DAISY Data Analysis and Information SecuritY Lab

Size: px
Start display at page:

Download "DAISY Data Analysis and Information SecuritY Lab"

Transcription

1 DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis and Information Security Lab Graduate Director of Networked Information Systems (NIS) Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ, USA Web: personal.stevens.edu/~ychen6

2 Research Interests Cyber security and privacy Secure localization systems; privacy in Location Based Services (LBS) Security in mobile cloud computing, smartphone privacy Wireless security: identity-based attacks, anti-jamming, intrusion detection Security in smart grid and cognitive radio networks Mobile healthcare and social networks Wellbeing monitoring; smart vaccine delivery User authentication Activity recognition Wireless localization and context-aware sensing Wireless localization algorithms & testbeds (using mobile phone, sensor, RFID) Personnel and asset monitoring and tracking Smartphone enabled mobile social networks Mobile Computing and vehicular applications Detect driver phone use to reduce driver distraction caused by cell phone usage Exploit cell phone signal strength to perform vehicular speed estimation 2

3 Data Analysis and Information Security Lab (DAISY): Funding National Science Foundation, Google Research, Department of Defense (DoD), Army Research Office, and Air Force Research Labs Collaborators Industry: AT&T, IBM T. J. Watson Research Center, InfoBeyond. Academia: Columbia University, Rutgers University, Robert Wood Medical School, Lehigh University, University of South Carolina. Students Postdoc researchers, Ph.D., master and undergraduate students 3

4 Publications and Awards Book: Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, Securing Emerging Wireless Systems, ISBN: ,Springer, Book chapters: Jie Yang, Yingying Chen, Richard P. Martin, Wade Trappe and Marco Gruteser, "On the Performance of Wireless Indoor Localization Using Received Signal Strength", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 12, Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, "Impact of Anchor Placement and Anchor Selection on Localization Accuracy", Position Location - Theory, Practice and Advances: A Handbook for Engineers and Academics, Seyed A. (Reza) Zekavat, Mike Buehrer (eds.), Wiley-IEEE, chapter 13, Yingying Chen, Jie Yang, Wade Trappe and Richard P. Martin, "Defending against Identity- Based Attacks in Wireless Networks", Securing Cyber-Physical Infrastructures: Foundations and Challenges, Sajal Das, Krishna Kant and Nan Zhang (eds.), chapter 4, Published over 80 journal articles and referred conference papers. National Science Foundation CAREER Award Google Faculty Research Award IEEE Outstanding Contribution Award from IEEE New Jersey Coast Section, 2005, 2006, 2007, 2008 and Best Paper Award of the ACM International Conference on Mobile Computing and Networking (ACM MobiCom)

5 Talk Outline Introduction and Motivation Framework Overview Disease Propagation Model Community and Kernel Structure Extraction Vaccine and Alert Messages Distribution Simulation Evaluation Conclusion 5

6 Introduction and Motivation Rapid deployment of sensing technology in mobile phones. The collected sensing data can be used for supporting a broad range of applications: monitoring/tracking, first responder and military applications. Few studies used mobile phone-based sensor data to address healthcare related problem. 6

7 Framework Overview Main components Disease propagation model. Community and kernel structure extraction. Vaccine and alert messages distribution. 7

8 Disease Propagation Model Four states are used grounded on the standard epidemic SIR model: Susceptible without alert; Susceptible with alert; Infective; Immunized; 8

9 Community and Kernel Structure Extraction Main components: Flow overview Dividing encounter events into multiple trace to construct contact graph and extract communities and kernel structures. Merging the extracted communities and kernel structures with existing community and kernel structures. 9

10 Mobile Device Trace Segmentation Each entry of traces includes the starting and ending time of the contact as well as IDs of the mobile devices. Assume that we have D time windows: [ T, T ],[ T, T ],...,[ T, T ] D- 1 D Divide the contact trace into multiple trace pieces according to these time windows. 10

11 Construct Contact Graphs Contact graph G=(V,E) which consists of a vertex set V and an edge set E. Each vertex denotes a person and each edge denotes two persons encounter for at least W times. We choose W w 1 for community and for kernel structure with w2>. w1 = W = w2 11

12 Community Extraction and Merging A i j Communities are extracted from contact graph by hierarchical clustering and modularity Q in time window i: Merging the communities using the community merge operation for two communities if they satisfy: 12

13 Vaccine and Alert Message Distribution Two types of messages received by users: Vaccination messages: a user should go to obtain a vaccine shot; Alert Messages: a user should take precautions as directed. The kernel structures are considered first: The top K users are selected for vaccination or alert messages; The weight of each person reflects the priority; V k 13

