<?xml version="1.0"?>
<News hasArchived="false" page="24" pageCount="206" pageSize="10" timestamp="Thu, 07 May 2026 06:07:12 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=pawpularity&amp;page=24">
  <NewsItem contentIssues="true" id="127870" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127870">
  <Title>Talk: The Art of Language Invention; 4-5:30pm Thur. 10/6</Title>
  <Tagline>Authentic Language Creation for Television and Film</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2022/09/FL22-MLLI-SSF-D.-Peterson-FINAL.png" style="max-width: 100%; height: auto;"><div><br></div>
    <div>
    <div><br></div>
    <h4>The Art of Language Invention:  Authentic Language Creation for Television and Film</h4>
    <div><br></div>
    <h4>David J. Peterson </h4>
    <div><br></div>
    <h5>MLLI SSF Lecture<br>4-5:30 pm, Thursday, 6 October 2022<br>AOK Library 7th floor, UMBC</h5>
    <div><br></div>
    <div>
    <div>The <a href="https://socialscience.umbc.edu/social-sciences-forum/fall-2022-social-sciences-forum/" rel="nofollow external" class="bo">UMBC Social Sciences Forum</a> presents <a href="https://artoflanguageinvention.com/" rel="nofollow external" class="bo">David J. Peterson</a>, linguist and language creator for HBO's Game of Thrones, HBO's House of the Dragon, and Legendary's Dune, who will speak on The Art of Language Invention: Authentic Language Creation for Television and Film.</div>
    <div><br></div>
    <div>Peterson will detail his process for authentic language creation. Drawing from linguistics and language study, and utilizing both traditional and digital tools, Peterson will go through the creation of a language's sound system, grammar, lexicon, and writing system, and will discuss how his work interfaces with film, television and video game production.</div>
    <div><br></div>
    <div>In the fall of 2015, Peterson published his nonfiction work The Art of Language Invention with Penguin Books. He has a background in academic linguistics, having earned a bachelor's degree in English and Linguistics from UC Berkeley in 2003, and a master's degree in Linguistics from UC San Diego in 2005 (recipient of the 2016 Emerging Leader Award). He's also been creating languages since 2000. He served as a cofounder and original board member of the Language Creation Society, and served as its president from 2011 to 2014.</div>
    </div>
    </div>
    </div>
]]>
  </Body>
  <Summary>The Art of Language Invention:  Authentic Language Creation for Television and Film     David J. Peterson      MLLI SSF Lecture 4-5:30 pm, Thursday, 6 October 2022 AOK Library 7th floor, UMBC...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127870/guest@my.umbc.edu/0831160e2bfac9ab25de6fb6c3c006d5/api/pixel</TrackingUrl>
  <Tag>linguistics</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Modern Languages, Linguistics &amp; Intercultural Communication</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 22 Sep 2022 22:43:16 -0400</PostedAt>
  <EditAt>Thu, 22 Sep 2022 22:45:25 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="127760" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127760">
  <Title>Interweave Cognitive Radio for 4G Long Term Evolution and 5G</Title>
  <Tagline>PhD Defense: Brian Stevens, Computer Engineering</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <div><strong>Ph.D. Dissertation Defense</strong></div>
    <div><br></div>
    <h4>Interweave Cognitive Radio for 4G Long Term Evolution and 5G New Radio Self-Reliant Networks</h4>
    <div> </div>
    <h5>Brian Stevens, Computer Engineering</h5>
    <div> </div>
    <h5>1-3 pm ET Tuesday, 20 September 2022, <a href="https://jhuapl.zoomgov.com/j/1612413585?pwd=bk1CK3duRjYyVXBodmhNRUdQQmxTUT09" rel="nofollow external" class="bo">Zoom</a>
    </h5>
    <div><br></div>
    <div><strong>Committee: Drs. Mohamed Younis (Chair),  Tulay Adali, Sunita Bhatia</strong></div>
    <div><strong>(JHUAPL), Seung-Jun Kim, Dmitri Perkins, Ting Zhu</strong></div>
    <div><br></div>
    <div>Existing cellular networks have untapped radio frequency resources, also known as white space, available for cognitive radio applications. A secondary network can opportunistically interweave communication within the white space of an existing cellular signal by leveraging cognitive radio. This thesis presents a novel methodology for forming a cognitive interwoven self-reliant secondary network with no additional physical infrastructure, collaboration from the existing primary network, and software or hardware changes in the primary network. The methodology is tested first with 4G and later with 5G cellular technological standards. For the physical layer, this thesis optimizes synchronization as the initial step in aligning to a cellular signal in time, frequency, and sector identity. We improve synchronization through sensitivity, execution time, and applies a threshold to form a "cell detector" instead of the traditional "cell search," which only considers the most detectable signal. </div>
