<?xml version="1.0"?>
<News hasArchived="false" page="45" pageCount="49" pageSize="10" timestamp="Tue, 28 Apr 2026 14:53:30 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?page=45&amp;tag=cybersecurity">
  <NewsItem contentIssues="true" id="15317" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/15317">
    <Title>MS defense: DNSSEC and PKI</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/06/dnssec.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p><span>MS Thesis Defense</span></p>
          <p><strong><span>An Operational Study of DNSSEC and its Practical<br>
          	Application in Establishing a Secure PKI Framework</span></strong></p>
          <p><span>Colin Roby</span></p>
          <p><span>4:00pm 19 June 2012, ITE 325b</span></p>
          <p>With the recent completion of signing the <a href="http://en.wikipedia.org/wiki/Domain_Name_System" rel="nofollow external" class="bo">DNS</a> Root and various TLD (top level domain), DNSSEC is gradually progressing towards an internet-wide adoption. The extension of <a href="http://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions" rel="nofollow external" class="bo">DNSSEC security measures</a> addresses many of the security flaws plagued the underlying DNS architecture since its inception. Once widely deployed, DNSSEC will pave the way for extending security service to a wide range of applications. This study focuses on the practicability of current iteration of DNSSEC implementation. Through a virtual network configuration which mimics a typical corporate environment, we explore viable options to establish a secure <a href="http://en.wikipedia.org/wiki/Public-key_infrastructure" rel="nofollow external" class="bo">PKI</a> framework based on DNSSEC in spite of its current limitations. In this endeavour, we propose a simple yet effective method to combine a corporate existing LDAP based directory service with DNSSEC to form a PKI key exchange infrastructure – one which is intuitive to administer and easy to scale to any large corporate network. We demonstrate the advantage of such a PKI framework in one area of its application – the common use of email. Using a prototype email client application, we illustrate how such a framework can promote and facilitate a more secure email system in terms of authenticity, integrity and confidentiality.</p>
          <p>Committee: Dr. Deepinder Sidhu (Chair), Dr. Chein-I Chang, Dr. Yun Peng</p></div>
      ]]>
    </Body>
    <Summary>MS Thesis Defense   An Operational Study of DNSSEC and its Practical   Application in Establishing a Secure PKI Framework   Colin Roby   4:00pm 19 June 2012, ITE 325b   With the recent completion...</Summary>
    <Website>http://www.csee.umbc.edu/2012/06/ms-defense-dnssec-and-pki/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/15317/guest@my.umbc.edu/544046f53aae3b14c5032446dd5076a7/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 16 Jun 2012 08:46:27 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="15289" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/15289">
  <Title>College Park announces new Cybersecurity honors program</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/06/UMD-logosmall.jpg" rel="nofollow external" class="bo"><img alt="" height="130" src="http://www.csee.umbc.edu/wp-content/uploads/2012/06/UMD-logosmall.jpg" width="700" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <p> </p>
    <p>UMBC's sister school to the south, the <a href="http://www.umd.edu/" rel="nofollow external" class="bo">University of Maryland, College Park</a> just announced plans for a new honors program in Cybersecurity called Advanced Cybersecurity Experience for Students (ACES) that they will debut in Fall 2013.</p>
    <p>Unlike <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">UMBC's graduate Cybersecurity program</a>, ACES is designed for undergraduate students from a range of majors including Computer Science, Engineering, Business, Public Policy, and the social sciences, says a <a href="http://www.cyber.umd.edu/news/news_story.php?id=6556" rel="nofollow external" class="bo">UMD press release</a>.</p>
    <p>The <a href="http://www.northropgrumman.com/" rel="nofollow external" class="bo">Northrop Grumman</a> corporation is supporting the program with a $1.1 million grant. They'll also supply guest lecturers and internship opportunities for students who want to gain some industry experience. The curriculum features courses like cybersercurity forensics, reverse engineering, secure coding, criminology, and law and public policy. Designed to graduate about 45 students per year,  the program's aim is to encourage creative problem solving for Cybersecurity problems of the future, says a <a href="http://articles.baltimoresun.com/2012-06-10/news/bs-md-college-park-cybersecurity-20120610_1_cybersecurity-northrop-grumman-graduate-students" rel="nofollow external" class="bo"><em>Baltimore Sun </em>article</a>.</p>
