AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey

Similar documents
Health Information Exchange. A Key Concept for Biosurveillance

Bachelor of Information Technology (Network Security)

Health Information Exchange. A Key Concept for Biosurveillance

Domestic Nuclear Detection Office (DNDO) DNDO Overview

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

The Visual Analytics Complex: A Collaboration Among National Laboratories, Universities, and Industry

Department of Homeland Security Science & Technology

Department of Homeland Security Updates

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

The Office of Infrastructure Protection

EMS BUSINESS INTELLIGENCE INFORMING NATIONAL PREPAREDNESS THE NATIONAL COLLABORATIVE FOR BIO-PREPAREDNESS

Behavioral and Social Sciences Research

National Biosurveillance Integration Center: Operations and Development

WELCOME TO A SILVER JACKETS WEBINAR ON:

Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

National Antimicrobial Resistance Surveillance

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

Leveraging public health s experience with information standards and health improvement

Big Data - Security with Privacy

SOUTH DAKOTA BOARD OF REGENTS. Budget and Finance ******************************************************************************

The National Network of Fusion Center: Where We Have Been and Where We are Going

Based on Big Data: Hype or Hallelujah? by Elena Baralis

Department of Homeland Security

Sharing of Information & Intelligence on the Importation & Transportation of Food

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Homeland Security Graduate Programs

Legal and Regulatory Developments for Privacy and Security

PIONEER TRAINING INSTITUTE

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

Smart Grid Security Illinois

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

Department of Homeland Security Science and Technology Directorate

Institutionalizing Homeland Security Education: The Penn State Experience

PIPELINE SECURITY An Overview of TSA Programs

Implementation Strategy for Cybersecurity Workshop ITU 2016

CALIFORNIA CYBERSECURITY TASK FORCE

Proposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar

Clemson HPC and Cloud Computing

Information Systems and Tech (IST)

Intelligence Led Policing: Enhancing Force Deployment in Law Enforcement and Counter-Terrorism Using Data & Visual Analytics

OVERVIEW OF SUBJECT REQUIREMENTS

Science & Technology Directorate: R&D Overview

Database and Knowledge-Base Systems: Data Mining. Martin Ester

DHS University Programs: Research, Education & Integration. From Science and Technology Security and Trust

ENGINEERING (ENGR) Engineering (ENGR) 1. ENGR 1352 Engineering Design with CAD for CHE

UCLA RESEARCH INFORMATICS STRATEGIC PLAN Taking Action June, 2013

Educator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification

!!!!!!! OWASP VETERANS TRAINING GRANT PROPOSAL BLACKSTONE VETERANS HIRING INITIATIVE: OWASP GRANT PROPOSAL

Data Processing at Scale (CSE 511)

Semi-Structured Data Management (CSE 511)

The Integrated Food Safety System. IFPTI AFDO Pre-Conference Workshop June 2, 2012 Providence RI.

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS)

DHS Systems Engineering Acquisition Challenges and Issues

Food Protection and Defense Institute

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

The 2018 (14th) International Conference on Data Science (ICDATA)

Cyber Management for Ports Results of Small Port Cyber Security Workshops

EDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014

Who is behind terrorist events?

Tina Ladabouche. GenCyber Program Manager

Homeland Security Perspective on Modeling and Simulation (M&S)

The National Collaborative for Bio-Preparedness

Recent Developments in Career and Technical Education. New York State Education Department November 2016

Deanship of Academic Development. Comprehensive eportfolio Strategy for KFU Dr. Kathryn Chang Barker Director, Department of Professional Development

COPPUL Digital Preservation Network: Update for ACCOLEDS. Corey Davis COPPUL DPN Manager

Navigating the ASTDD Website

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

Applications and Services November, 10, 2011

UNCLASSIFIED Developing the Canadian All-Hazards Symbology For Emergency Management

INTRODUCING RESILIENT LOS ANGELES

Views on the Framework for Improving Critical Infrastructure Cybersecurity

Business Continuity: How to Keep City Departments in Business after a Disaster

Bachelor of Science Information Studies School of Information Program Summary

2017 SPRING INTERNSHIP PROGRAM OPPORTUNITY

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Manatee County Government Administrative Center Commission Chambers, First Floor 9:00 a.m. - August 24, 2017

Track 1 // Collaboration & Partnerships

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Rutgers Master Gardener Program of Somerset County Graduating Class of 2019 POSITION DESCRIPTION

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

RESILIENT UTILITY COALITION OF SOUTH FLORIDA

Big Data Analytics: Research Needs. Ali Ghassemian

Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in

Region Snapshot Regions I and II

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)

Using Risk Analysis to Manage Terrorism Risk

The CISM Education Plan (updated August 2006)

Best Practices for Campus Security. January 26, 2017

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

Response to the Validation Panel for the DIT Foundation Programmes

The GenCyber Program. By Chris Ralph

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Department of Business Information Technology

Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture

State and Local Partners for a Clean and Green California

An Overview of Mobile Security

Transcription:

AT&T Labs Research Bell Labs/Lucent Technologies Princeton University Rensselaer Polytechnic Institute Rutgers, the State University of New Jersey Texas Southern University Texas State University, San Marcos

History 2006: The Center for Dynamic Data Analysis (DyDAn) is created and is named a Department of Homeland Security university center of excellence DyDAn is one of four DHS centers dealing with discrete science Other centers: Univ. of Illinois Urbana- Champaign, Univ. Southern Cal., U. Pittsburgh DyDAn is the coordinating discrete science center. Slide 2

What is Discrete Science Discrete Science deals with Patterns Arrangements Assignments Schedules Discrete Science Seeks patterns in large amounts of data Analyzes connections between entities such as people and groups Develops efficient ways to quickly spot changes in standard patterns Slide 3