    <div><br></div>
    <div>After synchronization, resource detectors monitor the available spectral resources of the entire cellular infrastructure. Modern cellular networks have grown in complexity and become an ecosystem that includes the host technologies, such as 4G Long Term Evolution (LTE) and 5G New Radio (NR), along with subsystems such as narrowband internet of things (NB-IoT), category M1 (Cat-M1/LTE-M), observed time difference of arrival (OTDOA), and support for 4G/5G coexistence using dynamic spectrum sharing (DSS). Such an increased complexity has driven the need for network monitoring to enable load tracking, congestion control, spectral efficiency analysis, intrusion detection, and cognitive radio communications.</div>
    <div><br></div>
    <div>This thesis develops resource monitoring that can passively monitor the entire cellular ecosystem, including reservations configured with high-layer messages that are only accessible to in-network, active, and sometimes user-specific equipment. Resource monitoring provides white-space reservations for cognitive communications. We define interference control to prevent interference with the primary network through physical layer access schemes and power control cluster protocols to access resources safely. With the added complexity of 5G as a host technology, our research leverages geospatial beamforming of known signals as spatially dependent white space. In this case, the known synchronization signal burst must be detected with a "beam detector" instead of a "beam search" to properly use beam resources that are not close to cognitive radio nodes. The thesis applies the self-reliant methodology, which defines opportunistic access and power control protocols that limit interference between cellular networks in both the time and frequency domains with additional support in the geospatial domain for 5G NR. Our research determines that an adapted version of Slotted ALOHA for medium access control (MAC) with a no-back-off contention fits the self-reliant approach of our work and timing constraints found in 4G LTE and 5G NR networks.</div>
    <div><br></div>
    <div><br></div>
    </div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense     Interweave Cognitive Radio for 4G Long Term Evolution and 5G New Radio Self-Reliant Networks     Brian Stevens, Computer Engineering     1-3 pm ET Tuesday, 20...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127760/guest@my.umbc.edu/e64a5f0ad7f42f9b06c9171ad1fbc11c/api/pixel</TrackingUrl>
  <Tag>cognitive</Tag>
  <Tag>defense</Tag>
  <Tag>phd</Tag>
  <Tag>radio</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 19 Sep 2022 16:52:50 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127703" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127703">
  <Title>Talk: Critical Infrastructure Risk Assessment and Reduction</Title>
  <Tagline>Online, 12:00-1pm ET, Friday, 23 September 2022</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <div><strong>The UMBC Cyber Defense Lab presents</strong></div>
    <div><br></div>
    <h4>On A Risk Assessment and<br>Reduction Approach for<br>National Critical <span>Infrastructure</span>
    </h4>
    <div><br></div>
    <h4><strong>Cyrus Jian Bonyadi</strong></h4>
    <strong>Security Systems Analyst and PhD Student<br></strong><strong>Sandia National Labs and UMBC</strong><div><br></div>
    <div><strong>12:00-1pm ET, Friday, 23 Sept. 2022, <span>via </span><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></div>
    <div><br></div>
    <div>Work by Jason Reinhardt, Merideth Secor, Lindsey Miles, Ron Lafond, Derek Koolman II, Lauren Wind, Ray Ludwig, Jeff Munns</div>
    <div><br></div>
    <div>The <a href="https://www.cisa.gov/" rel="nofollow external" class="bo">Cybersecurity and Infrastructure Security Agency</a> (CISA) leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. CISA must assess risks that cover a broad range of scenarios over a complex set of interdependent critical infrastructure (CI) systems. While many threat and hazard impact models and data sets exist, there is no overarching analytic structure that organizes and integrates these disparate sources into a unified risk assessment. CISA is building capabilities that will address these challenges to support stakeholders across all levels of government and the private sector. </div>
