<?xml version="1.0"?>
<News hasArchived="false" page="79" pageCount="221" pageSize="10" timestamp="Sat, 02 May 2026 11:10:16 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=79">
<NewsItem contentIssues="false" id="60205" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/60205">
<Title>talk: Cognitive Computing &amp; Visualization at IBM Research/RPI, 10am Thur 5/19, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/news_viz.jpg" alt="news_viz" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>Cognitive Computing and Visualization at IBM Research/RPI CISL</h2>
    <h3>Dr. Hui Su, IBM Research</h3>
    <h3>10:00-11:00am, Thursday, 19 May 2016, ITE 325b</h3>
    <p>Dr. Hui Su will talk about Cognitive and Immersive Systems Lab, a research initiative to develop the new frontier of immersive cognitive systems that explore and advance natural, collaborative problem-solving among groups of humans and machines. This lab is a collaboration between IBM Research and Rensselaer Polytechnic Institute. Dr. Su will talk about why the research for human computer interaction is extended to build a symbiotic relationship between human beings and smart machines, what research is going to be important to build immersive cognitive systems in order to transform the way professionals work in the future.</p>
    <p><a href="http://researcher.watson.ibm.com/researcher/view.php?person=us-huisuibmres" rel="nofollow external" class="bo">Dr. Hui Su</a> is the Director of Cognitive and Immersive Systems Lab, a collaboration between IBM Research and Rensselaer Polytechnic Institute. He has been a technical leader and an executive at IBM Research. Most recently, he was the Director of IBM Cambridge Research Lab in Cambridge, MA and was responsible for a broad scope of global missions in IBM Research, including Cognitive User Experience, Center for Innovation in Visual Analytics and Center for Social Business. As a technical leader and a researcher for 19 years at IBM Research, Dr. Su has been an expert in multiple areas ranging from Human Computer Interaction, Cloud Computing, Visual Analytics, and Neural Network Algorithms for Image Recognition etc. As an executive, he has been leading research labs and research teams in the US and China. He is passionate about game-changing ideas and fundamental research, passionate in speeding up the impact generation process for technical innovations, discovering and developing new linkages between innovative research work and business needs.</p>
    <p>Host: <a href="http://www.csee.umbc.edu/~jichen/Welcome.html" rel="nofollow external" class="bo">Jian Chen</a> (Sorry, you need javascript to view this email address. )</p></div>
]]>
</Body>
<Summary>Cognitive Computing and Visualization at IBM Research/RPI CISL   Dr. Hui Su, IBM Research   10:00-11:00am, Thursday, 19 May 2016, ITE 325b   Dr. Hui Su will talk about Cognitive and Immersive...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/talk-cognitive-computing-visualization-at-ibm-researchrpi-10am-thur-519-umbc/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/60205/guest@my.umbc.edu/1fc1cf7e20f45cdbf6047bab251ec583/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 17 May 2016 11:53:43 -0400</PostedAt>
<EditAt>Tue, 17 May 2016 11:53:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="60156" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/60156">
<Title>Rick Forno and Anupam Joshi discuss &#8216;cyberbombs&#8217; in The Conversation</Title>
<Body>
<![CDATA[
    <div class="html-content"><h1><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/cyberbombs.jpg" alt="cyberbombs" width="900" height="396" style="max-width: 100%; height: auto;"></h1>
    <h1><strong>America is ‘dropping cyberbombs’ – but how do they work?</strong></h1>
    <p>Richard Forno and Anupam Joshi</p>
    <p>Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “<a href="http://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-first-time.html" rel="nofollow external" class="bo">dropping cyberbombs</a>,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, <a href="https://www.whitehouse.gov/the-press-office/2016/04/13/statement-president-progress-fight-against-isil" rel="nofollow external" class="bo">including President Barack Obama</a>, have discussed offensive cyber activities, too.</p>
    <p>The American public has only glimpsed the country’s alleged cyberattack abilities. In 2012 The New York Times revealed the first digital weapon, <a href="http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html" rel="nofollow external" class="bo">the Stuxnet attack</a> against Iran’s nuclear program. In 2013, former NSA contractor Edward Snowden released a <a href="http://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas" rel="nofollow external" class="bo">classified presidential directive</a> outlining America’s approach to conducting Internet-based warfare.</p>
    <p>The terms “cyberbomb” and “cyberweapon” create a simplistic, if not also sensational, frame of reference for the public. Real military or intelligence cyber activities are less exaggerated but much more complex. The most basic types are off-the-shelf commercial products used by companies and security consultants to test system and network security. The most advanced are specialized proprietary systems made for exclusive – and often classified – use by the defense, intelligence and law enforcement communities.</p>