    <p>Sound good? Undergraduates at UMBC may eventually be able to take advantage of College Park's new program. According to the UMD press release, over the next few years, College Park hopes to have universities across the University System of Maryland participate in the program through distance education programs, online course offerings, and competitions.</p></div>
]]>
  </Body>
  <Summary>        UMBC's sister school to the south, the University of Maryland, College Park just announced plans for a new honors program in Cybersecurity called Advanced Cybersecurity Experience for...</Summary>
  <Website>http://www.csee.umbc.edu/2012/06/college-park-announces-new-cybersecurity-honors-program/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/15289/guest@my.umbc.edu/f06c9e6f5946863ddbfe8f2db3ee179f/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>1</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 13 Jun 2012 08:21:16 -0400</PostedAt>
  <EditAt>Mon, 18 Jun 2012 08:57:13 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="15239" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/15239">
    <Title>How LinkedIn should have protected your password</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/06/linkedin.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p>Coulda, Woulda, Shoulda.</p>
          <p>If you have a LinkedIn account, you probably noticed the <a href="http://www.theverge.com/2012/6/6/3067523/linkedin-password-leak-online" rel="nofollow external" class="bo">news</a> that 6.5 million of their passwords were leaked. While the passwords were encrypted, it's still a major problem for all LinkedIn users. In his column in the latest issue of ACM Queue, <a href="http://queue.acm.org/detail.cfm?id=2254400" rel="nofollow external" class="bo">LinkedIn Password Leak: Salt Their Hide</a>, security expert <a href="http://en.wikipedia.org/wiki/Poul-Henning_Kamp" rel="nofollow external" class="bo">Poul-Henning Kamp</a>, explains the flaws in LinkedIn's password management process and the simple steps that can make it much more secure.</p>
          <p>Of course, this is more than just about LinkedIn. Similar password leaks from <a href="http://arstechnica.com/security/2012/06/8-million-leaked-passwords-connected-to-linkedin/" rel="nofollow external" class="bo">eHarmoney</a> and <a href="http://www.zdnet.co.uk/news/security-threats/2012/06/08/lastfm-password-leak-could-affect-millions-of-users-40155353/" rel="nofollow external" class="bo">last.fm</a> were reported this week.  If you use any of these popular Web services, you probably should change your password, especially if you use the same password on other Internet sites and services.</p>
          <p>If you find this interesting, you should check out the monthly ACM Queue magazine.  It is a good resource for people interested in computing and software engineering. Here's how it describes its mission.</p>
          <blockquote>
          <p>"<a href="http://queue.acm.org/index.cfm" rel="nofollow external" class="bo">Queue</a> is the ACM's magazine for practicing software engineers. Written by engineers for engineers, Queue focuses on the technical problems and challenges that loom ahead, helping readers to sharpen their own thinking and pursue innovative solutions. Queue does not focus on either industry news or the latest "solutions." Rather, Queue takes a critical look at current and emerging technologies, highlighting problems that are likely to arise and posing questions that software engineers should be thinking about."</p>
          </blockquote>
          <p><strong>Update 6/9:</strong> The <a href="http://euw.leagueoflegends.com/" rel="nofollow external" class="bo">League of Legends</a> reports that their <a href="http://euw.leagueoflegends.com/news/league-legends-account-security-alert" rel="nofollow external" class="bo">password database was compromised</a>.  It’s not clear how they were storing the passwords.</p></div>
      ]]>
    </Body>
    <Summary>Coulda, Woulda, Shoulda.   If you have a LinkedIn account, you probably noticed the news that 6.5 million of their passwords were leaked. While the passwords were encrypted, it's still a major...</Summary>
    <Website>http://www.csee.umbc.edu/2012/06/how-linkedin-should-have-protected-your-password/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/15239/guest@my.umbc.edu/5a3db1abd4276ea2a64e2486de743e18/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>7</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 08 Jun 2012 09:20:24 -0400</PostedAt>
    <EditAt>Fri, 08 Jun 2012 09:20:24 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="15131" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/15131">
