Cybersecurity Risk in Modern Power Systems
This seminar will cover, in simple terms, why modern power systems (the "Smart Grid"), and cyber-physical systems in general, are at increased risk for cyberattack. We will discuss a real-world scenario in the California grid and how we can evaluate possible cyber issues with the technology. We will also discuss the technical expertise necessary for the next generation of cyber-power professionals to solve problems and mitigate risk.
Thomas (Tom) Williams is the Security Architect for the California Independent System Operator (ISO). Tom holds a Master of Science in Information Security & Assurance from Western Governors University and a Master of Business Administration from Golden Gate University. Tom's professional certifications include CISSP and TOGAF.
How To Develop Cybersecurity Athletes
In 10 years cybersecurity competitions will be as popular for students in middle school, high school and college as traditional sports. This presentation shows how and why cybersecurity athletes will provide talent and numbers needed to help meet industry and government workforce needs. Cybersecurity competitions provide an ongoing virtual training ground for participants to develop, practice and validate their cybersecurity knowledge and skills using high-fidelity simulation environments. Those who participate in cyber competitions are athletes with the same training, passion and coolness as traditional physical athletes. However, there are more opportunities for these cyber athletes to go pro. Not only do participants practice their computing talents, but they also learn intangible skills such as problem-solving, teamwork and communications. Each ability is valuable for individuals looking to launch a career in cybersecurity.
Dr. Dan Manson is a Professor in Computer Information Systems (CIS) at California State Polytechnic University, Pomona (Cal Poly Pomona). Dr. Manson has also served as the CIS Department Chair and Campus Information Security Officer. Dr. Manson led the effort for Cal Poly Pomona to be designated a National Center of Academic Excellence in Information Assurance Education in 2005, 2008 and 2014. Dr. Manson led the Western Regional Collegiate Cyber Defense Competition from 2018 to 2017 and since 2011 has partnered with schools in CyberPatriot. Dan has been Principal Investigator or co-Principal Investigator on six National Science Foundation grants to support workforce, curriculum and professional development in cyber security, including the current CyberWatch West NSF Cybersecurity Education Regional Center grant. Dan Commissioner for the National Cyber League (NCL).
Towards Intelligent Programming Systems for Modern Computing
Dr. Xipeng Shen, ACM Distinguished Speaker
Modern computing exhibits new challenges, which includes the rapid increase of the volume and variety of data, the shift of computing towards cloud and IoT, and the fast development of heterogeneity in processors and memory. To address these challenges, one of the keys exists in making programming systems more intelligent. In this talk, Dr. Shen will present the progresses his group has achieved in the recent years towards that goal. These techniques help raise program analysis and optimizations to a new level, make programming systems self learn and evolve, and helps programs overcome hardware limitations to better harness the power of modern heterogeneous systems (e.g., GPU).
Xipeng Shen is an Associate Professor in the Computer Science Department at North Carolina State University. He is a receipt of U.S. DOE Early Career Research Award, U.S. NSF CAREER Award, and Google Faculty Research Award. He is an ACM Distinguished Speaker, and an IBM Center for Advanced Studies （CAS）Faculty Fellow. His research lies in the broad field of compiler and programming systems, with an emphasis on enabling data-intensive high performance computing and intelligent computing through innovations in both compilers and runtime systems. Prior to joining NC State in 2014, Shen was the Adina Allen Term Distinguished Associate Professor at The College of William and Mary. He was a Visiting Scientist at MIT and Microsoft Research, and had served as a consultant to Intel Labs and Cisco. He received his Ph.D. in Computer Science from University of Rochester in 2006, M.S. from Chinese of Academy of Sciences in 2001, and B.S. from the North China University of Technology in 1998.
Hats Off Speaker
Prasant Mohapatra, University of California Davis
With the expansive usage of mobile devices and potential growth in the deployment of Internet of things, we will have proliferation of smart sensors in our handheld devices, wearables, and in our surroundings. Making sense out of the web of sensors is what we term as Smart-Sensing. Smart-Sensing would involve accurate and innovative sensing approaches while using minimal resources. In this talk, we will have an overview of a few approaches and novel ideas for smart-sensing using smartphones. Capturing the movement of fingers and hand gestures through accelerometer and gyroscope, we will develop the concept of finger-writing using smartwatches. Sensor assisted biometric authentication will be the next topic of our discussion. Then we will explore how the WiFi APs can detect as well as identify humans. The last part of the talk will demonstrate the unconventional use of smart devices. The talk will conclude with the summary of the scope and applications of Smart-Sensing environments.
