Past Events

 

 

NJIT's 4th Annual New Jersey Cyber Security Conference

Date:                   Friday, October 24, 2014

Time:                  8:30 – 4:00 pm

Location:            Brookdale Community College

765 Newman Springs Road

Lincroft, NJ 07738

Cost:                  FREE

Internet-based communications, business transactions and data storage are no longer simply convenient; they are a necessity. Every day, more and more Americans depend on mobile devices and wireless connections to shop, learn and interact. Nationally, we are now tasked with expanding our capabilities to provide the same type of open access to our critical assets and communications infrastructure. The two combined are supporting our economy, public safety and national security. Yet, despite this rapid expansion of internet usage, our nation’s cultural awareness of cyber security continues to lag behind. The first step to protect these vital resources is to become aware of what cyber security is truly about, and what you need to know to help minimize the threats.

Conference attendees will hear from subject matter experts representing state government, federal agencies and private industry who specialize in various aspects of cyber security. This year’s keynote speaker is Scott Montgomery, Vice President and Chief Technology Officer of Worldwide Public Sector at McAfee, which is part of Intel Security. A number of break-out sessions will also be offered throughout the afternoon.

Who should attend?

Information security specialists, program managers, and individuals with IT responsibility are cordially invited to attend the 4th Annual New Jersey Cyber Security Conference on Friday, October 24th.

Registration

Register for the New Jersey Cyber Security Conference at:  https://www.surveymonkey.com/s/5PNY8SR.After completing the online form, please press the Done button at the bottom of the page to submit.

Note: conference registration can only be accomplished online. Seating is limited and registrations will be accepted on a first come, first served basis. Confirmation e-mails, final agenda and directions will be sent to registrants on October 20, 2014. Please direct any questions regarding the 4th Annual New Jersey Cyber Security Conference to Michael Vance of the New Jersey Office of Homeland Security & Preparedness at (609) 588-0591 or e-mail  michael.vance@ohsp.state.nj.us.

 Click here for the Agenda!

 

 

 

2014 Hacktoberfest @ InfoAge

The OWASP SJ and ASIS Security is inviting you to their Hacktoberfest. This is a large event targeted for HS students and their parents and local college students. With the partnership of the FBI, CIA, and NSA as well the Wall Township schools, Brookdale, Monmouth U, Ocean CC, Ryder, and Princeton.

The annual event will be an awesome opportunity for everyone to learn about coding in addition to promoting all the awesome stuff at InfoAge. The events of the day will be a round robin workshop approach with stations devoted to Social Engineering, Cell Phone Hacks, Raspberry Pi Hacks, Mask making, and information sessions with the FBI, CIA, and NSA.

Date: October 18, 2014

Time: 10am – 5pm

Location: InfoAge Campus - 2201 Marconi Road - Wall, New Jersey - 07719 

 



Student Opportunity: The National Cyber League (NCL) Invitation for student. Pre/Regular season registration is on

The National Cyber League (NCL) is pleased to offer a Fall 2014 season!

The NCL is an intercollegiate cybersecurity competition developed by National Science Foundation funded centers to make cybersecurity learning and practice fun and engaging.

Even students new to competitions can compete in three Capture the Flag competitions, thanks to our exclusive bracketing system.Prepare for CompTIA Security+™ and EC-Council Certified Ethical Hacker (CEH)™ certifications with labs and games and build some serious skills along the way. Faculty coaches get freeinstructor syllabi, to help integrate the NCL experience into classes, as well as free hosted lab and game environment access.

The Fall Season registration is $20 per player for the Pre/Regular Seasons and $25 per Post Season team. The Pre/Regular Season registration runs from August 23-September 20.

We are committed to continuing to improve the NCL experience and hope you will participate in the 2014 Fall Season. Feel free to reach out with any questions.

Please spread the word! (To join the NCL mailing list, have faculty and students send an email with their name, email address, student or faculty status, and college/university affiliation to info@nationalcyberleague.org.)

 



IEEE NJ Section – Seminar on Benchmarking on Experimental Processor Becomes Computer Architecture Concept Worth Teaching

 

IEEE Computer Society and School of Computer Sciences and Engineering will cosponsor a seminar titled "Benchmarking of Experimental Processor Becomes Computer Architecture Concept Worth Teaching" by Dr. Kevin Kwait, Principal Computer Engineer from Air Force Research Laboratory at Rome, NY.

Dr. Kwiat has been with U. S. Air Force Research Laboratory for over 30 years. In addition to his duties with Air Force, Dr. Kwiat also takes on many other roles such as adviser for National Research Council , visiting scientist at Cornell University, and a visiting researcher at the University of Edinburgh as part of the Air Force Office of Scientific Research “Window on Europe” program. Dr. Kwiat gave the keynote speech at the first Symposium on Advances in Cybersecurity and Information Assurance held at FDU.