  <Title>Flame spy malware infiltrating Middle East computers</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="//www.csee.umbc.edu/wp-content/uploads/2012/05/flame_Lua_code.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>Russia-based anti-virus firm Kaspersky Labs has <a href="http://bit.ly/Knf9Vg" rel="nofollow external" class="bo">described</a> a new cyber attack toolkit dubbed Flame (Worm.Win32.Flame) which they describe as "what might be the most sophisticated cyber weapon yet." Their analysis suggests that Flame is a state-supported effort rather than one created by hacktivists or cybercriminals.</p>
    <blockquote><p>"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar 'super-weapons' currently deployed in the Middle East by unknown perpetrators. Flame can easily be described as one of the most complex threats ever discovered. It’s big and incredibly sophisticated. It pretty much redefines the notion of cyberwar and cyberespionage."</p></blockquote>
    <p>Flame appears to be designed "to systematically collect information on the operations of certain nation states in the Middle East, including Iran, Lebanon, Syria, Israel and so on." Initial infection can be from an infected USB drive, spear phishing or an infected web site. Here’s a map of the top seven affected countries.</p>
    <img src="//www.securelist.com/en/images/pictures/klblog/208193524.png" style="max-width: 100%; height: auto;">
    <p>More information is available in articles on Wired (<a href="http://www.wired.com/threatlevel/2012/05/flame/" rel="nofollow external" class="bo">Meet ‘Flame’, The Massive Spy Malware Infiltrating Iranian Computers</a>) and the BBC (<a rel="nofollow external" class="bo">Flame: Massive cyber-attack discovered, researchers say</a>).</p></div>
]]>
  </Body>
  <Summary>Russia-based anti-virus firm Kaspersky Labs has described a new cyber attack toolkit dubbed Flame (Worm.Win32.Flame) which they describe as "what might be the most sophisticated cyber weapon yet."...</Summary>
  <Website>http://www.csee.umbc.edu/2012/05/flame-spy-malware-infiltrating-middle-east-computers/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/15131/guest@my.umbc.edu/f064428172794bed0cbe3b259aa07553/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>8</PawCount>
  <CommentCount>5</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 28 May 2012 11:26:56 -0400</PostedAt>
  <EditAt>Mon, 28 May 2012 11:26:56 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="20778" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/20778">
  <Title>Privacy Engineering</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/cyberspot2l.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>We've starting to see advertisements for a new kind of position: <strong>privacy engineer</strong>.</p>
    <p>If you've seen the classic movie, <a href="http://www.imdb.com/title/tt0061722/" rel="nofollow external" class="bo"> The Graduate</a>, you'll remember the conversation that recent college graduate Benjamin Braddock has with a friend of his father, who says <em>"I just want to say one word to you. Just one word. … Are you listening? … Plastics."</em>. Today, 45 years later, that one word might be <em>Privacy</em>.</p>
    <p>Our lives are increasingly being lived online through social media systems, cloud based services, smart phones and other ubiquitous computing and sensing devices. Your smart phone, it's common to hear, knows more about you than your spouse or Mom. Data about us is being collected minute by minute, aggregated, integrated, analyzed, bought and sold.  At the same time, we have develped powerful new datamining and machine learning techniques that, together with parallel computing, can  extract surprising amounts of information and knowledge from the data. </p>
    <p>This data can be put to good uses, such as providing you with better services, but can also result in a loss of privacy. Businesses and other organizations want to avoid a backlash in which they lose customers concerned about their privacy. We've seen recent ads for privacy engineers, such as these from <a href="http://jobs.apple.com/index.ajs?BID=1&amp;method=mExternal.showJob&amp;RID=106587" rel="nofollow external" class="bo">Apple</a> , <a href="http://www.google.com/intl/en/jobs/uslocations/mountain-view/engops/security/privacy-engineer-mountain-view/" rel="nofollow external" class="bo">Google</a> and <a href="http://www.intel.com/jobs/jobsearch/index.htm?job=614183" rel="nofollow external" class="bo">Intel</a>. This is just a sample, many more exist, although the job title may be different.</p>
    <p>The job of a privacy engineer doesn't yet have a well defined consensus description, but the focus is on designing an organization's information privacy policy and helping to ensure that it is accurately described and enforced.  High level tasks include (i) protecting data from unauthorized access, use or disclosure (ii) providing users with appropriate tools to both understand and control what information is collected and how it is shared and used; and (iii) recognizing how the data can be usefully mined without revealing private information.</p>