    <p>So what exactly are these “cyberbombs” America is “dropping” in the Middle East? The country’s actual cyber capabilities are classified; we, as researchers, are limited by what has been made public. Monitoring books, reports, news events and congressional testimony is not enough to separate fact from fiction. However, we can analyze the underlying technologies and look at the global strategic considerations of those seeking to wage cyber warfare. That work allows us to offer ideas about cyber weapons and how they might be used.</p>
    <p>Read more @ <a href="https://theconversation.com/america-is-dropping-cyberbombs-but-how-do-they-work-58476" rel="nofollow external" class="bo">The Conversation</a> and also on the <a href="http://www.scientificamerican.com/article/how-u-s-cyber-bombs-against-terrorists-really-work/" rel="nofollow external" class="bo">Scientific American Web site</a>.</p></div>
]]>
</Body>
<Summary>America is ‘dropping cyberbombs’ – but how do they work?   Richard Forno and Anupam Joshi   Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/forno-and-joshi-discuss-cyberbombs-in-the-conversation/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/60156/guest@my.umbc.edu/f1d0251a3f4561167ea22aed17deb79b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 13 May 2016 18:33:32 -0400</PostedAt>
<EditAt>Fri, 13 May 2016 18:33:32 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="60136" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/60136">
<Title>talk: Predicting Demographics and Affects in Social Networks, 11am Fri 5/13, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/Screen-Shot-2016-05-12-at-7.01.54-PM.png" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h3>UMBC Information Systems Department</h3>
    <h2>Predicting Demographics and Affects in Social Networks</h2>
    <h2><a href="http://www.cs.jhu.edu/~svitlana/" rel="nofollow external" class="bo">Dr. Svitlana Volkova</a><br>
    Pacific Northwest National Laboratory</h2>
    <h2>11am Friday, 13 May 2016, ITE 459</h2>
    <p>Social media predictive analytics bring unique opportunities to study people and their behaviors in real time, at an unprecedented scale: who they are, what they like and what they think and feel. Such large-scale real-time social media predictive analytics provide a novel set of conditions for the construction of predictive models. This talk focuses on various approaches to handling this dynamic data for predicting latent user demographics, from constrained-resource batch classification, to incremental bootstrapping, and then iterative learning via interactive rationale (feature) crowdsourcing. In addition, we present the relationships between a variety of perceived user properties e.g., income, education etc. and opinions, emotions and interests in a social network.</p>
    <p><a href="http://www.cs.jhu.edu/~svitlana/" rel="nofollow external" class="bo">Svitlana Volkova</a> received her PhD in Computer Science from Johns Hopkins University. She was affiliated with the Center for Language and Speech Processing and the Human Language Technology Center of Excellence. Her PhD research focused on building predictive models for sociolinguistic content analysis in social media. She built online models for streaming social media analytics, fine-grained emotion detection and multilingual sentiment analysis, and effective annotation techniques via crowdsourcing incorporated into the active learning framework. She interned at Microsoft Research in 2011, 2012 and 2014 at the Natural Language Processing and Machine Learning and Perception teams. She was awarded the Google Anita Borg Memorial Scholarship in 2010 and the Fulbright Scholarship in 2008.</p></div>
]]>
</Body>
<Summary>UMBC Information Systems Department   Predicting Demographics and Affects in Social Networks   Dr. Svitlana Volkova  Pacific Northwest National Laboratory   11am Friday, 13 May 2016, ITE 459...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/talk-predicting-demographics-and-affects-in-social-networks-11am-fri-513-umbc/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/60136/guest@my.umbc.edu/e698957f6ef16b523bccbbbfa3dd9131/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 12 May 2016 19:07:47 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="60131" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/60131">
<Title>talk: Topic Modeling for Analyzing Document Collection, 11am Mon 3/16</Title>
<Body>
<![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/Ogihara.jpg" alt="Ogihara" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>CHMPR Lecture Series</h2>
    <ul>
    <li>
    <h1>Topic Modeling for Analyzing Document Collection</h1>
    </li>
    </ul>
    <h2>Mitsunori Ogihara<br>
    Department of Computer Science, University of Miami</h2>
    <h2>11:00am Monday, 16 May 2016, ITE 325b, UMBC</h2>