Dr. Prasant Mohapatra is a Professor in the Department of Computer Science and serves as the Dean and Vice-Provost of Graduate at the University of California, Davis. He is a former Endowed Chair of the Department of Computer Science. In the past, he has held Visiting Professor positions at AT&T, Intel Corporation, Panasonic Technologies, Institute of Infocomm Research (I2R), Singapore, and National ICT Australia (NICTA), University of Padova, Italy, Korea Advanced Institute of Science and Technology (KAIST), and Yonsei University, South Korea. He was the Editor-in-Chief of the IEEE Transactions on Mobile Computing, and has served on the editorial boards of the IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, IEEE Transaction on Parallel and Distributed Systems, ACM WINET, and Ad Hoc Networks. He has been on the program/organizational committees of several international conferences.
Dr. Mohapatra is the recipient of an Outstanding Engineering Alumni Award from Penn State University, an Outstanding Research Faculty Award from the College of Engineering at the University of California, and the HP Labs Innovation Research Award winner for three years. He is a Fellow of the IEEE and AAAS. Dr. Mohapatra's research interests are in the areas of wireless networks, mobile communications, sensor networks, and Internet protocols.
Disruption in the Transportation Industry – A Discussion on Current Innovation Trends
Dr. Jane MacFarlane, Lawrence Berkeley National Lab
U.S. transportation infrastructure is undergoing a significant transformation. A confluence of technologies - smart devices with location, sensing and connectivity, ubiquitous data networks, and cloud-based computing infrastructures that can handle large amounts of data ingestion and computation - are being used to digitize and deliver new scaled services at a dramatic pace all of which is disrupting the way the automotive and transportation industries do business. The disruption is occurring from the bottom up as these devices become more intelligent, generate new mobility solutions and integrate more effectively into people’s lives. This discussion will focus on introducing a holistic view of data generation, management and analytics to provide science-based big data analytics that support long-term regional planning, will inform future policy decisions and drive a focus on decarbonization of the transportation system.
Jane Macfarlane, Ph.D. holds a joint appointment at the University of California at Berkeley and Lawrence Berkeley National Laboratory where she is the Director of the Smart Cities and Sustainable Mobility Center and Executive Director of the Sustainable Transportation Initiative respectively. Dr. Macfarlane has over 30 years of experience in high performance computing, data analytics and geospatial mapping. Macfarlane has been responsible for directing industry research groups including: Head of Research for HERE – a leader in geospatial mapping, Vice President of Process Engineering at Imara – a lithium ion battery company, and Director of Advanced Technology Planning for OnStar at General Motors – the first at-scale, telematics solution. Her research focus is on semantic analytics, big data analytics and visualization, contextualization of data streams and spatially distributed computing. She holds 8 granted patents and currently has 16 patent applications, primarily in the domain of geospatial data analytics. She holds a Ph.D. in Mechanical Engineering from the University of Minnesota.
Privacy Preservation in Smart Grid: Cases of Vehicle-to-Grid and Smart Meter Communications
Tuesday, March 15
Dr. Kemal Akkaya
The Power Grid is passing through a massive transformation to enable various smarter applications that will not only increase its resilience but also reduce the overall costs. This is enabled by providing a contemporary underlying communication infrastructure which will connect every component with each other including electric meters and cars. In this way, meters will provide fine-grained data about the power usage in certain neighborhoods which will enable efficient management of power flows. The use of electric vehicles (PEVs) will promote the adoption of intermittent renewable energy sources by acting as energy storage systems. In this way, PEVs can inject power to the Smart Grid during periods of reduced production to balance demand. For both smart meters and EVs, the data will be collected using wireless communication capabilities (e.g., WiFi or LTE) and will be available for analysis by the Grid operators. The collection and storage of such data raise privacy issues that might lead to exposure of consumer's living and driving habits. This talk will focus on the privacy aspects of vehicle-to-grid (V2G) and smart meter communications. We will then present approaches to preserve privacy in both settings by focusing on wireless protocol design. Specifically, we present a data obfuscation method for smart meters and a privacy-preserving framework for power injection from EVs to the grid. The talk will conclude with other ongoing security-related projects in ADWISE Lab at FIU.