    <p>What courses can a UMBC undergraduate take to prepare for positions like these? After getting a good grounding in the required computer science or computer engineering courses, undergrads can take classes in the fundamentals of security (CMSC 426 and CMSC 487), information assurance (CMSC 444), and cryptography (CMSC 443), take a course in databases (CMSC 461),  datamining and machine learning (CMSC 478) and/or visualization (CMSC 436), and perhaps mobile computing (CMSC 628). Interested students should also look for special topics course, like <a href="http://www.csee.umbc.edu/wp-content/uploads/2011/11/Joshi-491.pdf" rel="nofollow external" class="bo">Security and Privacy in a Mobile Social World</a> which is being offered this semester.  We also have several research labs that work in privacy-related areas, including the <a href="http://www.cisa.umbc.edu/" rel="nofollow external" class="bo">Cyber Defense</a>, <a href="http://www.coral-lab.org/" rel="nofollow external" class="bo">Coral</a>, E<a href="http://research.ebiquity.org/" rel="nofollow external" class="bo">biquity</a>, <a href="http://www.cs.umbc.edu/~hillol/Kargupta/diadic.html" rel="nofollow external" class="bo">Diadic</a> and <a href="http://maple.cs.umbc.edu/" rel="nofollow external" class="bo">Maple</a> labs.</p>
    <p> </p></div>
]]>
  </Body>
  <Summary>We've starting to see advertisements for a new kind of position: privacy engineer.   If you've seen the classic movie,  The Graduate, you'll remember the conversation that recent college graduate...</Summary>
  <Website>http://www.csee.umbc.edu/2012/04/privacy-engineering/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/20778/guest@my.umbc.edu/fbbbc7b1c24cc3b399ea2b5f387f8643/api/pixel</TrackingUrl>
  <Tag>big-data</Tag>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>datamining</Tag>
  <Tag>jobs</Tag>
  <Tag>news</Tag>
  <Tag>privacy</Tag>
  <Tag>research</Tag>
  <Tag>security</Tag>
  <Tag>students</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 14 Apr 2012 13:40:58 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="13700" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/13700">
  <Title>Privacy Engineering</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/cyberspot2l.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>We've starting to see advertisements for a new kind of position: <strong>privacy engineer</strong>.</p>
    <p>If you've seen the classic movie, <a href="http://www.imdb.com/title/tt0061722/" rel="nofollow external" class="bo"> The Graduate</a>, you'll remember the conversation that recent college graduate Benjamin Braddock has with a friend of his father, who says <em>"I just want to say one word to you. Just one word. … Are you listening? … Plastics."</em>. Today, 45 years later, that one word might be <em>Privacy</em>.</p>
    <p>Our lives are increasingly being lived online through social media systems, cloud based services, smart phones and other ubiquitous computing and sensing devices. Your smart phone, it's common to hear, knows more about you than your spouse or Mom. Data about us is being collected minute by minute, aggregated, integrated, analyzed, bought and sold.</p>
    <p>This data can be put to good uses, such as providing you with better services, but can also result in a loss of privacy. Businesses and other organizations want to avoid a backlash in which they loose customers concerned about their privacy. We've seen recent ads for privacy engineers, such as these from <a href="http://jobs.apple.com/index.ajs?BID=1&amp;method=mExternal.showJob&amp;RID=106587" rel="nofollow external" class="bo">Apple</a> , <a href="http://www.google.com/intl/en/jobs/uslocations/mountain-view/engops/security/privacy-engineer-mountain-view/" rel="nofollow external" class="bo">Google</a> and <a href="http://www.intel.com/jobs/jobsearch/index.htm?job=614183" rel="nofollow external" class="bo">Intel</a>. This is just a sample, many more exist, although the job title may be different.</p>
    <p>What courses can a UMBC undergraduate take to prepare for positions like these? After getting a good grounding in the required computer science or computer engineering courses, undergrads can take classes in the fundamentals of security (CMSC 426 and CMSC 487), information assurance (CMSC 444), and cryptography (CMSC 443), take a course in datamining and machine learning (CMSC 478) and/or visualization (CMSC 436), and perhaps mobile computing (CMSC 628). Interested students should also look for special topics course, like <a href="http://www.csee.umbc.edu/wp-content/uploads/2011/11/Joshi-491.pdf" rel="nofollow external" class="bo">Security and Privacy in a Mobile Social World</a> which is being offered this semester.</p></div>
