSEE faculty.</p>
    
    <p>The event will take place on Tuesday, October 11th and we are proud to incorporate this event into UMBC's 50th Anniversary celebrations. As part of this event, Dr. Pearce will deliver a campus-wide talk on her career trajectory at 4:30pm in the Library Gallery followed by a reception.</p></div>
]]>
</Body>
<Summary>2016 ADVANCE Distinguished Lecture Series   Against the Odds: How I Became a Computer Scientist   Dr. Claudia Pearce (UMBC MS '89, PhD '94) National Security Agency      4:30-5:30 Tuesday, 11...</Summary>
<Website>http://www.csee.umbc.edu/2016/10/talk-against-the-odds-how-i-became-a-computer-scientist-430p-tue-1011/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62854/guest@my.umbc.edu/68526182807b7c9d02bea43fc7f0a253/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/xxlarge.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/xlarge.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/large.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/medium.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/small.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/xsmall.jpg?1475670262</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/854/cae01a057884f53c1fecabe70c888f43/xxsmall.jpg?1475670262</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Oct 2016 08:31:54 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="62846" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62846">
<Title>Live webinar on paid internships at NSA and more</Title>
<Tagline>5-6pm Thursday October 13, register now!</Tagline>
<Body>
<![CDATA[
    <div class="html-content">What's it really like to be an intern at the National Security Agency? Learn about the wide array of available opportunities from former NSA interns who are now NSA employees. <div><br></div><div>Join them for a <a href="https://intelligencecareers.adobeconnect.com/nsastudentprograms/event/registration.html" rel="nofollow external" class="bo">live webinar</a> 5-6pm Thursday, October 13 to learn more about the benefits of our paid internships and co-op programs. </div><div><br></div><div>NSA has more than 30 programs available in a wide variety of majors:
    <ul>
     	<li>Computer Science, Computer/Electrical Engineering &amp; Information Systems</li>
     	<li>Mechanical/Civil Engineering &amp; Architecture</li>
     	<li>Mathematics</li>
     	<li>International Affairs &amp; Foreign Language</li>
     	<li>Other fields like Business &amp; Human Resources</li>
    </ul>
    They will also talk about the application process and what to expect. Don’t miss this final window to apply — all internship programs close later this month!  U.S. citizenship is required for NSA employment NSA is an Equal Opportunity Employer. <div><br></div><div><a href="https://intelligencecareers.adobeconnect.com/nsastudentprograms/event/registration.html" rel="nofollow external" class="bo">Register</a> now for the Student Programs Webinar, 5-6pm Thursday, 13 Oct. 2016. Seats are limited, so don’t put it off!</div></div></div>
]]>
</Body>
<Summary>What's it really like to be an intern at the National Security Agency? Learn about the wide array of available opportunities from former NSA interns who are now NSA employees.     Join them for a...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/live-webinar-on-paid-internships-at-nsa-and-more-5pm-thr-1013/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62846/guest@my.umbc.edu/e81ea527590aa9ac98b96a8dfab09862/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/xxlarge.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/xlarge.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/large.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/medium.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/small.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/xsmall.jpg?1475610499</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/846/9db6076ee7ef4bb588baf84289f7cd26/xxsmall.jpg?1475610499</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 04 Oct 2016 15:50:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="62829" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62829">