    <div><br></div>
    <div>First, CISA has developed a <a href="https://www.cisa.gov/national-critical-functions" rel="nofollow external" class="bo">National Critical Functions</a> (NCFs) data structure to organize and describe critical infrastructure. This data set provides a set of decompositions structured as directed graphs that break down each identified function into enabling sub-functions that detail the operation and interdependencies across disparate CI systems.  <span>The functional description of NCFs serves as a complementary lens to the sector-based organization of CI and better facilitates systemic and cross-sector risk analysis. </span>
    </div>
    <div><span><br></span></div>
    <div><span>Additionally, CISA has begun developing the Risk Architecture, a technology-enabled analytic tool that contains a set of standards, scenarios, visualizations, and workflows that leverage the NCF and other integrated CI data sets. This talk describes the need for an integrated approach to CI risk assessment, the NCF decomposition structure, the principles and concepts behind the Risk Architecture, and the approaches to functional interdependency analysis while also providing initial use examples.</span></div>
    <div><br></div>
    <div>
    <a href="http://cyrusbonyadi.io/" rel="nofollow external" class="bo">Cyrus Jian Bonyadi</a> is a PhD student working on developing a set of corollaries for consensus theory in distributed system security. Cyrus is a former member of the UMBC <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyberdawgs</a> cyberdefense team and maintains a relationship with UMBC as a full time researcher at Sandia National Labs. </div>
    <div><br></div>
    <div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. <span>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.  The </span><a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a><span> meets biweekly Fridays 12-1pm. All meetings are open to the public.  Upcoming CDL meetings: Oct 7, Geoffrey Herman (Illinois), Validation of the Cybersecurity Curriculum Assessment (CCA); Oct 21, Peter Peterson (UMN Duluth), Misconceptions in cybersecurity; Nov 4, Josiah Dykstra (DoD), Myths in cybersecurity; Nov 18, Russ Fink (APL), ARMR: Autonomous resilience / machine recovery; Dec 2 Peter Peterson (UMN Duluth), Adversarial Thinking; SFS/CySP Research Study: January 2-6, 2023 (tentative).</span>
    </div>
    <div><br></div>
    </div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents     On A Risk Assessment and Reduction Approach for National Critical Infrastructure     Cyrus Jian Bonyadi Security Systems Analyst and PhD Student Sandia...</Summary>
  <Website>https://cisa.umbc.edu/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127703/guest@my.umbc.edu/2b1521e170974ba41a6ccf6e64f0f355/api/pixel</TrackingUrl>
  <Tag>cisa</Tag>
  <Tag>cybersecurity</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>UMBC Cyber Defense Lab</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xxlarge.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xlarge.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/large.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/medium.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/small.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xsmall.jpg?1663610286</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/703/bd8be10767478fbe30cf9ba484b8eefe/xxsmall.jpg?1663610286</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 19 Sep 2022 09:13:48 -0400</PostedAt>
  <EditAt>Mon, 19 Sep 2022 14:01:23 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127693" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127693">
    <Title>Registration open for the 2022 hackUMBC hackathon</Title>
    <Tagline>Saturday and Sunday, 1-2 October 2022 in the ILSB building</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <div><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2022/09/Screen-Shot-2022-09-17-at-6.25.38-PM.png" style="max-width: 100%; height: auto;"></div>
          <span><div><br></div></span><div>
          <div>
          <a href="https://hackumbc.typeform.com/to/nWcCFMXi?ty" rel="nofollow external" class="bo">Registration</a> is now open for the <a href="https://www.hackumbc.org/" rel="nofollow external" class="bo">2022 hackUMBC hackathon</a>, which takes place on campus on Saturday and Sunday, 1-2 October 2022 in the <a href="https://ilsb.umbc.edu/" rel="nofollow external" class="bo">ILSB building</a>.</div>
          <div><br></div>
          <div>Join hackUMBC for our 24-hour hackathon event where we challenge our ideas to come to life! Collaborate with other students and pick up some new skills in our workshop sessions!</div>