    <p><a href="https://en.wikipedia.org/wiki/Topic_model" rel="nofollow external" class="bo">Topic modeling</a> (in particular, Latent Dirichlet Analysis) is a technique for analyzing a large collection of documents. In topic modeling we view each document as a frequency vector over a vocabulary and each topic as a static distribution over the vocabulary. Given a desired number, K, of document classes, a topic modeling algorithm attempts to estimate concurrently K static distributions and for each document how much each K class contributes. Mathematically, this is the problem of approximating the matrix generated by stacking the frequency vectors into the product of two non-negative matrices, where both the column dimension of the first matrix and the row dimension of the second matrix are equal to K. Topic modeling is gaining popularity recently, for analyzing large collections of documents.</p>
    <p>In this talk I will present some examples of applying topic modeling: (1) a small sentiment analysis of a small collection of short patient surveys, (2) exploratory content analysis of a large collection of letters, (3) document classification based upon topics and other linguistic features, and (4) exploratory analysis of a large collection of literally works. I will speak not only the exact topic modeling steps but also all the preprocessing steps for preparing the documents for topic modeling.</p>
    <p><a href="http://www.cs.miami.edu/home/ogihara/" rel="nofollow external" class="bo">Mitsunori Ogihara</a> is a Professor of Computer Science at the University of Miami, Coral Gables, Florida. There he directs the Data Mining Group in the Center for Computational Science, a university-wide organization for providing resources and consultation for large-scale computation. He has published three books and approximately 190 papers in conferences and journals. He is on the editorial board for Theory of Computing Systems and International Journal of Foundations of Computer Science. Ogihara received a Ph.D. in Information Sciences from Tokyo Institute of Technology in 1993 and was a tenure-track/tenured faculty member in the Department of Computer Science at the University of Rochester from 1994 to 2007.</p></div>
]]>
</Body>
<Summary>CHMPR Lecture Series       Topic Modeling for Analyzing Document Collection       Mitsunori Ogihara  Department of Computer Science, University of Miami   11:00am Monday, 16 May 2016, ITE 325b,...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/talk-topic-modeling-for-analyzing-document-collection-11am-mon-316/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/60131/guest@my.umbc.edu/91fb0afc30b52a265bc7d9a766de7bd8/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 12 May 2016 17:26:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="59974" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59974">
<Title>talk: Human mental models and robots: Grasping and tele-presence, 11am 5/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><h1><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/applepicker_csee.jpg" alt="apple picker" width="700" height="308" style="max-width: 100%; height: auto;"></h1>
    <h1>Human mental models and robots:<br>
    Grasping and tele-presence</h1>
    <h2>Dr. Cindy Grimm, Oregon State University</h2>
    <h2>11:00-12:00 Monday 9 May 2016, ITE 325b</h2>
    <p>In this talk I will cover two separate research efforts in robotics, both of which use human mental models to improve robotic functionality. Robots struggle to pick up and manipulate physical objects, yet humans do this with ease – but can’t tell you how they do it. In this research we focus on how to capture human data in such a way as to gain insight into how people structure the grasping task. Specifically, we look at the role of perceptual cues in evaluating grasps and mental classification models of grasps (i.e., all these grasps are the “same”). In the second half of the talk I will switch to discussing how human mental models of privacy, trust, and presence come in to play in remote tele-presence applications (“Skype-on-a-movable-stick”).</p>
    <p>Dr. <a href="http://web.engr.oregonstate.edu/~grimmc/" rel="nofollow external" class="bo">Cindy Grimm</a> is currently an associate professor at Oregon State University (since 2013) in the School of Mechanical, Industrial, and Manufacturing Engineering (application area robotics). Prior to that she was tenured faculty at Washington University in St. Louis in Computer Science (12 years). Her research areas range from 3D sketching to biological modeling to human-robot interaction. She approaches these problems with a combination of mathematical models and empirically-verified human-centered design (HCD). Mathematical models provide a sound, quantitative, rigorous, elegant basis for representing shape and function, and are a core part of the “language” of computation. Including a human in the loop is a key component of the application areas she works in; HCD provides the mechanism for addressing the fundamental problem of how to make mathematical computation “useful” for humans. She has worked with collaborators in fields ranging from psychology, mechanical and biological engineering, statistics, to art.</p></div>
]]>
</Body>