Dr. Kemal Akkaya is an associate professor in the Department of Electrical and Computer Engineering at Florida International University. He received his PhD in Computer Science from University of Maryland Baltimore County in 2005 and joined the department of Computer Science at Southern Illinois University (SIU) as an assistant professor. Dr. Akkaya was an associate professor at SIU from 2011 to 2014. He was also a visiting professor at The George Washington University in Fall 2013. Dr. Akkaya leads the Advanced Wireless and Security Lab (ADWISE) in the ECE Dept. His current research interests include security and privacy in Internet-of-things and cyberphysical systems, software defined networking, and topology control in sensor networks. Dr. Akkaya is a senior member of IEEE. He is the area editor of Elsevier Ad Hoc Network Journal and serves on the editorial board of IEEE Communication Surveys and Tutorials and Sensors Journal. He has served as the guest editor for Journal of High Speed Networks, Computer Communications Journal, Elsevier Ad Hoc Networks Journal, and in the TPC of many leading wireless networking conferences including IEEE ICC, Globecom, LCN and WCNC. He has published over 120 papers in peer reviewed journal and conferences. He received the "Top Cited" article award from Elsevier in 2010.
Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth Systems
Friday, February 12
Dr. Linke Guo, Binghamton University, State University of New York
Widely deployed mHealth systems enable patients to efficiently collect, aggregate, and report their Personal Health Records (PHRs), and then lower the costs and shorten their response time. The increasing needs of PHR monitoring require the involvement of healthcare companies that provide monitoring programs for analyzing PHRs. Unfortunately, healthcare companies are lack of the computation, storage, and communication capability on supporting millions of patients. To tackle this problem, they seek for the help from the cloud. However, delegating monitoring programs to the cloud may incur serious security and privacy breaches because people have to provide their identity information and PHRs to the public domain. Even worse, the cloud may mistakenly return the incorrect computation results, which will put patients' life in jeopardy. This talk will first go through the security and privacy breaches in current eHealth/mHealth systems. Then, the talk will be focusing on the feasible cryptographic solution to the privacy-preserving monitoring scheme for cloud-assisted mHealth systems.
Dr. Linke Guo is currently an assistant professor at Department of Electrical and Computer Engineering, Binghamton University, State University of New York (SUNY). His research has been focusing on cybersecurity, privacy-preserving scheme development, and trust and reputation system design, for wired/wireless networks and interdisciplinary systems with emphasis on eHealth/mHealth networks, online/mobile social networks, cloud computing, and location-based services.
Dr. Guo obtained his Ph.D. and M.S. in Electrical and Computer Engineering from University of Florida in 2014 and 2011, respectively. He received his B.E. in Electronic and Information Science and Technology from Beijing University of Posts and Telecommunications (BUPT) in 2008. He was a member in Wireless Networks Laboratory (WINET) at University of Florida. He has been serving as the co-chair of Network Algorithms and Performance Evaluation Symposium, ICNC 2016, and regular TPC member of many conferences, including INFOCOM, Globecom, ICC, WCNC, ICCC, etc. He is also currently serving as the system administrator of IEEE Transactions on Vehicular Technology. He received the Best Paper Award in IEEE GLOBECOM 2015. He is a member of IEEE and ACM.
Risk Based Security in the Firm
Friday, September 4
Kevin Spiares, Koch Business Solutions
What happens when an unprepared firm is suddenly beset by Nation State and Politically motivated cyber attacks? In this presentation we will discuss the circumstances and actions that resulted in the successful defense of one the worlds largest companies. We will explore the value of technology, industry experts, and how ultimately it's what you don't do that may be the difference between business as usual or a successful exploit.