          </div>
          <div><br></div>
          <div>With lots of fun activities, over $5,000 in prizes, and swag for all participants, you will be in for an exciting weekend.</div>
          <div><br></div>
          <div>There will be four tracks focused on different areas: data analysis and visualization, hardware systems, AI/machine learning, and general ideas that don't fit the other three.</div>
          <div><br></div>
          <div>For more information, see the <a href="https://www.hackumbc.org/" rel="nofollow external" class="bo">hackUMBC</a> site.</div>
          <div><br></div>
          <div><div><a href="https://t.co/muA8wRngTY" rel="nofollow external" class="bo"><span>peform-source=www.hackumbc.org</span></a></div></div>
          </div>
      ]]>
    </Body>
    <Summary>Registration is now open for the 2022 hackUMBC hackathon, which takes place on campus on Saturday and Sunday, 1-2 October 2022 in the ILSB building.     Join hackUMBC for our 24-hour hackathon...</Summary>
    <Website>https://www.hackumbc.org/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127693/guest@my.umbc.edu/048eb2b965c45b4d05aea250b8ae1223/api/pixel</TrackingUrl>
    <Tag>hackathon</Tag>
    <Tag>hackumbc</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 17 Sep 2022 21:02:11 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="127509" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127509">
  <Title>CSEE faculty &amp; students win human-machine teaming events</Title>
  <Tagline>Hackathon sponsored by the Army Research Lab and Columbia U.</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><h5><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2022/09/hackatonteam_16x9.jpg" style="max-width: 100%; height: auto;"></h5>
    <div>
    <span>Professor Tinoosh </span><span>Mohsenin, </span><span>Khondoker Hossain</span><span>, </span><span>Prakhar Dixit</span><span>, and Professor Tim Oates</span>
    </div>
    <br><p></p>
    <h5><span>CSEE faculty and grad students show expertise in human-guided system adaptation at Columbia University event</span></h5>
    <div><span><br></span></div>
    <p><span>A team led by CSEE Professors Tinoosh Mohsenin and Tim Oates recently competed in three events at the </span><a href="https://liinc.bme.columbia.edu/human-guided-system-adaptation-hsa-science-challenge-and-hackathon-week/" rel="nofollow external" class="bo"><span>Human-Guided System Adaptation (HSA) Science Challenge and Hackathon Week</span></a><span>. The event, sponsored by the Columbia University Program for Human-Guided Machine Adaptation and the Army Research Lab, was held at Columbia the week of August 8-12 with the goal of extending the state-of-the-art in human-machine teaming. UMBC either won or was on the team that won all three events.</span></p>
    <p><span>The first competition required the participants to prepare a five-minute video proposing a testbed for human-machine teaming that included specific drivers in the 2040+ Vision of the US Army: advanced intelligence, superhuman capabilities, and rapid technological change. Dr. Oates proposed using <a href="https://en.wikipedia.org/wiki/Nomic" rel="nofollow external" class="bo">Nomic</a></span><span>--</span><span>a game in which a move corresponds to proposing and voting on changes to the rules</span><span>--</span><span>as the testbed. His video tied for first place with Duke University.</span></p>
    <p><span>The second competition required the team to propose a sequence of five or more experiments in a single testbed to answer critical scientific questions in one of the following areas: Human-Guided Machine Learning, Tech Savvy, Hybrid Thinking, Rapid Adaptable Small Teams, and Distributed Teams. Dr. Mohsenin's team, led by ARL collaborator Dr. Nick Waytowich, won first place. </span></p>
    <span>Finally, Ph.D. student Khondoker Murad Hossain and master's student Prakhar Dixit competed in a classic hackathon where the goal was to build a human-agent team to play Hybrid Team Mega-Tetris</span><span>--</span><span>a tetris variant in with multiple ongoing game screens and novel rules that can arise at any time, making it impossible for humans to play well without machine help. Khondoker and Prakhar won the tournament with a final score that was more than twice that of the second place team.</span></span></div>
]]>
  </Body>
  <Summary>Professor Tinoosh Mohsenin, Khondoker Hossain, Prakhar Dixit, and Professor Tim Oates    CSEE faculty and grad students show expertise in human-guided system adaptation at Columbia University...</Summary>