14 Simulation Evaluation Traces collected from smart phones: MIT traces (97 participants, 20 days) Implemented our framework in a home-grown simulator; Compare with existing techniques: Random Distribution method: server randomly chooses the users to receive the vaccination and alert messages. Encounter-based method: vaccination and alert messages are sent if sick person encounters with a susceptible person. Simulation setup: Extensive experiments on MIT trace by varying different parameters in our epidemiology infection model. 14

15 Simulation Results: Ratio of Infected Persons (1) Ratio of infected person Versus Different recovery cycle Our proposed method achieves a lower infection ratio than Random Distribution and Encounter-based methods for each recovery cycle. 15

16 Simulation Results: Ratio of Infected Persons (2) Our proposed method achieves a lower final infection ratio than other methods. 16

17 Conclusion Explored the design of a mobile phone enabled community based disease propagation rate reduction framework for the healthcare domain. Developed an online algorithm for identifying dynamic communities of different relationship levels. Designed a community-based framework to make decisions on the alert messages and vaccine shot distribution. Simulation studies show our community based disease control scheme results in lower final infection ratio than existing techniques 17

18 Thanks and Questions? 18

Privacy in Sensor Nets

Privacy in Sensor Nets Privacy in Sensor Nets Wade Trappe Yanyong Zhang Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Brief Update on the Security Group and then PARIS Motivation Set the

More information

Call for Papers for Ad-hoc and Sensor Networking Symposium

Call for Papers for Ad-hoc and Sensor Networking Symposium Call for Papers for Ad-hoc and Sensor Networking Symposium Scope and Motivation: An ad hoc network is a system of wireless nodes dynamically self-organizing in arbitrary and temporary network topologies.

More information

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING MASTER OF SCIENCE DOCTORAL DEGREE GRADUATE CERTIFICATES STEVENS.EDU/GRAD-ECC MASTER OF SCIENCE IN Enterprise and Cloud Computing Enterprise and cloud

More information

Wenyuan Xu Cell Phone: +1-(803)

Wenyuan Xu  Cell Phone: +1-(803) Wenyuan Xu wyxu@cse.sc.edu http://www.cse.sc.edu/~wyxu Cell Phone: +1-(803)-622-0926 Department of Computer Science and Engineering University of South Carolina Mailing address: 315 Main St. #3A61, Columbia,

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

Social Closeness Based Clone Attack Detection for Mobile Healthcare System

Social Closeness Based Clone Attack Detection for Mobile Healthcare System Social Closeness Based Clone Attack Detection for Mobile Healthcare System Yanzhi Ren, Yingying Chen, Mooi Choo Chuah Dept. of ECE, Stevens Institute of Technology Dept. of CSE, Lehigh University Castle

More information

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015

NSF Transition to Practice Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 NSF Transition to Practice Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure November, 2015 Networking and IT Research and Development (NITRD) FY16 Supplement

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

Funded Project Final Survey Report

Funded Project Final Survey Report Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a

More information

Tracking driver actions and guiding phone usage for safer driving. Hongyu Li Jan 25, 2018

Tracking driver actions and guiding phone usage for safer driving. Hongyu Li Jan 25, 2018 Tracking driver actions and guiding phone usage for safer driving Hongyu Li Jan 25, 2018 1 Smart devices risks and opportunities Phone in use 14% Other distractions 86% Distraction-Affected Fatalities

More information

CSC8260: Wireless Networking and Cyber-Physical Systems. Hongwei Zhang

CSC8260: Wireless Networking and Cyber-Physical Systems. Hongwei Zhang CSC8260: Wireless Networking and Cyber-Physical Systems Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Build up your background in wireless cyber-physical systems (WCPS) Wireless

More information

QUALCOMM: Company Overview and Opportunities for Students and Collaboration. Junyi Li Vice President of Technology QUALCOMM

QUALCOMM: Company Overview and Opportunities for Students and Collaboration. Junyi Li Vice President of Technology QUALCOMM QUALCOMM: Company Overview and Opportunities for Students and Collaboration Junyi Li Vice President of Technology QUALCOMM April 14, 2008 Outline 1. General background on Qualcomm 2. Research and Development

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology 1 Speaker

More information

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Computer Science and Engineering Ira A. Fulton Schools of Engineering DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION

More information

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Zhuozhao Li and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA Kang Chen

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

Education. Professional Experience. Awards and Honors

Education. Professional Experience. Awards and Honors Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854