<Title>MOOC in Cyber Security Economics Starting Soon</Title>
<Tagline>Making better decisions about security &amp; IT (free)</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div><div><p><a href="https://www.lightbluetouchpaper.org/2016/10/04/security-economics-mooc/">https://www.lightbluetouchpaper.org/2016/10/04/security-economics-mooc/</a></p><p><br></p><p>This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.</p><p>Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.</p><p>The course covers five main areas:</p><ol><li>Introduction to key concepts in security economics. Here, we provide an overview of how information security is shaped by economic mechanisms, such as misaligned incentives, information asymmetry, and externalities.</li><li>Measuring cybersecurity. We introduce state of the art security and IT metrics and conceptualize the characteristics of a security metric, its challenges and advantages.</li><li>Economics of information security investment. We discuss and apply different economic models that help determine the costs and benefits of security investments in network security.</li><li>Security market failures. We discuss market failures that may lead to cybersecurity investment levels that are insufficient from society’s perspective and other forms of unsafe behaviour in cyber space.</li><li>Behavioural economics for information security, policy and regulation. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment.</li></ol><p>After finishing this course, you will be able to apply economic analysis and data analytics to cybersecurity. You will understand the role played by incentives on the adoption and effectiveness of security mechanisms, and on the design of technical, market-based, and regulatory solutions to different security threats.</p></div></div></div><div><h3>What you'll learn</h3><div><ul><li>Sound understanding of the economics of cybersecurity as a systems discipline, from security policies (modelling what ought to be protected) to mechanisms (how to implement the protection goals)</li><li>How to design security metrics to capture information security issues</li><li>How the design of effective policies to enhance and maintain cybersecurity must take into account a complex set of incentives facing not only the providers and users of the Internet and computer software, but also those of potential attackers</li></ul></div></div></div>
]]>
</Body>
<Summary>https://www.lightbluetouchpaper.org/2016/10/04/security-economics-mooc/     This economics course provides an introduction to the field of cybersecurity through the lens of economic principles....</Summary>
<Website>https://www.edx.org/course/cyber-security-economics-delftx-secon101x</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62829/guest@my.umbc.edu/008504dc9406fd860013777a02625487/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>economics</Tag>
<Tag>mooc</Tag>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 04 Oct 2016 10:12:18 -0400</PostedAt>
<EditAt>Tue, 04 Oct 2016 10:12:53 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="62771" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62771">
<Title>Talk: Analytic approaches to study the chronnectome</Title>
<Tagline>UMBC Alumnus Dr. Vince Calhoun, 1pm Fri Oct 7, ITE 229</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4><a href="https://www.csee.umbc.edu/2016/10/talk-analytic-approaches-to-study-the-chronnectome-1pm-fri-107-ite-229/" rel="nofollow external" class="bo">Analytic approaches to study the chronnectome<br>(time-varying brain connectivity)</a></h4><p>Recent years have witnessed a rapid growth in moving functional magnetic resonance imaging (fMRI) connectivity beyond simple scan-length averages into approaches that capture time-varying properties of connectivity. In this perspective we use the term “chronnectome” to describe such metrics that allow a dynamic view of coupling. We discuss the potential of these to improve characterization and understanding of brain function, which is inherently dynamic, not-well understood, and thus poorly suited to conventional scan-averaged connectivity measurements.