]]>
  </Body>
  <Summary>We've starting to see advertisements for a new kind of position: privacy engineer.   If you've seen the classic movie,  The Graduate, you'll remember the conversation that recent college graduate...</Summary>
  <Website>http://www.csee.umbc.edu/2012/04/privacy-engineering/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/13700/guest@my.umbc.edu/01020d2ef594d97166979861804ce6b6/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>jobs</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 14 Apr 2012 13:40:58 -0400</PostedAt>
  <EditAt>Sat, 14 Apr 2012 13:40:58 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="13706" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/13706">
  <Title>Privacy Engineering</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/cyberspot2l.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p>We've starting to see advertisements for a new kind of position: <strong>privacy engineer</strong>.</p>
    <p>If you've seen the classic movie, <a href="http://www.imdb.com/title/tt0061722/" rel="nofollow external" class="bo"> The Graduate</a>, you'll remember the conversation that recent college graduate Benjamin Braddock has with a friend of his father, who says <em>"I just want to say one word to you. Just one word. … Are you listening? … Plastics."</em>. Today, 45 years later, that one word might be <em>Privacy</em>.</p>
    <p>Our lives are increasingly being lived online through social media systems, cloud based services, smart phones and other ubiquitous computing and sensing devices. Your smart phone, it's common to hear, knows more about you than your spouse or Mom. Data about us is being collected minute by minute, aggregated, integrated, analyzed, bought and sold.  At the same time, we have develped powerful new datamining and machine learning techniques that, together with parallel computing, can  extract surprising amounts of information and knowledge from the data. </p>
    <p>This data can be put to good uses, such as providing you with better services, but can also result in a loss of privacy. Businesses and other organizations want to avoid a backlash in which they lose customers concerned about their privacy. We've seen recent ads for privacy engineers, such as these from <a href="http://jobs.apple.com/index.ajs?BID=1&amp;method=mExternal.showJob&amp;RID=106587" rel="nofollow external" class="bo">Apple</a> , <a href="http://www.google.com/intl/en/jobs/uslocations/mountain-view/engops/security/privacy-engineer-mountain-view/" rel="nofollow external" class="bo">Google</a> and <a href="http://www.intel.com/jobs/jobsearch/index.htm?job=614183" rel="nofollow external" class="bo">Intel</a>. This is just a sample, many more exist, although the job title may be different.</p>
    <p>The job of a privacy engineer doesn't yet have a well defined consensus description, but the focus is on designing an organization's information privacy policy and helping to ensure that it is accurately described and enforced.  High level tasks include (i) protecting data from unauthorized access, use or disclosure (ii) providing users with appropriate tools to both understand and control what information is collected and how it is shared and used; and (iii) recognizing how the data can be usefully mined without revealing private information.</p>
    <p>What courses can a UMBC undergraduate take to prepare for positions like these? After getting a good grounding in the required computer science or computer engineering courses, undergrads can take classes in the fundamentals of security (CMSC 426 and CMSC 487), information assurance (CMSC 444), and cryptography (CMSC 443), take a course in databases (CMSC 461),  datamining and machine learning (CMSC 478) and/or visualization (CMSC 436), and perhaps mobile computing (CMSC 628). Interested students should also look for special topics course, like <a href="http://www.csee.umbc.edu/wp-content/uploads/2011/11/Joshi-491.pdf" rel="nofollow external" class="bo">Security and Privacy in a Mobile Social World</a> which is being offered this semester.  We also have several research labs that work in privacy-related areas, including the <a href="http://www.cisa.umbc.edu/" rel="nofollow external" class="bo">Cyber Defense</a>, <a href="http://www.coral-lab.org/" rel="nofollow external" class="bo">Coral</a>, E<a href="http://research.ebiquity.org/" rel="nofollow external" class="bo">biquity</a>, <a href="http://www.cs.umbc.edu/~hillol/Kargupta/diadic.html" rel="nofollow external" class="bo">Diadic</a> and <a href="http://maple.cs.umbc.edu/" rel="nofollow external" class="bo">Maple</a> labs.</p>
    <p> </p></div>
]]>
  </Body>
  <Summary>We've starting to see advertisements for a new kind of position: privacy engineer.   If you've seen the classic movie,  The Graduate, you'll remember the conversation that recent college graduate...</Summary>