<Summary>Human mental models and robots:  Grasping and tele-presence   Dr. Cindy Grimm, Oregon State University   11:00-12:00 Monday 9 May 2016, ITE 325b   In this talk I will cover two separate research...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/talk-human-mental-models-and-robots-grasping-and-tele-presence-11am-59/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59974/guest@my.umbc.edu/458296f1894f82516822f9488eb130aa/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>robotics</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 May 2016 12:51:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="59970" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59970">
<Title>Innovations in Cybersecurity Education Workshop, Friday June 3, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/icew15_blank-1.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>The third <a href="http://www.csee.umbc.edu/icew-2016/" rel="nofollow external" class="bo">Innovations in Cybersecurity Education Workshop</a> (ICEW) will be held from 9:00am to 5:00pm on Friday, June 3, 2016 on the UMBC campus.</p>
    <p>ICEW is a free regional workshop on cybersecurity education from high school through post-graduate. It is intended primarily for educators who are teaching cybersecurity at high schools, colleges, and community colleges. Anyone is welcome to attend, including teachers, students, administrators, researchers, and government officials. It will highlight master teachers and ongoing educational projects, including an effort at the US Naval Academy to teach cybersecurity to all midshipmen. The workshop will feature hands-on learning activities, including secure programming, cyber competition, and an educational game.</p>
    <p>Sessions will include:</p>
    <ul>
    <li><strong>Secure coding through hands-on exercise:</strong> Blair Taylor and Siddharth Kaza (Towson University) will show how to carry out self-contained, lab-based modules designed to be injected into CS0-CS2 introductory computer science courses.</li>
    <li><strong>Using a message board as a hands­-on learning tool for Cyber Security II:</strong> LCDR Chris W. Hoffmeister (US Naval Academy) will discuss how to solve security challenges involving a simple, configurable HTML message board.</li>
    <li><strong>Hands-on vulnerability testing:</strong> Marcelle Lee (Anne Arundel Community College) and Steve Morrill (Loyola Blakefield) will demonstrate how to engage in a hands-on challenge and learning experience to help highlight the vulnerabilities in systems, with you in the driver’s seat. Participants of any skill level will learn strategies and techniques for determining if a system is vulnerable.</li>
    <li><strong>Hands-on group threat brainstorming with Security Cards:</strong> Tamara Denning (University of Utah) will demonstrate teaching students how to think broadly and creatively about computer security threats using 42 Security Cards along four dimensions (suits): human impact, adversary’s motivation, adversary’s resources, and adversary’s methods.</li>
    </ul>
    <p>ICEW is free and open to the public — all are welcome to attend. This workshop will to be of interest to educators, school administrators, undergraduate and graduate students, and government officials. Lunch will be provided. There is ample parking.</p>
    <p>For more information and to register, see the <a href="http://www.csee.umbc.edu/icew-2016/" rel="nofollow external" class="bo">2016 ICEW Web</a> site.</p></div>
]]>
</Body>
<Summary>The third Innovations in Cybersecurity Education Workshop (ICEW) will be held from 9:00am to 5:00pm on Friday, June 3, 2016 on the UMBC campus.   ICEW is a free regional workshop on cybersecurity...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/innovations-in-cybersecurity-education-workshop-friday-june-3-umbc/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59970/guest@my.umbc.edu/ae265d84bb1ddf2a09c7fbc751036649/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>icew</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 May 2016 10:21:34 -0400</PostedAt>
<EditAt>Sun, 29 May 2016 09:21:34 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="59963" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59963">
<Title>talk: Statistical Testing of Hash Bit Sequences, 11:15am Fri May 6, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/hash.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h2>Statistical Testing of Hash Bit Sequences</h2>
    <h2>Enis Golaszewski<br>
    CSEE, UMBC</h2>
    <h3>11:15am-12:30pm Friday, 6 May 2016, ITE 237</h3>
    <p>We tested bit sequences generated from the MD5 hash function using multinomial distribution and close-point spatial statistical tests for randomness. We found that bit sequences generated from truncated-round MD5 hash fail these tests for high- and low-density input choices.</p>
    <p>In 2000, the National Institute of Standards and Technology concluded a competition to select the Advanced Encryption Standard. One of the requirements for candidates was randomness of output bits. The techniques used to evaluate symmetric block cipher randomness have not been extensively applied to hash functions.</p>
