<?xml version="1.0"?>
<News hasArchived="false" page="105" pageCount="206" pageSize="10" timestamp="Wed, 13 May 2026 03:27:43 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=activity&amp;page=105">
  <NewsItem contentIssues="true" id="43873" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43873">
  <Title>talk: A multi-scale approach to analyze large clinical datasets, Noon Thr 4/10</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h2><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/EEG_Recording_Cap.jpg" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>A multi-scale approach to analyze large clinical datasets:<br>
    Towards the understanding of the complex effects of concussions</h2>
    <h3>Dr. Jesus Caban<br>
    National Intrepid Center of Excellence<br>
    Walter Reed, Bethesda, MD</h3>
    <h3>Noon Thursday, 10 April 2014, ITE325b</h3>
    <p>Mild traumatic brain injuries (mTBIs) or concussions are invisible injuries that are poorly understood and their sequelae can be difficult to diagnose. Individuals who have had concussions are at an increased risk of depression, post-traumatic stress disorder (PTSD), headaches, concentration difficulties, and other problems. During the last decade, a significant amount of attention has been given to the acquisition of clinical data from patients suffering from mTBI. Unfortunately, most of the data collection and analysis have focused on individual aspects of the injury, not necessarily on comprehensive and multi-modal analytical techniques to capture the complex biological state of mTBI patients.</p>
    <p>This talk will discuss a large-scale informatics database that has been developed to enable interdisciplinary research on mTBI and will introduce a multi-scale approach to mine complex clinical datasets. The millions of multi-modal elements originated from different clinical disciplines are treated as weak features and modeled independently to generate stronger features. Three cases of going from weak to stronger features will be discussed including (a) an inductive/transductive model to extract stable image features from multi-modal MRI scans, (b) a rule-based model used to infer knowledge from blood measurements, and (c) a sentiment analysis-based model to extract behavioral signals from writing samples. Once stronger features are obtained, a relational model is used to integrate the data and extract new knowledge from such a complex dataset.</p>
    <p>Dr. Caban is the Acting Chief of Clinical &amp; Research Informatics at the National Intrepid Center of Excellence (NICoE) at Walter Reed Bethesda. He received a Ph.D. in Computer Science from UMBC (2009), his M.S. degree in Computer Science from the University of Kentucky (2005), and his B.S. in Computer Science from the University of Puerto Rico (2002). Over the last eight years Dr. Caban’s research has focused on the design and development of techniques to analyze clinical and imaging data. His research and experience has given him the opportunity to work at top research and healthcare organizations including the National Institutes of Health (NIH), John Hopkins University, the University of Maryland Medical Center, and IBM Research. Dr. Caban is presently an adjunct faculty member at John Hopkins University Applied Physics Lab and a part-time instructor at the Department of Computer Science at UMBC. Recently, he received the 2013-14 JHU/APL Junior faculty award for his commitment to teaching. Currently, he is serving as the Associate Editor of the JAMIA special issue on Visual Analytics in Healthcare and as the contracting officer representative (COR) for the DoD program on “Watson-Like Technologies for TBI/PTSD Clinical Decision Support and Predictive Analytics”.</p>
    </div>
]]>
  </Body>
  <Summary>A multi-scale approach to analyze large clinical datasets:  Towards the understanding of the complex effects of concussions   Dr. Jesus Caban  National Intrepid Center of Excellence  Walter Reed,...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-a-multi-scale-approach-to-analyze-large-clinical-datasets-1pm-fri-411/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43873/guest@my.umbc.edu/3ba36b966a6a56d3e76234f0946f1452/api/pixel</TrackingUrl>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 07 Apr 2014 11:47:03 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43257" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43257">
    <Title>talk: Talking to Robots, 1pm Mon 4/7 ITE325b</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/PuttingAwayBlocks-copy.png" width="700" height="405" style="max-width: 100%; height: auto;"></p>
          <h1>Talking to Robots: Learning to Ground Human<br>
          Language in Robotic Perception</h1>
          <h2>
          <a href="http://homes.cs.washington.edu/~cynthia/" rel="nofollow external" class="bo">Cynthia Matuszek<br>
          </a>University of Washington</h2>
          <h2>1:00pm Monday, 7 April 2014, ITE325b, UMBC</h2>
          <p>Advances in computation, sensing, and hardware are enabling robots to perform an increasing variety of tasks in ever less constrained settings. It is now possible to imagine robots that can operate in traditionally human-centric settings. However, such robots need the flexibility to take instructions and learn about tasks from nonspecialists using language and other natural modalities. At the same time, learning to process natural language about the physical world is difficult without a robot’s sensors and actuators. Combining these areas to create useful robotic systems is a fundamentally multidisciplinary problem, requiring advances in natural language processing, machine learning, robotics, and human-robot interaction. In this talk, I describe my work on learning natural language from end users in a physical context; such language allows a person to communicate their needs in a natural, unscripted way. I demonstrate that this approach can enable a robot to follow directions, learn about novel objects in the world, and perform simple tasks such as navigating an unfamiliar map or putting away objects.</p>