More information

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours 66 Theory Hours 38 Laboratory Hours COURSE OVERVIEW: After completing this course, students will

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Social Closeness Based Clone Attack Detection for Mobile Healthcare System

Social Closeness Based Clone Attack Detection for Mobile Healthcare System Social Closeness Based Clone Attack Detection for Mobile Healthcare System Yanzhi Ren, Yingying Chen, Mooi Choo Chuah Dept. of ECE, Stevens Institute of Technology Dept. of CSE, Lehigh University Castle

More information

Collecting Public Health Data at a Global Scale. D. Cenk Erdil, PhD Marist College

Collecting Public Health Data at a Global Scale. D. Cenk Erdil, PhD Marist College Collecting Public Health Data at a Global Scale D. Cenk Erdil, PhD Marist College DataCloud 2015 November 15, 2015 Outline Background A Public Health CPS Data Collection Marist MAgIC Summary Q&A 2 Background

More information

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018 Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Voice Recognition Based Smart Home Control System

Voice Recognition Based Smart Home Control System International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 4 [April 2017] PP: 01-05 Voice Recognition Based Smart Home Control System Awadalla Taifour Ali 1, Eisa

More information

AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey

AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey Texas Southern University Texas State University, San

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

Department of Computer Science

Department of Computer Science College of Science and Mathematics Department of Computer Science Dr. Vasil Hnatyshin Department Head Advising brochures also available online at: https://rucsm.org/cs/advising/brochures/ Fall 2017 Computer

More information

Bridging The Gap Between Industry And Academia

Bridging The Gap Between Industry And Academia Bridging The Gap Between Industry And Academia 14 th Annual Security & Compliance Summit Anaheim, CA Dilhan N Rodrigo Managing Director-Smart Grid Information Trust Institute/CREDC University of Illinois

More information

Networks And Grids: Technology And Theory (Information Technology: Transmission, Processing And Storage) By Thomas G. Robertazzi

Networks And Grids: Technology And Theory (Information Technology: Transmission, Processing And Storage) By Thomas G. Robertazzi Networks And Grids: Technology And Theory (Information Technology: Transmission, Processing And Storage) By Thomas G. Robertazzi If looking for the book by Thomas G. Robertazzi Networks and Grids: Technology

More information

NSF-RCN Workshop #2 Panel 2

NSF-RCN Workshop #2 Panel 2 NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

Ad Hoc Network Visualization

Ad Hoc Network Visualization Ad Hoc Network Visualization CMPSC 597G Module Name: Tactical Network Visualization with VisualCyberVAN with VisualCyberVAN Professor Patrick McDaniel Joshua Crafts Fall 2015 The Ontology of Network Security

More information

Media Kit. California Cybersecurity Institute

Media Kit. California Cybersecurity Institute Media Kit Fact Sheet Cybercrime A Growing Threat Cybercriminals are invisible enemies who jeopardize our nation s security in increasingly sophisticated and pervasive ways. According to the Government

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Malware Research at SMU. Tom Chen SMU

Malware Research at SMU. Tom Chen SMU Malware Research at SMU Tom Chen SMU tchen@engr.smu.edu www.engr.smu.edu/~tchen Outline About SMU and Me Virus Research Lab Early Worm Detection Epidemic Modeling New Research Interests TC/BT/11-5-04 SMU

More information

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

The Networking Lab in the School of Computing

The Networking Lab in the School of Computing The Networking Lab in the School of Computing There are no more /8 TCP/IP V4 Addresses!! WooHoo.I don t know what this means Don t worry Homer, the guys/girls in the Networking Lab will fix things!! Dr.

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

What makes a hot topic hot? An NSF Perspective

What makes a hot topic hot? An NSF Perspective What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance

More information

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Saint Petersburg Electrotechnical University LETI (ETU LETI) , Saint Petersburg, Russian FederationProfessoraPopova str. Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

More information

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director

More information

EMBEDDED MAJOR PROJECTS LIST

EMBEDDED MAJOR PROJECTS LIST CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse

More information

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS

ITT Technical Institute. NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS ITT Technical Institute NT2740 Advanced Networking Devices Onsite and Online Course SYLLABUS Credit hours: 3 Contact/Instructional hours: 40 (20 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s):

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS Narjes Nikzad Khasmakhi 1, Shahram