Why DyDAn? Homeland Security requires inferences from massive flows of data, arriving continuously. Buried in data are: quickly changing patterns. DyDAn: is developing novel technologies to find patterns & relationships in dynamic, nonstationary, massive datasets. DyDAn: is producing pioneering educational programs to nurture the homeland security workforce of the future Slide 4

Why DyDAn? Much of DyDAn s work is relevant to port security problems: Data from container inspection Radiation portal monitoring data Algorithms for container inspection Optimal allocation of funds for protection of port infrastructure Risk assessment Slide 5

DyDAn Application Areas DyDAn methods are applicable to a wide variety of homeland security applications. Intelligence Analysis of Text Disease Event Detection Port of Entry Inspection Slide 6

DyDAn Application Areas DyDAn methods are applicable to a wide variety of homeland security applications. Author Identification Response to Natural Disasters Bioterrorism Sensor Location B-T sensor, Salt Lake City Olympics Slide 7

DyDAn Application Areas DyDAn methods are applicable to a wide variety of homeland security applications. Protection Against Invasive Species Customs and Border Protection Privacy-Preserving Data Sharing Slide 8

DyDAn Researchers Work On: Counter-terrorism Intelligence analysis Disease surveillance (natural/man-caused) Customs and border protection Law enforcement Data management in emergency situations Nuclear detection/sensors Image, audio, text, gait analysis Avian flu Containers for Inspection We hope to make DyDAn an informatics resource for the homeland security enterprise Slide 9

DyDAn Research Three research themes: Analysis of Large, Dynamic Multigraphs Continuous, Distributed Monitoring of Dynamic, Heterogeneous Data Applications to Real Homeland Security Problems Slide 10

DyDAn Research I: Analysis of Large, Dynamic Multigraphs Need to understand interactions between entities: people, objects, groups Interactions often modeled as graphs Linking nodes (entities) with edges (connections) Multiple relationships between entities suggests multigraphs Add new entities, new & changing connections suggests dynamic multigraphs Develop methods to represent, analyze, interrogate, & navigate dynamic multigraphs. Slide 11

DyDAn Research II: Continuous, Distributed Monitoring of Dynamic, Heterogeneous Data Need to understand massive amounts of data. Data inherently distributed (multiple sources) Data arrives rapidly continuously Seek anomalies, patterns, emerging events Run continuous queries to monitor incoming data stream. Data takes numerous forms; requires data mining methods that span the modalities. Slide 12

DyDAn Research III: Applied Work Builds on earlier work at Rutgers on Port security Monitoring message streams Locating bioterrorism sensors Syndromic surveillance Works with Coast Guard DNDO Port Authority of NY/NJ NJ Office of Homeland Security and Preparedness CDC Intelligence community Slide 13

DyDAn Research Portfolio I: Large Graphs Universal Information Graphs Adding Semantics to and Interconnecting Semantic Graphs Statistical and Graph-theoretical Approaches to Time-Varying Multigraphs Analyzing Large, Dynamic Multigraphs Arising from Blogs Slide 14

DyDAn Research Portfolio II: Monitoring of Dynamic, Heterogeneous Data Optimization and Learning Privacy Preserving Data Analysis Slide 15

DyDAnResearch Portfolio III: Some Applied Topics Uses of Entropy in Biosurveillance (with MSI s Howard and Morgan State) Enabling and Enhancing Crime Prevention and Analysis at the Port Authority of NY&NJ (with PANYNJ & PNNL & START) Algorithms for Container Inspection in Ports (sponsored by ONR, NSF) Sensor Management for Nuclear Detection (funded by Domestic Nuclear Detection Office) (collaborations with LANL, PNNL, Sandia) Slide 16

DyDAn Data Emphasis on publicly available data. Research on how to acquire, publish, analyze, store data in a private, secure way. Research on privacy-preserving data analysis. Director of Data Analysis works on all aspects of acquiring, sharing, publicizing analyzing data: privacy, legal, technical, etc. Slide 17

DyDAn Educational Programs We have initiated educational programs from K-12 to postgraduate Slide 18

Workshops: Sample Topics Semantic Graphs Computational Methods for Dynamic Interaction Networks Mathematical and Computational Methods for Information Security Privacy-Preserving Data Analysis Secure Internet Routing Climate and Disease Disease Clusters Internet Tomography Network Models of Biological and Social Contagion Streaming, Coding, Progressive Sensing Slide 19

Training Programs, Tutorials, Shortcourses Reconnect : for faculty teaching undergraduates and government employees seeking new areas of expertise Data Analysis in Law Enforcement and Homeland Security (August 2007) Biosurveillance (June 2008) Visual Analytics (Summer 2009) Tutorial: Statistical De-Identification of Confidential Health Data (April 2009) Law enforcement: Situational awareness Anthrax Slide 20

Other Educational Programs DHS Scholars and Fellows Program: Funding 6 Graduate Student Fellows at Rutgers DHS MSI Summer Research Program: Biosurveillance (Howard, Morgan State): Summer 2007 Another opportunity for summer 2009 Research Experiences for Undergraduates Since Summer 2007 Students study 1-on-1 with DyDAn mentor Students from all over the U.S. Projects planned for Summer 2009 Internships: At Rutgers, Bell Labs, & with national lab partners Slide 21

Other Educational Programs High School Teacher Program: Theme: Discrete math and homeland security Connecting homeland security research to the classroom Middle School Program: Collaborates with Port Authority Project Development of written materials to be usable in classrooms Pilot testing of materials and teacher training to use them Slide 22

The numerous applications of discrete science form the basis of DyDAn s work. We look forward to partnering in numerous DHS applications.