PhD Defense, E. Birrane on Virtual Circuit Provisioning in Challenged Sensor Internetworks: with Application to the Solar System Internet, 10am Mon 8/11

from flckr, marked for reuse

Dissertation Defense

Virtual Circuit Provisioning in Challenged Sensor Internetworks:
with Application to the Solar System Internet

Ed Birrane

10:00am-12:00pm Monday, 11 August 2014, ITE325b

In this thesis, we present a challenged sensor internetwork (CSI) networking architecture which federates heterogeneous constituent networks behind an overlay routing mechanism abstracted from individual data link layers. The CSI is unique and required to implement expanding sensor networks.

Demand for sensing networks with increasing spatial footprints is evidenced by ongoing efforts to build geo-political border monitoring networks, intelligent highway initiatives, automated undersea surveillance, and NASA effort to construct a Solar System Internet. Existing network technologies fail to address multiple physical links, frequent disruptions, and significant signal propagation delays. The construction and maintenance of virtual circuits in an internetwork abstracted from differences in the physical, data-link, and transport layers of an internetwork represents a unique research contribution with immediate utility for a wide variety of sensing network concepts.

We describe the CSI architecture as the intersection of wireless, delay-tolerant, and heterogeneous networks and describe special characteristics of this architecture than enable useful assumptions to optimize messaging. We define an internetwork routing (INR) framework that decomposes the routing function into discrete logical steps and we provide algorithms for each of these steps. An inferred Contact Graph Routing (iCGR) algorithm populates logical graphs from local nodes. A Contact Graph Routing with Extension Blocks (CGR-EB) algorithm provides a hybrid source-path algorithm for synchronizing link state along network paths. A Predictive Capacity Consumption (PCC) algorithm exploits CGR-EB data to build a congestion model. Payload Aggregation and Fragmentation (PAF) and Traffic-Shaping Contacts (TSC) algorithms condition data and place limits on the amount of internetwork traffic carried over local networks.

From simulation, iCGR performs within ~15% of a perfect-knowledge system. CGR-EB has a speedup over standard approaches by 300% in stable topologies, by 3000% in unstable topologies, and by 11000% in unstable topologies with non-monotonic cost functions. PCC delivers 97% more data in congested networks over table-based approaches and 37% more data than the INR framework without the congestion model. PAF/TSC reduces message count by 43% while increasing goodput by 63%.

Together, these algorithms build and monitor virtual circuits in the CSI architecture. Portions of this work are in consideration for deployment in NASA networks.

Committee: Drs. Alan Sherman (Co-Chair, UMBC), Mohammed Younis (Co-Chair, UMBC), Dhananjay Phatak (UMBC), Vinton Cerf (Google), Keith Scott (MITRE), Hans Kruse (OU)

PhD proposal: C. Grasso, Information Extraction from Clinical Notes, 11am Mon 8/4

grasso

PhD Dissertation Proposal

“S:PT.-HAS NO PMD.”
Information Extraction from Clinical Notes

Clare Grasso

11:00am Monday, 4 August 2014, ITE 325b

Clinical decision support (CDS) systems aid clinical decision making by matching an individual patient’s data to a computerized knowledge base in order to present clinicians with patient-specific recommendations. The need for methods to extract the clinical information in the free-text portions of the clinical record into a form that clinical decision support systems could access and utilize has been identified as one of the top five grand challenges in clinical decision support. This research focuses on investigating scalable machine learning and semantic techniques that do not rely on an underlying grammar to extract medical concepts in the text in order to apply them in CDS on commodity hardware and software systems. Additionally, by packaging the extracted data within a semantic representation, the facts can be combined with other semantically encoded facts and reasoned over. This allows other clinically relevant facts to be inferred which are not directly mentioned in the text and presented to the clinician for decision making.

Committee: Drs. Anupam Joshi (chair), Tim Finin, Aryya Gangopadhyay, Charles Nicholas, Claudia Pearce and Eliot Siegel

CyberNEXS comes to UMBC

The UMBC Graduate Cybersecurity Program is pleased to announce that it will incorporate the CyberNEXS virtual training environment within its courses and activities during AY14-15. Assistant CYBR GPD Ben Shariati was instrumental in bringing this technical capability to the CYBR program, beginning with CYBER 620 at Shady Grove this fall.

Through CyberNEXS, students are able to connect into its cloud-based “cyber range” to conduct hands-on system administration, security, research, and systems analysis activities in a relied private environment capable of presenting multiple server, desktop, and other devices in a variety of networked configurations. Student activities can be scored and/or monitored for overall success and effectiveness over time.

Since 2011, CyberNEXS has served as the competitive environment for the Maryland Cyber Challenge.

CyberNEXS is provided to UMBC by Leidos, a leading cybersecurity firm supporting US government activities.

MS defense: P. Pappachan, Remedy: A Semantic and Collaborative Approach to Community Health-Care, 10am Thr 7/31

MS Thesis Defense

Remedy: A Semantic and Collaborative
Approach to Community Health-Care

Primal Pappachan

10:00am Thursday, 31 July 2014, ITE 325b

Community Health Workers (CHWs) act as liaisons between health-care providers and patients in underserved or un-served areas. However, the lack of information sharing and training support impedes the effectiveness of CHWs and their ability to correctly diagnose patients. In this thesis, we propose and describe a system for mobile and wearable computing devices called Remedy which assists CHWs in decision making and facilitates collaboration among them. Remedy can infer possible diseases and treatments by representing the diseases, their symptoms, and patient context in OWL ontologies and by reasoning over this model. The use of semantic representation of data makes it easier to share knowledge such as disease, symptom, diagnosis guidelines, and demography related information, between various personnel involved in health-care (e.g., CHWs, patients, health-care providers). We describe the Remedy system with the help of a motivating community health-care scenario and present an Android prototype for smart phones and Google Glass.