          <p>Cynthia Matuszek is a Ph.D. candidate in the University of Washington Computer Science and Engineering department, where she is a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She earned a B.S. in Computer Science from the University of Texas at Austin, and M.Sc. from the University of Washington. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction.</p>
          </div>
      ]]>
    </Body>
    <Summary>Talking to Robots: Learning to Ground Human  Language in Robotic Perception   Cynthia Matuszek  University of Washington   1:00pm Monday, 7 April 2014, ITE325b, UMBC   Advances in computation,...</Summary>
    <Website>http://www.csee.umbc.edu/2014/04/talk-talking-to-robots-1pm-mon-47-ite325b/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-talking-to-robots-1pm-mon-47-ite325b</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43257/guest@my.umbc.edu/c77a9469f84afdd20a15a105c48039d2/api/pixel</TrackingUrl>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 05 Apr 2014 15:23:54 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="43874" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43874">
    <Title>talk: Talking to Robots, 1pm Mon 4/7 ITE325b</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/PuttingAwayBlocks-copy.png" width="700" height="405" style="max-width: 100%; height: auto;"></p>
          <h1>Talking to Robots: Learning to Ground Human<br>
          Language in Robotic Perception</h1>
          <h2>
          <a href="http://homes.cs.washington.edu/~cynthia/" rel="nofollow external" class="bo">Cynthia Matuszek<br>
          </a>University of Washington</h2>
          <h2>1:00pm Monday, 7 April 2014, ITE325b, UMBC</h2>
          <p>Advances in computation, sensing, and hardware are enabling robots to perform an increasing variety of tasks in ever less constrained settings. It is now possible to imagine robots that can operate in traditionally human-centric settings. However, such robots need the flexibility to take instructions and learn about tasks from nonspecialists using language and other natural modalities. At the same time, learning to process natural language about the physical world is difficult without a robot’s sensors and actuators. Combining these areas to create useful robotic systems is a fundamentally multidisciplinary problem, requiring advances in natural language processing, machine learning, robotics, and human-robot interaction. In this talk, I describe my work on learning natural language from end users in a physical context; such language allows a person to communicate their needs in a natural, unscripted way. I demonstrate that this approach can enable a robot to follow directions, learn about novel objects in the world, and perform simple tasks such as navigating an unfamiliar map or putting away objects.</p>
          <p>Cynthia Matuszek is a Ph.D. candidate in the University of Washington Computer Science and Engineering department, where she is a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She earned a B.S. in Computer Science from the University of Texas at Austin, and M.Sc. from the University of Washington. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction.</p>
          </div>
      ]]>
    </Body>
    <Summary>Talking to Robots: Learning to Ground Human  Language in Robotic Perception   Cynthia Matuszek  University of Washington   1:00pm Monday, 7 April 2014, ITE325b, UMBC   Advances in computation,...</Summary>
    <Website>http://www.csee.umbc.edu/2014/04/talk-talking-to-robots-1pm-mon-47-ite325b/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43874/guest@my.umbc.edu/0b8b8da68f72648d5aabaf446d3db1a6/api/pixel</TrackingUrl>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 05 Apr 2014 15:23:54 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="43239" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43239">
  <Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43239/guest@my.umbc.edu/87f87f90205f40096757d5c3a1bd2d69/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43875" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43875">
  <Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43875/guest@my.umbc.edu/6b45c2ce5bc2edd26083db829e539294/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43189" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43189">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43189/guest@my.umbc.edu/e67499260bb6dace33b03af98994995a/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
  <EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43190" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43190">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43190/guest@my.umbc.edu/21d7ca3e416e25617fba05e5c436ec87/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
  <EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43863" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43863">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43863/guest@my.umbc.edu/3feff382e9f5d1f02922fd1e22ebce44/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43876" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/43876">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43876/guest@my.umbc.edu/fdce6bd5a6da83d68f72a13ddd590e7b/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57836" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/57836">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>https://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57836/guest@my.umbc.edu/62860cb72e73420344b7502faa3440d4/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
</News>
