Tag: security
-
talk: Privacy and Security in Online Social Media, 10:30 3/11
10:30a Mon 3/11: Professor Ponnurangam Kumaraguru (PK) of IIIT Delhi will talk about his research on Privacy and Security in Online Social Media at 10:30am on Monday, March 11 in room 325b of the ITE building at UMBC.
-
Northrop Grumman and UMBC's Cync program a success after first year
Photo Courtesy bioparks.aurp.net A year ago, Northrop Grumman partnered with bwtech@UMBC to form the Cync program with the goal of “identifying, developing, and commercializing technologies that will meet the cybersecurity needs of the DOD, DHS, DOJ and Intelligence communities,” says the website. Since then, the program has supported five technology startups—AccelerEyes, Five Directions, KoolSpan, Oculis…
-
2012 Maryland Cyber Challenge competition open for registration
The 2012 2012 Maryland Cyber Challenge (MDC3) is open for registration with qualifying rounds in September and finals 16-17 October at the Cyber-Maryland Conference at the Baltimore Convention Center.
-
Privacy Engineering
We've starting to see advertisements for a new kind of position: privacy engineer. If you've seen the classic movie, The Graduate, you'll remember the conversation that recent college graduate Benjamin Braddock has with a friend of his father, who says "I just want to say one word to you. Just one word. … Are you…
-
PhD defense: Wenjia Li on Securing Mobile Ad Hoc Networks
Ph.D. Dissertation Defense A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks Wenjia Li 11:00am Tuesday, 14 June 2011, ITE 325b A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers…
-
Guidelines for smart grid cybersecurity, 2/15/2011
The North American electric power system has been called the world's largest interconnected machine and is a key part of our national infrastructure. The power grid is evolving to better exploit modern information technology and become more integrated with our cyber infrastructure. This presents unprecedented opportunities for enhanced management and efficiency but also introduces vulnerabilities…