    <p>In this study, we adapt a subset of the techniques used to analyze the randomness of AES candidate algorithms to study the randomness of the well-known MD5 hash function. Our approach uses high-density, lo- density, and chained-input methods to generate MD5 hashes. We concatenate these hash outputs and subjected them to multinomial distribution and close-point spatial tests. We iterated this approach over reduced-round versions of MD5. Our presentation includes specifications for the input methods, details on the statistical tests, and analysis of the statistical results.</p>
    <p>Through statistical testing of concatenated MD5 hashes, we derive results that demonstrate a link between the performance of the concatenated hash bit sequences in our statistical testing and the number of hash rounds applied to the high-density and low-density input methods. Randomness is a desirable property for cryptographic hash functions. We present a new approach that facilitates the analysis and interpretation of hash functions for statistical randomness.</p>
    <p>About the Speaker. Enis Golaszewski is a prospective PhD student in CS at UMBC, working with Dr. Alan T. Sherman. His research interests include the security of software-defined networks. He graduated from UMBC in CS in December 2015 and was a student in the fall 2015 INSuRE class. Email: &lt;Sorry, you need javascript to view this email address. &gt;</p>
    <p>Host: Alan T. Sherman, Sorry, you need javascript to view this email address. </p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Statistical Testing of Hash Bit Sequences   Enis Golaszewski  CSEE, UMBC   11:15am-12:30pm Friday, 6 May 2016, ITE 237   We tested bit sequences generated...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/20573/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59963/guest@my.umbc.edu/fe105755ae51867d909cc45707e8ac6a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 05 May 2016 22:12:30 -0400</PostedAt>
<EditAt>Thu, 05 May 2016 22:12:30 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="59887" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59887">
<Title>UMBC students demonstrate smartphone applications, 12:30-2:30 Tue 5/10</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/mobile_class_csee.jpg" alt="mobile_class_csee" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/cordova.jpg" alt="cordova" width="150" height="188" style="max-width: 100%; height: auto;"><br>
    <img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/banerjee.jpeg" alt="7919_New Faculty 2009 Nilanjan Banerjee Computer Science and Computer Engineering" width="150" height="195" style="max-width: 100%; height: auto;"></div>
    <p>Student groups drawn from two UMBC classes will demonstrate <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/05/DemonstrationSessionHrabowskiGrant.png" rel="nofollow external" class="bo">twelve mobile applications</a> they developed as projects from 12:30 to 2:30 on Tuesday, 10 May 2016 in the UC Ballroom. Pizza will be provided.</p>
    <p>The projects are a result of an innovative collaboration between a computer science class lead by Professor <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> (CMSC 678 <a href="http://www.csee.umbc.edu/~nilanb/teaching/628/" rel="nofollow external" class="bo">Mobile Computing</a>) and a visual arts class lead by Professor <a href="http://art.umbc.edu/varts/faculty/cordova.php" rel="nofollow external" class="bo">Viviana Chacon</a> (ART 434 <a href="http://catalog.umbc.edu/preview_hrabowskicourse_nopop.php?catoid=3&amp;coid=5480" rel="nofollow external" class="bo">Advanced Interface Design</a>).</p>
    <p>The two faculty were <a rel="nofollow external" class="bo">awarded</a> a grant from the fall 2015 round of the Hrabowski Fund for Innovation competition to develop and evaluate the collaboration between the two courses. The classes held regular joint sessions and each project group comprised students from both Engineering and Visual Arts.</p>
    <p>In ART 434 Prof. Cordova concentrated on the visual experience of the interface in mobile and desktop applications, while in CMSC 628 Prof.  Banerjee provided the tools necessary to design and implement mobile applications.  Specific mobile development topics such as user interface design and implementation, accessing and displaying sensor and location data, and mobile visual design were co-­‐taught by both instructors.  Teams comprising Engineering and Visual Arts students designed and built mobile applications for local clients in Baltimore and Washington DC area.</p>
    <p>A <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/05/DemonstrationSessionHrabowskiGrant.png" rel="nofollow external" class="bo">poster</a> describing the event has brief descriptions of the twelve class projects.</p></div>
]]>
</Body>
<Summary>Student groups drawn from two UMBC classes will demonstrate twelve mobile applications they developed as projects from 12:30 to 2:30 on Tuesday, 10 May 2016 in the UC Ballroom. Pizza will be...</Summary>