Committee: Drs. Anupam Joshi (chair), Tim Finin, Michael Grasso, Aryya Gangopadhyay

MS defense: M. Madeira, Analyzing Opinions in the Mom Community on Youtube, 2pm Wed 7/30

morgan

MS Thesis Defense

Analyzing Opinions in the Mom Community on Youtube

Morgan Madeira

2:00pm Wednesday, 30 June 2014, ITE 325b

The “Mom Community” on YouTube consists of a large group of parents that share their parenting beliefs and experiences to connect and share information with others. Although there is a lot of positive support in this community, it is often a hotspot for debate of controversial parenting topics. Many of these topics have one side that represents the belief of “crunchy” moms. Crunchy is a term used to describe parents that intentionally choose natural parenting methods and eco-friendly products to raise their children. Debate over these practices has led to “mompetition” and the idea that there is a right way to parent. This research investigates these claims such as how different crunchy topics are discussed and how the community has changed over time. Video comments and user data are collected from YouTube and used to understand parenting practices and opinions in the mom community.

Committee: Drs. Anupam Joshi (chair), Tim Finin, Karuna Joshi

MS defense: A. Hendre, Cloud Security Control Recommendation System, 8:30 Thr 7/31

css

MS Thesis Defense

Comparison of Cloud Security Standards and a
Cloud Security Control Recommendation System

Amit S. Hendre

8:30am Thursday, 31 July 2014, ITE346

Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users’ data remains confidential and secure. On one hand, cloud providers are implementing their own security and privacy controls. On the other hand, standards bodies like Cloud Security Alliance (CSA), International Organization for Standards (ISO), National Institute for Standards and Technology (NIST), etc. are developing broad standards for cloud security. In this thesis we provide a comprehensive analysis of the cloud security standards that are being developed and how they compare with the security controls of cloud providers. Our study is mainly focused on policies about mobility of resources, identity and access management, data protection, incident response and audit and assessment. This thesis will help consumer organizations with their compliance needs by evaluating the security controls and policies of cloud providers and assisting them in identifying their enterprise cloud security policies.

Committee: Drs. Karuna Joshi, Tim Finin and Yelena Yesha

MS defense: S. Padalkar, Android Malware Detection and Classification, 10:30 Wed 7/30

MS Thesis Defense

Android Malware Detection and Classification
using Machine Learning Techniques

Satyajit Padalkar

10:30am Wednesday, 30 July 2014, ITE 325b

Android is popular mobile operating system and there exists multiple marketplaces for Android applications. Most of these market places allow applications to be signed using self-signed certificates. Due to this practice there exists little or very limited control over the kind of applications that are being distributed. Also advancement of Android root kits are increasingly making it easier to repackage existing Android application with malicious code. Conventional signature based techniques fail to detect such malware. So detection and classification of Android malware is a very difficult problem. We present a method to classify and detect such malware by performing a dynamic analysis of the system call sequences. Here we make use of machine learning techniques to build multiple models using distributions of syscalls as features. Using these models we predict whether given application is malicious or benign. Also we try to classify given application to specific known malware family. We also explore deep learning methods such as stacked denoising autoencoder algorithms (SdA) and its effectiveness. We experimentally evaluate our methods using a real dataset of 600 applications from 38 malware families and 25 popular benign applications from various areas. We find that a deep learning algorithm (SdA) is most accurate in detecting a malware with lowest false positives while AdaBoost performs better in classifying a malware family.

Committee: Drs. Anupam Joshi (chair), Tim Finin and Charles Nicholas

Victoria Lentz '15 Wins HP/SWISS Cybersecurity Scholarship

Earlier this year HP and the Scholarship for Women Studying Information Security (SWSIS) selected UMBC undergraduate Victoria Lentz (Computer Science, 2015) and ten other female cybersecurity students from across the U.S. to receive scholarships.

Lentz was in the first cohort of students to be accepted into the UMBC Cyber Scholars Program, which began in Fall 2013. The program prides itself on influencing minorities and women to become involved in the cyber security and computing industries.

With particular interests in malware and digital forensics, Lentz plans to work in the cybersecurity industry after finishing her undergraduate education to gain experience before returning to school for a Master’s degree.

More from Lentz appears in Technically Baltimore.

from a post by Achsah Joseph on UMBC Insights

UMBC researchers developing textile-based sensors to control devices


CSEE professor Nilanjan Banerjee was interviewed at the Microsoft Faculty Summit on UMBC research that is developing sensors that can be sewn into textiles such as clothing or bedding and used control devices though gestures. Professor Banerjee is working with colleagues Ryan Robucci, Chintan Patel and Sandy McCombe-Waller (UMB) and students to prototype the hardware sensors and software components that can be part of an Internet of Things environment.

With support from Microsoft, their experimental systems are using Microsoft’s Lab of Things platform for research on connected devices in homes and other spaces. One of the use cases driving the research is helping people with limited mobility lead more independent lives by enabling them to control the environment. Buz Chmielewski, who became a quadriplegic after a surfing accident, is helping the team test and refine the system and its usability.

It's official: House declares CS ∈ STEM

By voice vote, the US House of Representatives passed HR 5031, the STEM Education Act of 2014, to define STEM education to include computer science, and to support existing STEM education programs at the National Science Foundation.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, … For purposes of carrying out STEM education activities at the National Science Foundation, the Department of Energy, the National Aeronautics and Space Administration, the National Oceanic and Atmospheric Administration, the National Institute of Standards and Technology, and the Environmental Protection Agency, the term “STEM education” means education in the subjects of science, technology, engineering, and mathematics, including other academic subjects that build on these disciplines such as computer science.

1 61 62 63 64 65 142