  <Website>https://liinc.bme.columbia.edu/human-guided-system-adaptation-hsa-science-challenge-and-hackathon-week/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127509/guest@my.umbc.edu/74c87d0636b9bd0a17309b6ded4b8671/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>hackathon</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 14 Sep 2022 14:24:59 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127467" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127467">
    <Title>PhD Defense: Md Shafiqul Islam, Computer Eng., 9-11am 9/14</Title>
    <Tagline>Communication Across the Air-Water Interface</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <h5><img src="https://i.imgur.com/YKcu163.png" style="max-width: 100%; height: auto;"></h5>
          <h5><br></h5>
          <h5>PhD Defense, <span>Computer Engineering</span>
          </h5>
          <div><br></div>
          <h4>Analysis and Protocols to Establish Downlink for<br>Communication Across the Air-Water Interface</h4>
          <div><br></div>
          <h4>Md Shafiqul Islam</h4>
          <h5>
          <br>9-11 am Wed. 14 Sept. 2022 <span>via </span><a href="https://umbc.webex.com/umbc/j.php?MTID=mb47a365016b4714771f2c3a50624fec0" rel="nofollow external" class="bo">WebEx </a>
          </h5>
          <div><br></div>
          <div>In underwater wireless networks (UWNs), conventionally there is no direct communication between an underwater node and a remote command center, because there is no known physical signal that propagates well in both the water and air mediums. Radio signals are the popular choice in the air while acoustics are the prime means for communication underwater. Hence, the typical architecture of an UWN includes surface nodes or gateways which have dual modems, an acoustic modem to communicate with underwater nodes and a radio modem to interact with terrestrial command centers. However, such an architecture is logistically complicated and could expose the network to security threat. Therefore, it is desirable to establish a direct communication from air to underwater without having any intermediate surface node. </div>
          <div><br></div>
          <div>This dissertation opts to fulfill such a need by pursuing two viable solutions, namely, using visual light communications (VLC) and exploiting the optoacoustic (photoacoustic) effect. Through extensive analysis and experiments we show that VLC is an effective means for scenarios where the distance between the airborne and underwater nodes is relatively short. We first analyze the coverage area and intensity inside the water for a light transmitter placed in the air. We then provide guidelines for using single and multiple light sources to establish robust VLC links under rough environmental conditions like high water current and turbidity. Furthermore, we investigate effective modulation techniques that suit VLC. For long distance communication, VLC is not a viable option since light gets absorbed at an exponentially growing rate with the increase of water depth. Photoacoustic (PA) energy transfer mechanism is the promising method for long distance communication. </div>
          <div><br></div>
          <div>Although the use of the photoacoustic mechanism is quite common in medical imaging, little progress has been made on building the communication protocol stack for air-to-underwater communication. In our research work, at first, we have studied the channel characteristics of the PA based air-to-underwater communication. We show that by carefully choosing the relative position of the airborne unit and underwater node, we can generate a narrowband acoustic signal which is very crucial for long distance communication. Moreover, we develop suitable modulation and demodulation schemes for PA communication.</div>
          <div><br></div>
          <div>
          <strong>Committee:</strong> Drs. Mohamed Younis, Fow-Sen Choa, Gary Carter, Lloyd Emokpae, Akram Fadhl N. Ahmed</div>
          <div><br></div>
          </div>
      ]]>
    </Body>
    <Summary>PhD Defense, Computer Engineering     Analysis and Protocols to Establish Downlink for Communication Across the Air-Water Interface     Md Shafiqul Islam   9-11 am Wed. 14 Sept. 2022 via WebEx ...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127467/guest@my.umbc.edu/7195032010c7ec3a0266f38c0b84b179/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>defense</Tag>
    <Tag>phd</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 11 Sep 2022 22:08:42 -0400</PostedAt>
    <EditAt>Sun, 11 Sep 2022 22:10:58 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="127465" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127465">
    <Title>Free 10-week Discover AI program, apply by Tuesday, Sept. 20</Title>
