<?xml version="1.0"?>
<News hasArchived="false" page="120" pageCount="221" pageSize="10" timestamp="Wed, 13 May 2026 00:14:28 -0400" url="https://dev.my.umbc.edu/groups/ieee/posts.xml?mode=pawpularity&amp;page=120">
  <NewsItem contentIssues="false" id="43239" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43239">
  <Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43239/guest@my.umbc.edu/87f87f90205f40096757d5c3a1bd2d69/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43875" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43875">
  <Title>talk: Making Physical Inferences to Enhance Wireless Security, 1pm Tue 4/8</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h2>Making Physical Inferences to Enhance Wireless Security</h2>
    <h2>Prof. Jie Yang, Oakland University</h2>
    <h3>1:00pm Tuesday, 8 April 2014, ITE 325b</h3>
    <p>The ubiquity of wireless is redefining security challenges as the increasingly pervasive wireless networks make it easier to conduct attacks for new and rapidly evolving adversaries. There is an urgent need to seek security solutions that can be built into any wireless network stack to defend against attacks across the current heterogeneous mix of wireless technologies, which do not require extensive customization on wireless devices and cannot be undermined easily even when nodes are compromised. In particular, security solutions that are generic across all wireless technologies and can complement conventional security methods must be devised. My research efforts are centered around exploiting physical properties correlated with pervasive wireless environments to enhance wireless security and make inferences for context-aware applications. In this talk, I will present my research work in exploiting spatial correlation as a unique physical property inherited from any wireless device to address identity-based attacks including both spoofing and Sybil. These attacks are especially harmful as the claimed identity of a wireless device is often considered as an important first step in an adversary’s attempt to launch a variety of attacks in different network layers.</p>
    <p>Our proposed techniques address several challenges include (1) detecting identity-based attacks in challenging mobile environments, (2) determining the number of attackers, and (3) localizing multiple adversaries. I will also present our work in secret key generation for facilitating secure data communication in the increasing dynamic wireless environments. Our work addressed the problem of collaborative secret key extraction for a group of wireless devices without relying on a key distribution infrastructure. Moreover, in order to provide efficient secret key generation, we exploit fine-grained physical layer information, such as the channel state information made available from OFDM system, to improve the secret key generation rate and make the secret key extraction approach more practical.</p>
    <p><a href="http://www.google.com/url?q=http%3A%2F%2Fwww.secs.oakland.edu%2F~yang%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHxuFrI34tdAhyHwr47gmubwhtlJg" rel="nofollow external" class="bo">Jie Yang</a> received his Ph.D. degree in Computer Engineering from Stevens Institute of Technology in 2011. He is currently an assistant professor in the Department of Computer Science and Engineering at Oakland University. His research interests include cyber security and privacy, and mobile and pervasive computing, with an emphasis on network security, smartphone security and applications, security in cognitive radio and smart grid, location systems and vehicular applications. His research is supported by National Science Foundation and Army Research Office. He is the recipient of the Best Paper Runner-up Award from IEEE Conference on Communications and Network Security 2013 and the Best Paper Award from ACM MobiCom 2011. His research has received wide press coverage including MIT Technology Review, The Wall Street Journal, NPR, CNET News, and Yahoo News.</p>
    <p>Hosts: Nilanjan Banerjee and Tim Finin</p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Making Physical Inferences to Enhance Wireless Security   Prof. Jie Yang, Oakland University   1:00pm...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-making-physical-inferences-to-enhance-wireless-security-1pm-tue-48/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43875/guest@my.umbc.edu/6b45c2ce5bc2edd26083db829e539294/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 04 Apr 2014 16:10:46 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43189" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43189">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43189/guest@my.umbc.edu/e67499260bb6dace33b03af98994995a/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
  <EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43190" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43190">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=2014-cybersecurity-summer-courses</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43190/guest@my.umbc.edu/21d7ca3e416e25617fba05e5c436ec87/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