Kevin Spiares, Director of Strategy and Innovation Koch Business Solutions and site Director for the Reno, Nevada office. In my role I am accountable for providing guidance and strategic direction in the areas of Compute, Storage, Networks, Internet of Things and Data Center. This is accomplished by working across Koch and externally with key partners such as Cisco, EMC, Dell, etc. as well as a variety of start-ups and venture capital firms. have been at Koch for 15 years in a variety of roles to include Cyber-Security, IT Director, Logistics Director, and Internal Business Consulting.
The Current and Emerging Global Threat Environment
Friday, May 8
Chul Yim, Director of Business Development, FireEye's U.S.
FireEye will review the overall threat landscape from their experiences and research with over 200 high profile cyber incidents in 2014 including Sony, Anthem, Target, Home Depot, etc. They will also cover security issues including targeted attacks and nation-state threat actors that have impacted government and education entities.
Tohru Watanabe, Manager, Systems Engineering
Tohru Watanabe is the Systems Engineering Manager for FireEye’s U.S. State and Local Government and Education practice. He has worked in security for over 10 years across and has consulted with the public sector and private sector organizations. He holds a Bachelor’s in Business Administration, CISM, CISSP-ISSAP, GCFA, and GREM certifications.
Chul Yim, Director of Business Development
Chul Yim is the Director for Business Development for FireEye’s U.S. State and Local Government and Education practice. He has spent the last 10 years working with the U.S. public sector space in various roles in sales, strategy, consulting and policy. He is a University of Nevada, Reno graduate (2004) with a major in computer science.
Privacy Enhancement in Biometrics
Friday, April 24
Dr. Nalini K. Ratha, IBM Thomas J. Watson Research Center, Hawthorne, New York
Biometrics, as an authentication tool, provides several advantages over conventional what you know (e.g., password, PIN) and what you possess (e.g., keys, tokens) authentication methods. However, a biometrics is an irrevocable password as we can’t change the biometrics easily. If it is compromised digitally, it is compromised for ever. Secondly, a biometrics can be easily matched against multiple databases to link identities. In order to alleviate privacy deficiencies of biometrics, IBM Research has pioneered a new technique for protecting biometrics templates that can allow for revocation and anonymous sharing. Instead of enrolling with the true biometrics, the original signal/template is intentionally and repeatably distorted using a class of non-invertible functions. The resulting “transformed” biometrics is enrolled. During verification, the same distortion transformation is applied to the biometrics signal/template to match against the enrolled template. The proposed method supports revocability and permits anonymous matching where biometrics data sharing is prohibited.
Dr. Nalini K. Ratha is a Research Staff Member at IBM Thomas J. Watson Research Center, Hawthorne NY where he is the team leader for the biometrics-based authentication research. He has over 20 years of experience in the industry working in the area of pattern recognition, computer vision and image processing. He received his B. Tech. in Electrical Engineering from Indian Institute of Technology, Kanpur, M.Tech. degree in Computer Science and Engineering also from Indian Institute of Technology, Kanpur and Ph. D. in Computer Science from Michigan State University. Before joining IBM Research, he worked at CMC R&D center and ECIL Computer Group both in India.
He has authored more than 80 research papers in the area of biometrics and has been co-chair of several leading biometrics conferences and served on the editorial boards of IEEE Trans. on PAMI, IEEE Trans. on SMC-B, IEEE Trans. on Image Processing and Pattern Recognition journal. He has co-authored a popular book on biometrics entitled “Guide to Biometrics” and also co-edited two books entitled “Automatic Fingerprint Recognition Systems” and “Advances in Biometrics: Sensors, Algorithms and Systems”.
He has offered tutorials on biometrics technology at leading IEEE conferences and also teaches courses on biometrics and security. He is Fellow of IEEE, Fellow of IAPR and a senior member for ACM. His research interests include biometrics, pattern recognition and computer vision. He is an adjunct professor at IIIT Deli, had been an adjunct for several year at Cooper Union and NYU-Poly. Currently, he is the president of the IEEE Biometrics Council (2011-2012). At IBM, he has received several awards including a Research Division Award, Outstanding Innovation Award and Outstanding Technical Accomplishment Award along with several paten achievement awards.