<Website>http://www.csee.umbc.edu/2016/05/umbc-students-demonstrate-smartphone-applications-1230-230-tue-510/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59887/guest@my.umbc.edu/60403a18ab2b56f9de53f5602411740f/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>teaching-innovation</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 03 May 2016 12:37:27 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="59888" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59888">
<Title>NSF CyberCorps: Scholarship For Service, May 15 deadline</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/CYBERCORPS.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <p>UMBC undergraduate and graduate students interested in cybersecurity can apply for an <a href="https://www.sfs.opm.gov/" rel="nofollow external" class="bo">Federal CyberCorps: Scholarship For Service</a> scholarship by 15 May 2016. This application deadline will be the last one under the current NSF grant, which ends August 2017.</p>
    <p>The Federal CyberCorps: Scholarship For Service program is designed to increase and strengthen the cadre of federal information assurance professionals that protect the government’s critical information infrastructure. This program provides scholarships that may fully fund the typical costs incurred by full-time students while attending a participating institution, including tuition and education and related fees. Participants also receive stipends of $22,500 for undergraduate students and $34,000 for graduate students.</p>
    <p>Applicants must be be full-time UMBC students within two years of graduation with a BS or MS degree; a student within three years of graduation with both the BS/MS degree; a student participating in a combined BS/MS degree program; or a research-based doctoral student within three years of graduation in an academic program focused on cybersecurity or information assurance. Recipients must also be US citizens or permanent residents; meet criteria for Federal employment; and be able to obtain a security clearance, if required.</p>
    <p>For more information and instructions on how to apply see the <a href="http://www.cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC CISA</a> site (use old application form, and be sure to include the cover sheet).</p></div>
]]>
</Body>
<Summary>UMBC undergraduate and graduate students interested in cybersecurity can apply for an Federal CyberCorps: Scholarship For Service scholarship by 15 May 2016. This application deadline will be the...</Summary>
<Website>http://www.csee.umbc.edu/2016/04/nsf-cybercorps-scholarship-for-service-may-15-deadline/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59888/guest@my.umbc.edu/ce66f650f9ee28ba90fc01b8e05b7f37/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>sfs</Tag>
<Tag>students</Tag>
<Tag>undergraduate</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 29 Apr 2016 08:54:57 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="59723" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/59723">
<Title>tutorial: Design, Analysis and Security of Automotive Networks, 2pm 4/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/CAN-bus.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h2>
    <h2>Design, Analysis and Security of Automotive Networks</h2>
    <h3>Sekar Kulandaivel<br>
    University of Maryland, Baltimore County</h3>
    <h3>2:00-3:30pm Friday, 29 April 2016, ITE 325b</h3>
    <p>As more electronic and wireless technologies permeate modern vehicles, understanding the design of an embedded automotive network becomes necessary to protect drivers from external agents with a malicious intent to disrupt onboard electronics. By analyzing the different types of automotive networks and current security issues that the industry faces, we will learn how intruders are able to access an automotive network, read data that streams from the connected nodes and inject potentially malicious messages. This presentation will cover the electrical design of automotive networks, the communication protocols between electronic control units, methods for analyzing network messages and a detailed overview of previous automotive attacks and current security issues.</p>
    <p>Sekar Kulandaivel is a Meyerhoff Scholar and Computer Engineering undergraduate student at UMBC. He currently works on designing an intrusion detection system for automotive networks with Dr. Nilanjan Banerjee of the UMBC Eclipse Cluster. Sekar has had previous internships at MIT Lincoln Laboratory, Northrop Grumman Corporation and Johns Hopkins University. He will attend Carnegie Mellon University in Fall 2016 to pursue a PhD in Electrical and Computer Engineering with a focus in electric vehicle security.</p></div>
]]>
</Body>
<Summary>Design, Analysis and Security of Automotive Networks   Sekar Kulandaivel  University of Maryland, Baltimore County   2:00-3:30pm Friday, 29 April 2016, ITE 325b   As more electronic and wireless...</Summary>
<Website>http://www.csee.umbc.edu/2016/04/tutorial-design-analysis-and-security-of-automotive-networks-2pm-429/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/59723/guest@my.umbc.edu/3ebfa9715706199e10a97506bbec1fd5/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 27 Apr 2016 14:42:55 -0400</PostedAt>
</NewsItem>

</News>