    <Tagline>Application deadline extended to 9/20</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <span><span>UMBC and nonprofit <span><strong><a href="https://ai-4-all.org/" rel="nofollow external" class="bo">AI4ALL</a></strong></span></span><span><span></span></span><span> will offer UMBC first-year, sophomore, and junior undergraduates the opportunity to apply to the </span><span>free</span><span>College Pathways</span><span> <a href="https://ai-4-all.org/college-pathways/" rel="nofollow external" class="bo">Discover AI</a></span><span></span><span>program. It's designed to be accessible to students with and without programming experience. </span></span><div><span><span><br></span></span></div>
          <div><span><span>The ten-week project-oriented program starts <strong>on September 30</strong> and will have weekly online synchronous sessions on Fridays from 3:30 to 5:00 pm. Additional asynchronous material will also be available.<span> It is not graded and students who finish it will get a certificate of completion. </span></span></span></div>
          <div><span><br></span></div>
          <div>
          <span>Get <a href="https://docs.google.com/document/d/1fPXYpa84X0VOw3rZ3emqwyAQmRlVeH_Sr1pobVZUQz4/edit#" rel="nofollow external" class="bo"><strong>more information here</strong></a> and <strong><a href="https://app.smarterselect.com/programs/82942" rel="nofollow external" class="bo">a</a></strong></span><strong><span><a href="https://app.smarterselect.com/programs/82942" rel="nofollow external" class="bo"><span>pply</span> online</a></span></strong><span>byTuesday <strong>September 20. </strong>C</span><span>ontact </span><strong><a href="mailto:ai4all@csee.umbc.edu" rel="nofollow external" class="bo">ai4all@csee.umbc.edu</a></strong><span> with any questions.</span>
          </div>
          <div><span><br></span></div>
          </div>
      ]]>
    </Body>
    <Summary>UMBC and nonprofit AI4ALL will offer UMBC first-year, sophomore, and junior undergraduates the opportunity to apply to the freeCollege Pathways Discover AIprogram. It's designed to be accessible...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127465/guest@my.umbc.edu/62159d14e29e03938f7785ba6a909697/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>machine-learning</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 11 Sep 2022 19:55:53 -0400</PostedAt>
    <EditAt>Sat, 17 Sep 2022 12:59:57 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="127380" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127380">
  <Title>Physical Security and How We Break It (Legally)</Title>
  <Tagline>talk on physical penetration testing by alum Adam Sachsel</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h6>The UMBC Cyber Defense Lab presents</h6>
    <div><br></div>
    <h3>Physical Security and <br>How We Break It (Legally)</h3>
    <div><br></div>
    <h5>Adam J. Sachsel<br>Cyber Testing Associate<br>RSM Consulting</h5>
    <div><br></div>
    <h5>12-1pm Fri. 9 Sept. 2022, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a>
    </h5>
    <div><br></div>
    <div>This talk explores many aspects of physical security, including why it is important, how physical security is assessed professionally, and some professional opinions on what comprises "good" physical security. Then, I will briefly touch on physical penetration testing and what usually comprises a physical penetration test. I will also relate a few fun war stories from some personal experiences while performing these kinds of tests.</div>
    <div><br></div>
    <div>
    <a href="https://www.linkedin.com/in/asachse1/" rel="nofollow external" class="bo"><strong>Adam Sachsel</strong></a> graduated from UMBC in 2021 with a BS in computer science. Initially his goal was to become a software developer, until the UMBC Cyberdawgs recruited him and completely changed his career path to focus on security. After graduation Adam secured a job as a "Cyber Testing Associate" with RSM Consulting in Des Moines, Iowa. He was quickly assigned to the Social Engineering Team and now spends his days performing internal and external penetration tests, drafting phishing campaigns, and lying his way into secure areas around the U.S. He is currently on the path to achieve his Practical Network Penetration Tester (PNPT) certification and eventually join the RSM Red Team in more complex engagements. Email:<a href="mailto:adamsachsel@gmail.com">adamsachsel@gmail.com</a>.</div>
    <div><br></div>
    <div>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.</div>
    <div><br></div>
    <div>