  <EditAt>Thu, 03 Apr 2014 14:39:22 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43863" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43863">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43863/guest@my.umbc.edu/3feff382e9f5d1f02922fd1e22ebce44/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43876" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43876">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43876/guest@my.umbc.edu/fdce6bd5a6da83d68f72a13ddd590e7b/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="57836" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/57836">
  <Title>2014 Cybersecurity Summer Courses</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2013/04/USGFall09-125.jpg" style="max-width: 100%; height: auto;"></p>
    <p>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.</p>
    <p>Each class will meet one or two days a week in the late afternoon or evening, depending on the length of the session where the course is offered.</p>
    <ul>
    <li>
    <strong>CYBR 620: Introduction to Cybersecurity </strong> (Parr)<br>
    T/TH 6-8:45PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014</li>
    <li>
    <strong>CYBR 691:  Special Topics in Cybersecurity: “Software Security” </strong>(Coman)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    Pre-Req: CYBR 620 or equivalent</li>
    </ul>
    <p>Offered to students enrolled at the Universities at Shady Grove campus ONLY</p>
    <ul>
    <li>
    <strong>CYBR 691: Special Topics in Cybersecurity: “Cybersecurity Risk Management”</strong> (Shariati)<br>
    M/W 7:10-9:40PM<br>
    Summer I (6 weeks) May 27th-July 3rd, 2014<br>
    PreReq: CYBR 620 and enrollment at the Universities at Shady Grove</li>
    </ul>
    <p>The deadline to <a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">apply</a> for Fall 2014 admission to the UMBC Graduate Cybersecurity Program is August 1, 2014.</p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Graduate Cybersecurity Program is offering the following courses over the Summer 2014 session.   Each class will meet one or two days a week in the late afternoon or evening, depending on...</Summary>
  <Website>https://www.csee.umbc.edu/2014/04/2014-cybersecurity-summer-courses/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/57836/guest@my.umbc.edu/62860cb72e73420344b7502faa3440d4/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>csee</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>fyi</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 03 Apr 2014 14:39:22 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43121" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43121">
    <Title>CSEE student Alex Nelson gets honorable mention in NSF fellowship program</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="An early prototype" src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/hand.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>Computer Engineering graduate student <a href="https://www.linkedin.com/in/alexanderhnelson" rel="nofollow external" class="bo">Alexander Nelson</a> received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing innovative cyber-physical systems that can dramatically improve a person’s standard of living in an impactful way. His current and past projects have involved emergency communications, assistive devices and home automation.</p>
          <p>His prior research in assistive devices has gained acceptance to the 2013 IEEE Sensors Conference and 2013 Real Time Systems Symposium and contributed to a Microsoft Software Engineering Innovation Foundation award. His current research gained acceptance to a Works-in-Progress session at the 2013 Real Time Systems Symposium. His research co-mentors are Professors <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> and <a href="http://www.csee.umbc.edu/people/faculty/ryan-robucci/" rel="nofollow external" class="bo">Ryan Robucci</a>.</p>
          <p>The NSF honorable mention designation is considered a significant national academic achievement and provides access to cyberinfrastructure resources through NSF’s <a href="http://www.xsede.org/" rel="nofollow external" class="bo">Extreme Science and Engineering Discovery Environment</a> (XSEDE) computing infrastruture. XSEDE is the most advanced, powerful, and robust collection of integrated advanced digital resources and services in the world. It is a single virtual system that scientists can use to interactively share computing resources, data, and expertise.</p>
          </div>
      ]]>
    </Body>
    <Summary>Computer Engineering graduate student Alexander Nelson received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing...</Summary>
    <Website>http://www.csee.umbc.edu/2014/04/csee-student-alex-nelson-gets-honorable-mention-in-nsf-fellowship-program/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=csee-student-alex-nelson-gets-honorable-mention-in-nsf-fellowship-program</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43121/guest@my.umbc.edu/1aa37d0eb07267a250572ad73fb8b7f4/api/pixel</TrackingUrl>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 02 Apr 2014 08:00:53 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="43877" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43877">
    <Title>CSEE student Alex Nelson gets honorable mention in NSF fellowship program</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img alt="An early prototype" src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/hand.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>Computer Engineering graduate student <a href="https://www.linkedin.com/in/alexanderhnelson" rel="nofollow external" class="bo">Alexander Nelson</a> received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing innovative cyber-physical systems that can dramatically improve a person’s standard of living in an impactful way. His current and past projects have involved emergency communications, assistive devices and home automation.</p>