</p><p>Prof. <a href="http://www.mrn.org/people/vince-calhoun/principal-investigators/" rel="nofollow external" class="bo">Vince Calhoun</a> (EE Ph.D.’02, UMBC) is this year’s distinguished alum in the Engineering and Information Technology category and is the first speaker in our departmental seminar series.</p><p>Dr. Calhoun is currently Executive Science Officer at the <a href="http://www.mrn.org/" rel="nofollow external" class="bo">Mind Research Network</a> and a Distinguished Professor in the Department of Electrical and Computer Engineering at the University of New Mexico. He is the author of more than 450 full journal articles and over 550 technical reports, abstracts and conference proceedings. His work includes the development of flexible methods to analyze functional magnetic resonance imaging such as independent component analysis (ICA), data fusion of multimodal imaging and genetics data, and the identification of biomarkers for disease. Among other things, he leads an NIH P20 COBRE center grant on multimodal imaging of schizophrenia, bipolar disorder, and major depression as well as an NSF EPSCoR grant focused on brain imaging and epigenetics of adolescent development. Dr. Calhoun is a fellow of the Institute of Electrical and Electronic Engineers (IEEE), The Association for the Advancement of Science, The American Institute of Biomedical and Medical Engineers, The American College of Neuropsychopharmacology, and the International Society of Magnetic Resonance in Medicine. He is currently chair of the IEEE Machine Learning for Signal Processing (MLSP) technical committee.</p><p>Host: <a href="https://www.csee.umbc.edu/~adali/" rel="nofollow external" class="bo">Tulay Adali</a></p><p>About the CSEE Seminar Series: The UMBC Department of Computer Science and Electrical Engineering presents technical talks on current significant research projects of broad interest to the Department and the research community. Each talk is free and open to the public. We welcome your feedback and suggestions for future talks.</p><p>Organizers: <a href="https://www.csee.umbc.edu/~adali/" rel="nofollow external" class="bo">Tulay Adali</a> and <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a></p><div><br></div></div>
]]>
</Body>
<Summary>Analytic approaches to study the chronnectome (time-varying brain connectivity)  Recent years have witnessed a rapid growth in moving functional magnetic resonance imaging (fMRI) connectivity...</Summary>
<Website>https://www.csee.umbc.edu/2016/10/talk-analytic-approaches-to-study-the-chronnectome-1pm-fri-107-ite-229/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62771/guest@my.umbc.edu/1dfc754527a619330bbb699e1a0e1e99/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/xxlarge.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/xlarge.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/large.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/medium.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/small.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/xsmall.jpg?1475429739</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/771/e44bab3eafbf57f1ca23ed750e8b274d/xxsmall.jpg?1475429739</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 02 Oct 2016 13:37:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="62665" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62665">
<Title>Rick Forno discusses e-voting security on WYPR</Title>
<Body>
<![CDATA[
    <div class="html-content"><p>In recent months, as the U.S. presidential election has approached, concerns over email hacks and the security of voting systems have frequently appeared in the news. Rick Forno, assistant director of the UMBC Center for Cybersecurity and director of the Cybersecurity Graduate Program at UMBC, recently <a href="http://wypr.org/post/cybersecurity-and-ballot-box#stream/0" rel="nofollow external" class="bo">described</a> to WYPR’s Sheilah Kast that voting machines are just one part of a system that has concerning vulnerabilities.</p>
    