  <Website>http://www.csee.umbc.edu/2012/04/privacy-engineering/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/13706/guest@my.umbc.edu/8bd82e808edc13725952fd870a1cc349/api/pixel</TrackingUrl>
  <Tag>big-data</Tag>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>datamining</Tag>
  <Tag>jobs</Tag>
  <Tag>news</Tag>
  <Tag>privacy</Tag>
  <Tag>research</Tag>
  <Tag>security</Tag>
  <Tag>students</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 14 Apr 2012 13:40:58 -0400</PostedAt>
  <EditAt>Sat, 14 Apr 2012 13:40:58 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="13066" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/13066">
    <Title>UMBC Cyberdawgs are recruiting</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/093011-cyber-defense-800.jpg" width="700" style="max-width: 100%; height: auto;"></p>
          <p><a href="http://umbccd.umbc.edu" rel="nofollow external" class="bo">UMBC's Cyber Defense Team</a> is looking for new members. This semester the team competed in the <a href="http://www.nationalccdc.org/" rel="nofollow external" class="bo">Collegiate Cyber Defense Championship</a>. In this competition, each team defended a mock corporate network against a horde of professional hackers in a fast-paced, real-time event over the course of two days. These competitions are a great way to network with government agencies and key companies in the security industry.</p>
          <p>The UMBC Cyber Defense Team provides a great opportunity to gain practical, hands-on experience in information security, intrusion detection, cybersecurity, and network security. The team practices both penetration and defense of isolated networks similar to real business environments. The group meets at 7:00pm on Mondays in ITE 367 and will have special events that will be announced also. No experience is required, but you should be motivated to learn about computer networks and systems security.</p>
          <p>You can find additional information and how to join our mailing list at the <a href="http://umbccd.umbc.edu" rel="nofollow external" class="bo">UMBC Cyberdawgs website</a>. Contact Marc Warfield (<em>marc9 at umbc.edu</em>) for more information.</p></div>
      ]]>
    </Body>
    <Summary>UMBC's Cyber Defense Team is looking for new members. This semester the team competed in the Collegiate Cyber Defense Championship. In this competition, each team defended a mock corporate network...</Summary>
    <Website>http://www.csee.umbc.edu/2012/03/umbc-cyberdawgs-are-recruiting/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/13066/guest@my.umbc.edu/5040a98ab0d772fcc6690cda6ffc6f6a/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>students</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>9</PawCount>
    <CommentCount>1</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 19 Mar 2012 11:51:09 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="13056" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/13056">
  <Title>talk: Securing Cyber-Physical Systems, 3/26</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p> </p>
    <p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/03/Smart-Grid-Technologies.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span><strong>Securing Cyber-Physical Systems</strong></span></p>
    <p><span>Alvaro Cardenas<br>
    	Fujitsu Laboratories of America</span></p>
    <p><span>1:00pm Monday 26 March 2012, ITE 325b, UMBC</span></p>
    <p>Our critical infrastructure systems are being modernized with information and communication technologies to face the operational requirements and efficiency challenges of the 21st century. The <a href="http://en.wikipedia.org/wiki/Smart_grid" rel="nofollow external" class="bo">smart grid</a> in particular, will introduce millions of new intelligent components to the electric grid, buildings, and homes within the next decade. While this modernization will bring many operational benefits to infrastructure systems, it will also introduce new vulnerabilities, a larger attack surface, and raise privacy concerns.</p>
    <p>This presentation will be divided in three parts. The first part of the talk will cover the unique and fundamentally new challenges and solutions required for securing <a href="http://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">cyber-physical systems</a>. The second part of the talk will focus on new mechanisms for securing cyber-physical systems. The final part of the talk will cover my other research interests in intrusion detection and future plans for big-data security.</p>