The Digital Assault on Privacy
Friday, February 13
Dr. Hal Berghel, Professor of CS at University of Nevada, Las Vegas
George Orwell and Aldous Huxley are frequently mentioned in the context of the recent spate of surveillance leaks from the NSA. While both Orwell and Huxley feared big government and big controls, they feared it for different reasons. This difference will set the tone for this talk. We will begin with the history of the U.S. involvement in surveillance, from the early analog days to the latest digital technologies. We'll explain the motivations, technologies and civil libertarian consequences of some noteworthy surveillance programs like Echelon, Carnivore, Narusinsight, Magic Lantern, ThinThread, Trailblazer, Stellar Wind/Ragtime, and TAO (Tailored Access Operations) to name but a few. The speaker will also cover corporate surveillance by high tech companies and cyber intelligence mercenaries. The speaker will conclude with speculation on future directions for government and private surveillance programs the privacy implications that will arise therefrom. (50 slides; 45-50 minutes plus Q&A: categories: digital security and privacy, privacy legislation, privacy safeguards, personally identifiable information).
Hal Berghel is currently Professor of Computer Science at the University of Nevada, Las Vegas where he has previously served as Director of both the Schools of Computer Science and Informatics, and as Associate Dean of the College of Engineering. He created and directed the first CyberSecurity degree programs (Bachelors, Masters and PhD) in Nevada in 2005. This program became an NSA Center for Academic Excellence two years later. He was the founding Director of the Identity Theft and Financial Fraud Research and Operations Center and CyberSecurity Research Center. His research interests are wide-ranging within the binary and digital ecosystem, ranging from logic programming and expert systems, relational database design, algorithms for non-resolution based inferencing, approximate string matching, digital watermarking and steganography, and digital security and privacy. Since the mid-1990's he has applied his work in digital security to law enforcement and intelligence gathering, particularly with respect to digital crime, digital money laundering, information warfare and trusted identities. His research has been supported by both industry and government for over thirty years. His most recent work in secure credentialing technology was funded by the Department of Justice. In addition to his academic positions, Berghel is also a popular columnist, author, frequent, talk show guest, inventor, and keynote speaker. For nearly fifteen years he wrote the popular Digital Village column for the Communications of the ACM, and has written the Out-of-Band column for IEEE Computer since 2011. Berghel is a Fellow of both the Institute for Electrical and Electronics Engineers and the Association for Computing Machinery, and serves both societies as a Distinguished Visitor and Distinguished Lecturer, respectively. He has received the ACM Outstanding Lecturer of the Year Award four times and was recognized for Lifetime Achievement in 2004. He has also received both the ACM Outstanding Contribution and Distinguished Service awards. He is also the founder and owner of Berghel.Net, a consultancy serving government, business and industry. Berghel is a member of the Nevada Technology Crimes Advisory Board and Chairs the Nevada Privacy Subcommittee.
AWARE (Advance Warning and Response Engine) and FAAR (Forensic Analysis and Advance Response) career and research opportunities in Cybersecurity
Saturday, December 6
Nitin Akarte, VP of System Engineering at TaaSera Inc.
The seminar is focused on the TaaSera Inc.’s NetTrust products which includes AWARE (Advance Warning and Response Engine) and FAAR (Forensic Analysis and Advance Response) Sight for Forensic to identify, respond & protect from cyber-attacks before it is too late. I would also cover the current cybersecurity challenges and opportunities it creates for careers in cybersecurity and research. In addition, this seminar will also include why this is a great time to consider a new career as a cybersecurity professional.
Mr. Akarte spent the majority of his career at Cisco Systems, which he joined in 1996. Prior to joining TaaSera, he was Director of Engineering – Security Access and Mobility Products at Cisco. He brings more than 19 years of experience in enterprise networking, security (Application & Network), and Mobility & Access (including BYOD, MDM/MAM, Secure Access, and Identity/Policy). He was previously Senior Software Manager at Cisco’s Security Management Product Group where he led engineering efforts to certify routers, switches and network management software. Prior to joining Cisco he was Software Manager at Make Systems, where he led the engineering efforts for NetMaker, a network design system which is widely used to simulate, design, optimize and perform network disaster recovery. Mr. Akarte resides in California. He received a Master of Science in Electrical Engineering from the University of Nevada, a Master of Science in Computer Engineering from the University of Nevada.