    <p>“I think we have to separate the issue between voting machines and the overall voting process, because the two are related but have very different threat and vulnerability characteristics,” said Forno, who is particularly interested in the voting process and technologies used to collect data, as well as how that data is collected, counted, and reported.</p>
    
    <p>A voting machine might report votes to a laptop across the room at a polling location, and that computer might then share data from the single polling place with a computer in a regional or state hub to be aggregated. In this scenario, Forno wonders how the laptop—as one small but crucial piece in the full chain of data transfer—is protected.</p>
    
    <p>Data can be corrupted at moments when it is moving, and also when it is stationary, he says. “You’re looking at a range of security concerns that start with the individual voting machine in the voting booth, all the way up through the systems that officially record and report out the outcomes of an election.”</p>
    
    <p>Voting machines include computers and other hardware that need to be maintained on a regular basis, much like computers that people use at work or at home. Forno warns that not regularly updating the technologies used in voting systems, can give hackers and researchers the opportunity to identify weaknesses and potential vulnerabilities in those systems.</p>
    
    <p>Listen to the full segment <a href="http://wypr.org/post/cybersecurity-and-ballot-box#stream/0" rel="nofollow external" class="bo">“Cybersecurity and the Ballot Box”</a> on the WYPR website.</p></div>
]]>
</Body>
<Summary>In recent months, as the U.S. presidential election has approached, concerns over email hacks and the security of voting systems have frequently appeared in the news. Rick Forno, assistant...</Summary>
<Website>https://www.csee.umbc.edu/2016/09/rick-forno-discuss-e-voting-security-on-wypr/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62665/guest@my.umbc.edu/7e95b2232af26a98243abe35768da15a/api/pixel</TrackingUrl>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/xxlarge.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/xlarge.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/large.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/medium.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/small.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/xsmall.jpg?1475034299</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/665/4c64c24857781d79e1daa4c367fa7c37/xxsmall.jpg?1475034299</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 27 Sep 2016 23:45:25 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="62552" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/62552">
<Title>Career and internship opportunities at Google, 9/29-30</Title>
<Tagline>Presented by Googlers and UMBC alumni</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4>Interested in learning more about Google?
    Come hear it from Googlers and UMBC alumni!</h4><div><br></div>
    On Thursday Sept. 29 and Friday Sept. 30, Google host hour tech/culture/info talk events on campus for UMBC students to learn more about Google and the internship and career opportunities it offers to students. They will have food, swags and many internship and full time opportunities for students.<div><br></div><div>Check out the details below and register for the event(s) <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">HERE</a>, if you’re interested in Google opportunites make sure to include a soft copy of your resume.<div> 
    <h4>THE DEETS</h4>
    <strong>Who:</strong> Except the first event on Thursday 09/29, at  1pm that is designed for PhD engineering students, all Computer Science and Engineering students regardless of degrees they are pursuing, and anyone else with an interest in software development are welcome!
    
    <br><strong><br></strong></div><div><strong>Why:</strong> Learn more about Google’s hiring process, culture, technology, job and/ internship opportunities, and more! - directly from a Googler!
    
    <br><strong><br>What to do next?:</strong> Register for the event <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">HERE</a>! Make sure your resume and LinkedIn profiles are up to date (feel free to link both in the form above) and of course come with lots of good questions! </div><div><br></div><div> Here's information on the four events:
    
    <ul>
     	<li><strong>What:</strong><em> Info Sharing: Google PhD Info Session for PhD CS/Engineering Students</em>
    <br><strong>When:</strong> 9/29, Thursday, 1pm - 3pm
    <br><strong>Where:</strong> Commons 318 RSVP: <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">RSVP Form</a></li> <br>
    
     	<li><strong>What:</strong> <em>Info Sharing: Resume Tips &amp; Tricks for Technical Opportunities<br></em>
    <strong>When:</strong> 9/29, Thursday, 4pm - 5pm
    <br><strong>Where:</strong> Commons 331 RSVP: <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">RSVP Form</a></li> <br>
    
     	<li><strong>What:</strong> <em>Talk and Workshop: Google Technical Interview Prep Workshop<br></em>
    <strong>When:</strong> 9/30, Friday, 1pm - 2:30pm
    <br><strong>Where:</strong> Commons 331 RSVP: <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">RSVP Form</a></li> <br>
    
    <li><strong>What:</strong> <em>Tech Talk: Google AppEngine, Simple &amp; Scalable Solution for Startups
    <br></em><strong>When:</strong> 9/30, Friday, 3pm - 4pm
    <br><strong>Where:</strong> Commons 329 RSVP: <a href="http://goo.gl/dt4KUl" rel="nofollow external" class="bo">RSVP Form</a></li> <br>
    </ul></div></div></div>
]]>
</Body>
<Summary>Interested in learning more about Google? Come hear it from Googlers and UMBC alumni!     On Thursday Sept. 29 and Friday Sept. 30, Google host hour tech/culture/info talk events on campus for...</Summary>
<Website>https://www.csee.umbc.edu/2016/09/career-and-internship-opportunities-at-google-929-30/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/62552/guest@my.umbc.edu/783af1f65280f3e7aad503ca385aace2/api/pixel</TrackingUrl>
<Tag>internships</Tag>
<Tag>jobs</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/xxlarge.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/xlarge.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/large.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/medium.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/small.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/xsmall.jpg?1474684059</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/062/552/1a213a03358f0cb66b5cacd2024c8ad0/xxsmall.jpg?1474684059</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 23 Sep 2016 22:30:13 -0400</PostedAt>
</NewsItem>

</News>