    <p>Alvaro A. Cárdenas is a research staff engineer at Fujitsu Laboratories of America. Prior to this he was a postdoctoral fellow at the University of California, Berkeley working in securing critical infrastructure systems. His research focuses on network security, the smart grid and other cyber-physical systems, <a href="http://en.wikipedia.org/wiki/Intrusion_detection_system" rel="nofollow external" class="bo">intrusion detection</a> and big data security. He has received numerous awards for his research including a best paper award from the U.S. Army Research Office, a best presentation award from the IEEE, a fellowship from the University of Maryland, and a Distinguished Assistantship from the Institute of Systems Research. He has also been an invited visiting professor at the University of Cagliari. Alvaro holds M.S. and Ph.D. degrees from the University of Maryland, College Park, and a B.S. from Universidad de los Andes.</p>
    <p>See <a href="http://csee.umbc.edu/talks" rel="nofollow external" class="bo">http://csee.umbc.edu/talks</a> for more information</p></div>
]]>
  </Body>
  <Summary>       Securing Cyber-Physical Systems   Alvaro Cardenas   Fujitsu Laboratories of America   1:00pm Monday 26 March 2012, ITE 325b, UMBC   Our critical infrastructure systems are being modernized...</Summary>
  <Website>http://www.csee.umbc.edu/2012/03/talk-securing-cyber-physical-systems-326/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/13056/guest@my.umbc.edu/57fa7e3f0d89a046405e689b1e186e8b/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 18 Mar 2012 20:08:14 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="12874" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/12874">
  <Title>talk: Self-sustainable Cyber-physical System Design</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><img height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/02/smart-grid-doe-illustration.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><strong><span>Self-sustainable Cyber-physical System Design</span></strong></p>
    <p><span>Dr. Nilanjan Banerjee<br>
    	University of Arkansas Fayetteville</span></p>
    <p><span>1:00pm Tuesday 13 March 2012, ITE 325b UMBC</span></p>
    <p>Renewable energy can enable diverse self-sustainable <a href="http://cyber-physical%20systems" rel="nofollow external" class="bo">cyber-physical systems</a> with applications ranging from healthcare to off-grid home energy management. However, there are several challenges that need to be addressed before such systems can be realized. For instance, how do we balance the small and often variable energy budgets imposed by renewables with system functionality? How can we design sensitive physical sensors and efficient harvesting circuits for mW energy sources such as sound and indoor light? For systems such as off-grid homes that interact with humans, how do we balance demand and supply while being cognizant to usability needs?</p>
    <p>In this talk, I will present techniques that address these challenges. Specifically, I will propose a Hierarchical Power Management paradigm that combines platforms with varied energy needs to balance energy consumption and functionality, the design of an efficient harvester for sound scavenging, and sensitive ECG sensors. I will also present a measurement study that reveals the energy management challenges faced by off-grid home residents. Finally, I will conclude with the design of a solar replayer platform that allows immense flexibility in evaluating solar panel driven systems, and works for a wide range of panels.</p>
    <p><a href="http://bit.ly/NilanB" rel="nofollow external" class="bo">Nilanjan Banerjee</a> is an Assistant Professor in the department of Computer Science and Computer Engineering at University of Arkansas Fayetteville. He graduated with a M.S. and a Ph.D. from the University of Massachusetts at Amherst in 2009 and a BTech. (Hons.) from IIT Kharagpur in 2004. He has won the Yahoo! Outstanding dissertation award at UMass, a best undergraduate thesis award at IIT Kharagpur, and an Outstanding Researcher award at University of Arkansas. He is a 2011 NSF Career awardee and has won three other NSF awards (including the NSF I-Corp grant). His research interests span renewable energy driven systems, healthcare systems, and mobile systems.</p>
    <p>Host: Anupam Joshi<br>
    	See <a href="http://csee.umbc.edu/talks" rel="nofollow external" class="bo">http://csee.umbc.edu/talks</a> for more information</p></div>
]]>
  </Body>
  <Summary>Self-sustainable Cyber-physical System Design   Dr. Nilanjan Banerjee   University of Arkansas Fayetteville   1:00pm Tuesday 13 March 2012, ITE 325b UMBC   Renewable energy can enable diverse...</Summary>
  <Website>http://www.csee.umbc.edu/2012/03/talk-self-sustainable-cyber-physical-system-design/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/12874/guest@my.umbc.edu/649502cf0ae91475c5e9a7f9d4e7c4e0/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 10 Mar 2012 00:33:07 -0500</PostedAt>
  <EditAt>Sat, 10 Mar 2012 00:33:07 -0500</EditAt>
</NewsItem>
</News>