More information

RFID-based Location Tracking System Using a Peer-to-Peer Network Architecture

RFID-based Location Tracking System Using a Peer-to-Peer Network Architecture , March 12-14, 2014, Hong Kong RFID-based Location Tracking System Using a Peer-to-Peer Network Architecture Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung Abstract In recent years, the Global Positioning

More information

Challenges in Creating Ubiquitous Services with Mobile Sensing Systems

Challenges in Creating Ubiquitous Services with Mobile Sensing Systems Challenges in Creating Ubiquitous Services with Mobile Sensing Systems Hideyuki Tokuda Keio University hxt@sfc.keio.ac.jp http://www.ht.sfc.keio.ac.jp/~hxt 2003: Small Stories in 2008 A Love Triangle (2003)

More information

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Cyber Resilience: Developing a Shared Culture. Sponsor Guide Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

A Brief Introduction to CFINS

A Brief Introduction to CFINS A Brief Introduction to CFINS Center for Intelligent and Networked Systems (CFINS) Department of Automation Tsinghua University Beijing 100084, China 6/30/2016 1 Outline Mission People Professors Students

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

Introduction to wireless systems

Introduction to wireless systems Introduction to wireless systems Wireless Systems a.a. 2014/2015 Un. of Rome La Sapienza Chiara Petrioli Department of Computer Science University of Rome Sapienza Italy Who we are Prof.ssa Chiara Petrioli

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching

Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching Distributed Spatio-Temporal Social Community Detection Leveraging Template Matching Yanzhi Ren, Mooi Choo Chuah,JieYang, Yingying Chen Dept. of ECE, Stevens Institute of Technology Dept. of CSE, Lehigh

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Welcome to PI World Transmission & Distribution Industry Session

Welcome to PI World Transmission & Distribution Industry Session Welcome to PI World Transmission & Distribution Industry Session Kevin P Walsh Bill McEvoy OSIsoft Power and Utilities Team Kevin P Walsh Global T&D and Smart Grids William E. McEvoy - Global Distributed

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report Friday, April 25, 2014 Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report State s first big data industry status report finds

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

IEEE 5G Summit Lisbon

IEEE 5G Summit Lisbon IEEE 5G Summit Lisbon Protocols and Standardization Activities for 5G Lisbon, January 19, 2017 Periklis Chatzimisios CSSN Research Lab, Alexander TEI of Thessaloniki, Greece Department of Informatics Contents

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Air Force DATE: April 2013 COST ($ in Millions) # ## FY 2015 FY 2016 FY 2017 FY 2018 Program Element - 0.000 0.000 5.853-5.853 5.961 6.181 6.290 6.404

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Detecting and localizing multiple spoofing attackers in wireless network

Detecting and localizing multiple spoofing attackers in wireless network Detecting and localizing multiple spoofing attackers in wireless network Deepa Hurali III Semester, M-Tech, Dept of CSE KLS Gogte Institute of Technology Udhyambag, Belgaum, Karnataka, India Prof. Vidya

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs M.K. Shahzad, Member, IEEE, L. Nkenyereye, Member, IEEE, S. M. Riazul Islam, Member, IEEE 1 Authors' Affiliations

More information

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company) Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend

More information

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community Open Architectures in the Defense Intelligence Community By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center This blog post is co-authored by Eric Werner. In an era of sequestration

More information

Microsoft Corp., Redmond, WA, USA Jun-Sep Designed and implemented a new tool kit to diagnose distributed states of Microsoft Active Directory.

Microsoft Corp., Redmond, WA, USA Jun-Sep Designed and implemented a new tool kit to diagnose distributed states of Microsoft Active Directory. Tam N. Vu Department of Computer Science and Engineering Phone: (303) 315-0050 University of Colorado, Denver E-mail: tamvu@ucdenver.edu 1380 Lawrence Street, Denver, CO 80204 Homepage: cse.ucdenver.edu/~tamvu

More information

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1. Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN U.Kavitha 1 1 PG Student, Department of ECE, CK College of Engineering & Technology, Cuddalore, Tamil Nadu, India Abstract Wireless

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana!

2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana! 2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana! Mission Rapidly develop, test, and help commercialize next generation energy systems that are safe, reliable, and

More information

AIMS Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things

AIMS Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things AIMS 2017 Things in a Fog (TGIF): A Framework to Support Multidomain Research in the Internet of Things Dr Jim Martin School of Computing Clemson University (jmarty@clemson.edu) Talk Overview Setting the

More information

Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network

Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network Prashant.R.R IV Semester, M-Tech, Dept. of E&C BTLIT College, Bangalore Email: prr.sangu@gmail.com Mohammed Fayaz

More information