Symantic Global Intelligence Network
Friday, November 7
Javier Santoyo, Sr. Director Global Security Intelligence Operations Symantec
The topic of the talk will be focused on the Symantec Global Intelligence Network, threat information data collection and analysis techniques that result in targeted research papers on threat campaigns. I will be guiding the attendees throughout he broad aspect of data collection and analysis to the focused results based finished products that result in blog posting and or threat exposés.
Javier Santoyo serves as Sr Director for the Office of the CSO, overseeing Symantec’s Global Security Intelligence Operations in Culver City, California. As a senior director, the 20-year security veteran ensures that Symantec is on top of all the latest threats on the Internet. His team is responsible for hunting for adversaries, driving incident response operations, leading both cyber and non cyber investigations, and supporting litigation with eDiscovery services. Santoyo joined Symantec in December 2000, bringing with him tremendous experience from both the corporate and national security arenas. Santoyo started his career in security in 1990 when he enlisted in the military. His background in signals intelligence gives him a unique perspective. He has seen Internet exploitation, hacker groups, cyber terrorism and international threats from a nation security vantage point. Santoyo graduated from the University of Kansas in 1997, securing a bachelor's degree in physics and Russian and Eastern European Studies (REES). His passion for education also led him to teach high school math and coach soccer while in Texas City, TX in 1998. Santoyo is fluent in Russian and Spanish.
The Nevada Cyber Center: A discussion on the cyber security challenges and opportunities facing Nevada into the future
Friday, October 10
Christopher Ipsen, CISSP-ISSAP, CISM CISO State of Nevada
Technology is at the core of rapid changes in how live; how we access information, how we learn, how we work, and how we interact. This reliance on technology has created a human dependency that must be effectively addressed to ensure a reliable future. This presentation will highlight these critical dependencies and present some opportunities available to the Nevada Cyber Center.
As Chief Information Security Officer for the State of Nevada, Christopher Ipsen is responsible for the security oversight of the state's enterprise data and network infrastructure. Within Nevada, Chris is a member of the state Homeland Security Committee and chairs the Statewide Cyber Security Committee. His current projects include statewide initiatives to standardize security metrics, continuous monitoring and incident response.
Information Security Magazine named Chris winner of the" Security Seven Award" for government and GovInfoSec.Com recognized him as one of the" Top Ten Most Influential Government Information Security Leaders". Chris serves on numerous information security advisory boards including the RSA Conference Committee and the editorial panel for the Council on Cyber Security, Critical Security Controls.
Thursday, September 4
Charles A. Kamhoua, U.S. Air Force Research Laboratory
As cloud computing thrives, many organizations – both large and small – are joining a public cloud to take advantage of its multiple benefits. Especially public cloud based computing, is cost efficient, i.e., a cloud user can reduce spending on technology infrastructure and have easy access to their information without up-front or long-term commitment of resources. Despite those benefits, concern over cyber security is the main reason many large organizations with sensitive information such as the Department of Defense have been reluctant to join a public cloud. This is because different public cloud users share a common platform such as the hypervisor. An attacker can compromise a virtual machine (VM) to launch an attack on the hypervisor which, if compromised, can instantly yield the compromising of all the VMs running on top of that hypervisor. This work shows that there are multiple Nash equilibria of the public cloud security game. However, the players use a Nash equilibrium profile depending on the probability that the hypervisor is compromised given a successful attack on a user and the total expense required to invest in security. Finally, there is no Nash equilibrium in which all the users in a public cloud fully invest in security.
Charles A. Kamhoua received his B.S. in Electronic from the University of Douala (ENSET), Cameroon in 1999, and the M.S. in Telecommunication and Networking and PhD in Electrical Engineering from Florida International University in 2008 and 2011 respectively. In 2011, he joined the Cyber Assurance Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, as a National Academies Postdoctoral Fellow, became a Research Electronics Engineer in 2012 and a Science & Technology Program Manager in 2013.