    <strong>The UMBC Cyber Defense Lab</strong> meets biweekly Fridays 12-1pm.  All meetings are open to the public.  Upcoming CDL meetings: Sept 23, TBA; Oct 7, TBA; Oct 21, Peter Peterson, Misconceptions in cybersecurity; Nov 4, Josiah Dykstra (DoD), Myths in cybersecurity; Nov 18, Russ Fink (APL), ARMR: autonomous resilience / machine recovery; Dec 2, Peter Peterson, Adversarial Thinking; January 2-6, 2023 (tentative): SFS/CySP Research Study.</div>
    </div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents     Physical Security and  How We Break It (Legally)     Adam J. Sachsel Cyber Testing Associate RSM Consulting     12-1pm Fri. 9 Sept. 2022, via WebEx     This...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127380/guest@my.umbc.edu/6367e185ad3bfb3f04a4b0e6c1bad159/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>talk</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>UMBC Cyber Defense Lab</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/xxlarge.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/xlarge.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/large.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/medium.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/small.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/xsmall.jpg?1662644407</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/127/380/5f5cc0e1d193db626faad9a0db0766d4/xxsmall.jpg?1662644407</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 08 Sep 2022 09:49:10 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127191" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127191">
  <Title>Professional Development Opportunity: AI  &amp; Careers in Tech</Title>
  <Tagline>Free College Pathways Discover AI program, apply by Sept. 14</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <img src="https://i.imgur.com/NAoNZRl.jpg" style="max-width: 100%; height: auto;"><h4><strong><br></strong></h4>
    <h4><strong>Professional Development Opportunity:<br>Artificial Intelligence &amp; Careers in Tech</strong></h4>
    <div><br></div>
    <div>UMBC and nonprofit <a href="https://ai-4-all.org/" rel="nofollow external" class="bo"><strong>AI4ALL</strong></a> have partnered to offer UMBC undergraduate students the opportunity to apply to the free <strong><a href="https://ai-4-all.org/college-pathways/" rel="nofollow external" class="bo">College Pathways Discover AI</a></strong> program. </div>
    <div><br></div>
    <div><strong><a href="https://app.smarterselect.com/programs/82942" rel="nofollow external" class="bo">Apply online</a> by Wednesday, September 14, 2022</strong></div>
    <div><br></div>
    <div><strong>WHEN</strong></div>
    <div><ul><li>The Discover AI program runs from <strong>September 30 </strong>to <strong>December 9</strong> and include  weekly synchronous and asynchronous Instruction. Review the program's <strong><a href="https://app.smarterselect.com/programs/82942" rel="nofollow external" class="bo">application page</a></strong> for more details.</li></ul></div>
    <div><strong>WHAT</strong></div>
    <div><ul>
    <li><span>Discover AI is a <strong>virtual program</strong> in partnership with select schools that provides students with a project-based introduction to computer science, machine learning, data, artificial intelligence and tech careers through the lens of societal and ethics impact. In addition, students get access to AI industry leaders and are guided through a roadmap with the goal of cultivating a future career in the AI industry.</span></li>
    <li>What are both the positive and negative implications of AI technology on society? How can (and does) AI affect communities in today's world?  Through research, discussions, and reflection, you will explore the intersectionality of AI with other fields and articulate your own mindful perspective of AI. The program is facilitated at <strong>no cost to students.</strong>
    </li>
    <li>Students that complete the program will emerge with actionable next steps in pursuing an academic or career path in AI - and the opportunity to continue in the following semester to our second program, Apply AI and direct mentorship from industry leaders in the AI and tech industry from companies like Google, Capital One, Facebook, Slalom Consulting, Accenture, Pearson, and more.</li>
    <li>At the end of the  Discover AI program, participants receive an AI4ALL Discover AI certificate of completion.</li>
    </ul></div>
    <div><strong>WHO</strong></div>
    <div><ul>
    <li>The program is designed for <strong>Freshman, Sophomores, and Juniors</strong> with any level of coding and/or Computing/AI experience,  including everything from none to advanced.</li>
    <li>For computing majors, the program is a great supplement to your existing course work.</li>