          <p>His prior research in assistive devices has gained acceptance to the 2013 IEEE Sensors Conference and 2013 Real Time Systems Symposium and contributed to a Microsoft Software Engineering Innovation Foundation award. His current research gained acceptance to a Works-in-Progress session at the 2013 Real Time Systems Symposium. His research co-mentors are Professors <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> and <a href="http://www.csee.umbc.edu/people/faculty/ryan-robucci/" rel="nofollow external" class="bo">Ryan Robucci</a>.</p>
          <p>The NSF honorable mention designation is considered a significant national academic achievement and provides access to cyberinfrastructure resources through NSF’s <a href="http://www.xsede.org/" rel="nofollow external" class="bo">Extreme Science and Engineering Discovery Environment</a> (XSEDE) computing infrastruture. XSEDE is the most advanced, powerful, and robust collection of integrated advanced digital resources and services in the world. It is a single virtual system that scientists can use to interactively share computing resources, data, and expertise.</p>
          </div>
      ]]>
    </Body>
    <Summary>Computer Engineering graduate student Alexander Nelson received an honorable mention for the National Science Foundation (NSF) Graduate fellowship. Alex’s research is focused on developing...</Summary>
    <Website>http://www.csee.umbc.edu/2014/04/csee-student-alex-nelson-gets-honorable-mention-in-nsf-fellowship-program/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43877/guest@my.umbc.edu/0cb3f7127acd8880ee949fe172f2ca00/api/pixel</TrackingUrl>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 02 Apr 2014 08:00:53 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="43099" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43099">
  <Title>Summer research opportunity in Green Building Environments at UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/Screen-Shot-2014-04-01-at-4.34.27-PM.png" width="700" height="202" style="max-width: 100%; height: auto;"></h3>
    
    <h3>NSF REU 2014</h3>
    <h2>Research Experiences for Undergraduates<br>
    in Green Building Environments at UMBC</h2>
    <h3>May 28 – August 15, 2014</h3>
    <p>New emerging “smart plugs” embed a micro-controller and low-power communication device that allows you to monitor the power consumption of individual devices (e.g., microwave, coffee machine, laptop) plugged into power sockets, and communicate such power consumption information over a wireless network to a central monitoring station. Such devices could lead to substantial savings of energy &amp; money by enabling Internet-based monitoring &amp; real-time control of the behavior of individual appliances. This project will use real-life microcontroller kits (ACME Plugs from Moteware) &amp; real-life building measurement data to explore whether such measurement-based monitoring can be used to</p>
    <ul>
    <li>Develop Smart Circuit Breaker — i.e., to lessen the burden of the user of plugging each and every appliance/device in the building with a smart plug; we will investigate connecting multiple devices together with an individual smart plug/smart circuit breaker and design a smart circuit breaker using energy metering chip (ADE7753), AC/DC power supply, Microcontroller with radio (TI MSP430F16 and Cypress Powerline Communications (PLC) modem) and solid state AC relay (Sharp S216SE1) etc.</li>
    <li>Profile individual devices — i.e., use NILM (non-intrusive load monitoring) data analytics algorithm on the time-series of power consumption traces to infer the type of plugged-in device (e.g., distinguish between a laptop &amp; a coffeemaker), thereby building a dynamic catalog of the types &amp; number of devices connected by a consumer.</li>
    <li>Predict the power consumption of individual rooms — i.e., using the past history of the power consumption of individual devices to create predictive inferences of the usage patterns for individual devices (e.g., learn that the individual switches on a dehumidifier for ~3 hrs every Thu).</li>
    <li>Receive $4,500 stipend, free on-campus housing</li>
    <li>Access to university resources, Travel support to UMBC, Unique research experience</li>
    </ul>
    <p>Please send your CV (include any relevant experience) and unofficial transcript to Dr. Nirmalya Roy at Sorry, you need javascript to view this email address.  .</p>
    </div>
]]>
  </Body>
  <Summary>NSF REU 2014   Research Experiences for Undergraduates  in Green Building Environments at UMBC   May 28 – August 15, 2014   New emerging “smart plugs” embed a micro-controller and low-power...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/summer-research-opportunity-in-green-building-environments-at-umbc/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=summer-research-opportunity-in-green-building-environments-at-umbc</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43099/guest@my.umbc.edu/756e92190dca518abff1b2d3347a0e7b/api/pixel</TrackingUrl>
  <Tag>fyi</Tag>
  <Tag>jobs</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 01 Apr 2014 16:37:06 -0400</PostedAt>
  <EditAt>Tue, 01 Apr 2014 16:37:06 -0400</EditAt>
</NewsItem>
</News>