Dr. Kamhoua is the principal investigator of the AFRL in-house basic research project, Survivability Through Optimizing Resilient Mechanisms (STORM) funded by the Air Force Office of Scientific Research (AFOSR). He is leading a team of more than 10 researchers including postdocs, summer faculties and graduate and undergraduate students from multiple universities across the United States. His technical expertise is sought from the highest levels within DoD as evidenced by multiple tech transition reviews of DARPA at the Pentagon. His current research interests cover the application of game theory and mechanism design to cyber security and survivability, with over 30 technical publications. He participated in multiple research visits in the United States and abroad to maintain technological excellence in cyber security research relevant to warfighter and civilian needs. His research was presented in multiple national and international conferences. He is a reviewer of multiple journals and serves on the technical program committees of several international conferences.
Dr. Kamhoua won some of the most prestigious awards including an Air Force Notable Achievement Award, an AFOSR basic research award of nearly a million dollars, the AFOSR Windows on the World Visiting Research Fellowship at Oxford University, UK, a Best Paper Award at the 2013 International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2013), a National Academies Postdoctoral Fellowship award, and a National Science Foundation (NSF) PIRE award at Fluminense Federal University, Brazil. He is an advisor for the National Research Council, a member of the National Society of Black Engineer (NSBE) and a Senior Member of IEEE.
Cyber 9-1-1: Who you gonna call?
Friday, April 25
Colonel Jon Brickey
Cyberspace is a complex, fragile, and ever-changing ecosystem. America is growing more dependent on it with each passing day, connecting more than two billion people around the globe to conduct business, share information and ideas, and socialize. At the same time, cyber threats continue to increase in sophistication and volume, putting the nation at risk. Adversaries ranging from foreign state actors to corporate spies continue to exploit vulnerabilities in U.S. networks, systems, and practices. Individual citizens and small organizations have limited resources for defending their information resources and while the majority of companies accept at least a degree of responsibility for the protection of their own networks, it is not clear that they are capable of providing themselves with robust security. Currently, there is no single Federal agency charged with protecting America’s interests in cyberspace and local law enforcement response capabilities are, in many cases, non-existent or incapable of responding to the plethora of cyber incidents. So the next time you experience a cyber attack, who you gonna call?
Colonel Jon Brickey is the Army Cyber Command Fellow at West Point, where he serves as Assistant Professor in the Department of Social Sciences and Associate in the Combating Terrorism Center and the Army Cyber Center. His previous military assignment was at Army Central Command from 2010 to 2011, where he served as the Mission Command and Enterprise Systems Division Chief (G6) at Camp Arifjan, Kuwait. Commissioned through the United States Military Academy in 1991, Colonel Brickey has served in Army tactical and operational positions in the United States, Europe, and Southwest Asia, including company command in V Corps Artillery, Wiesbaden, Germany. He has held leadership positions in Cyber-related programs at the National Security Agency, USNORTHCOM, and USARCENT.
Towards Secure and Privacy-Preserving Location-Based Mobile Systems
Thursday, March 6
Ming Li, Mississippi State University
Security and privacy are two indispensable components for a safe and secure system. Although security and privacy are intricately entwined and one often follows the other, there could be a dilemma of attaining both goals in system designs under considerable circumstances. On the other hand, with the rapid evolution of mobile devices, mobile location-based services (MLBSs) have emerged as a prosperous branch of mobile systems.
This talk introduces an important class of MLBSs, called location-based check-in system. Noticing current location-based check-in systems have a lot of limitations and raise many concerns, especially about system security and users privacy, we propose a location-based rewarding system, called LocaWard, where mobile users can collect location-based tokens from token distributors, and then redeem their gathered tokens at token collectors for beneficial rewards. Tokens act as virtual currency. The token distributors and collectors can be any commercial entities or merchants that wish to attract customers through such a promotion system.
Based on this framework, we aim to guarantee both the system security and users privacy, which is not an easy job due to their complex relationship. We develop a set of protocols, including identity authentication, token audition, and to ken property validation, to ensure the system security while without leaking users privacy, and prove the completeness and soundness of the protocols.
Ming Li received the B.E. degree in Electrical Engineering from Sun Yat-sen University, China, in 2007, and the M.E. degree in Electrical Engineering from Beijing University of Posts and Communications, China, in 2010, respectively. She is currently working towards the Ph.D.. degree in the Department of Electrical and Computer Engineering, Mississippi State University.
Her research interests include cybersecurity, privacy-preserving data analysis, resource management and network optimization in cyber-physical systems, mobile computing, and big data.