    <li>Other majors are welcome as well! If accepted, you will have the opportunity to learn more about AI in a safe and thoughtful environment that offers you the opportunity to consider AI as a future career option and as a presence in your major industry/discipline</li>
    <li>AI4ALL programs are designed to bring together and highlight voices that have been historically excluded, and that will lead and shape the future of AI.</li>
    </ul></div>
    <div><strong> <a href="https://app.smarterselect.com/programs/82942" rel="nofollow external" class="bo">Apply online</a> by Wednesday, September 14, 2022.</strong></div>
    <div><br></div>
    <div>For more information, contact <a href="mailto:ai4all@csee.umbc.edu" rel="nofollow external" class="bo"><strong>ai4all@csee.umbc.edu</strong></a>
    </div>
    </div>
]]>
  </Body>
  <Summary>Professional Development Opportunity: Artificial Intelligence &amp; Careers in Tech     UMBC and nonprofit AI4ALL have partnered to offer UMBC undergraduate students the opportunity to apply to...</Summary>
  <Website>https://ai-4-all.org/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127191/guest@my.umbc.edu/c6462d97fb92b768460bfdc8f98d46e4/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>ai4all</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 31 Aug 2022 18:46:24 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127083" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127083">
  <Title>NSA Codebreaker Challenge Technical Talk</Title>
  <Tagline>6 pm ET Thursday, September 1, online</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">
    <div><img src="https://i.imgur.com/A4bJu4l.jpg" style="max-width: 100%; height: auto;"></div>
    <div><span><br></span></div>
    <div>
    <span>NSA will hold a 2022 <strong>Codebreaker Challenge Technical Talk</strong> online at 6:00pm ET on Thursday, September 1. You'll meet the team and get an overview of the challenge this year. Join the talk using this </span><strong><a href="https://teams.microsoft.com/l/meetup-join/19%3ameeting_NWYwOTg0YTQtY2NmZC00OGZlLTkxM2ItYjc0YTViMDBkZDQ3%40thread.v2/0?context=%7b%22Tid%22%3a%22d61e9a6f-fc16-4f84-8a3e-6eeff33e136b%22%2c%22Oid%22%3a%22a8137c2a-60d0-43f0-9eb6-4c08ad8c9f7d%22%2c%22IsBroadcastMeeting%22%3atrue%7d&amp;btype=a&amp;role=a" rel="nofollow external" class="bo">MS Teams link</a>.</strong>
    </div>
    <div><br></div>
    <div>The annual NSA <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">Codebreaker Challenge </a>consists of a series of tasks for students that are worth a varying amount of points based on their difficulty. Schools are ranked according to the total number of points accumulated by their students. Solutions may be submitted at any time during the challenge, which ends early in January, 2023.</div>
    <div><br></div>
    <div><div>Each task in this year's challenge will require a range of skills. It starts with easy tasks but advances to harder ones, so it's a <strong>great learning experience</strong> even if you are know little about cybersecurity. To solve all of the tasks, you will need to call upon your technical expertise, your intuition, and your common sense.</div></div>
    <div><br></div>
    <div>Getting started is easy. Go to the challenge <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">webpage</a>, create an account and identify yourself as a student, instructor, or alumnus of UMBC. After you've verified your email address, you will get an invitation to join the <strong>Codebreaker Discord server</strong>. Joining will earn you (and UMBC) your first point!  </div>
    <div><br></div>
    <div>As you work on the problems, you can <span>track how UMBC is doing on the </span><a href="https://nsa-codebreaker.org/leaderboard" rel="nofollow external" class="bo">leaderboard</a><span>.</span><span> Of the more than 340 schools currently registered, <strong>UMBC is #2</strong> in terms of the number of its participants, but only #45 in based on its score. </span>
    </div>
    </div>
]]>
  </Body>
  <Summary>NSA will hold a 2022 Codebreaker Challenge Technical Talk online at 6:00pm ET on Thursday, September 1. You'll meet the team and get an overview of the challenge this year. Join the talk using...</Summary>
  <Website>https://nsa-codebreaker.org/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127083/guest@my.umbc.edu/641222d2a28ed37345a6cfb4f1595ba0/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>nsa</Tag>
  <Tag>security</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 27 Aug 2022 21:30:38 -0400</PostedAt>
  <EditAt>Sun, 28 Aug 2022 14:42:34 -0400</EditAt>
</NewsItem>
</News>