Abstract: A challenge to Air Force engineers was to design and develop a radiation-hardened microprocessor that embodied, at that time, a radical computer architecture. The requirements for space-borne processing called for designing a processor that, in addition to being rad-hard, fault-tolerant, and testable, would also achieve a high-level of performance. The measure of performance would come through the execution of a set of programs in a process called benchmarking. Experimental microprocessor designs impose limitations on benchmarking. Their fundamental novelty means that they have not yet incorporated many of the benchmarking support features found on fully developed machines. Benchmarking is considered premature without these support features; yet, once meaningful performance measurements are obtained, then resources for further microprocessor development can be turned to the most promising of the proposed designs. The team devised a work-around to the problem of benchmarking a microprocessor early in its design: they created within the benchmark programs software simulations of a specialized hardware structure. This virtualization of hardware by software "matured" the design to the point needed for realistic performance measurement.

These lessons have been transferred to a computer architecture course where the students mimic the same challenges that faced the Air Force team who confronted benchmarking experimental microprocessors. By carrying out the term project, the college students gain experiential knowledge of designing hardware - in software - for solving a practical problem that remains relevant today.

Please come join us for this very informative talk and also encourage your students to come.

All are welcome! You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 10:50 A.M.

Time: 11:00AM

Date: Tuesday, September 9, 2014, pre-meeting pizza starting at 10:50 AM.

Place: Becton Hall BEC405, Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666. http://www.fdu.edu/visitorcenter/directions/teaneck_map.html

For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Howard Leach, h.leach@ieee.org


 

The 2014 International Conference on Frontiers in Education: Computer Science and Computer Engineering

Dates/Time: July 21 to 24, 2014
Location: Monte Carlo Resort, Las Vegas, USA
Registration: Click here to register for the Colloquium
Conference Description:
FECS is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results. Learn more here.


 

Listen to General James E. CartWright at NIKSUN WWSMC Summer '14

It is with great pride and pleasure that we invite you and your colleagues to attend the NIKSUN World Wide Security and Mobility Conference (WWSMC), Summer ‘14, being held in Princeton, NJ on June 25th and 26th, 2014. The opening day, June 25th is open to the general public, while the second day is for NIKSUN resellers/Partners only. Come join us to learn about the latest advances in cybersecurity and mobility, network with your colleagues, and perhaps learn something new to take back with you!

Hear keynote speech by General James E. Cartwright, Former Vice Chairman of the Joint Chiefs of Staff, eminent cybersecurity expert, Dr. Parag Pruthi, CEO of NIKSUN. Listen to leading cybersecurity experts from the telco, government, and enterprise sectors talk about the latest innovations and state-of-the-art advances in cyber and mobile security.

Visit our website for detailed agenda.

To ensure that you get the most out of NIKSUN WWSMC Summer ‘14, we encourage you to register today. Space is limited so advanced registration is required. If you have any questions, please feel free to contactmarketing@niksun.com or T: +1-609-452-2400

 

We look forward to seeing you at this exciting event!

Date: June 25th & 26th 2014

Location: DoubleTree by Hilton Hotel Princeton, NJ, 4355 US Route 1, Princeton, New Jersey, 08540


 

The 18th Annual Colloquium for Information Systems Security Administration

Dates/Time: June 16-18, 2014
Location: San Diego, California
Registration: Click here to register for the Colloquium
Colloquium Description:
The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.


 

Introduction to IPAD Forensics Continuing Education

Date: Thursday, June 12th, 2014 - 9:00AM - 12:00PM

Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack

Directions and View of Campus http://view.fdu.edu/default.aspx?id=320

Purpose: An opportunity to learn about the vocabulary and tools used in the field of IPAD Forensics (approx. 122 million people in the U.S. had an IPAD in 2013), and why such investigative knowledge is important for both businesses and security professionals. See flyer for more information


 

17th Annual New York State Cyber Security Conference (NYSCSC ’14) and 9th Annual Symposium on Information Assurance (ASIA ’14)

Please join us at the Empire State Plaza in Albany, NY to hear from prominent security experts presenting the latest topics and issues in cyber security. The June 3 keynote will be provided by the Governor’s Cyber Security Advisory Board.

NEW FOR 2014:Hands-on training classes in Digital Forensics and Cyber Incident Analysis and a Cyber-Challenge!

About the Symposium: This two day event is co-hosted by the New York State Office of Information Technology Services’ Enterprise Information Security Office, the University at Albany’s School of Business and College of Computing and Information, and The NYS Forum, Inc.

Register today at www.dhses.ny.gov/go/conference2014

Date: June 3 - 4, 2014

Cost to Attend:

  • Free to government and public sector employees
  • $50 for not-for-profit employees*
  • $200 for private sector employees*

*Group discount of 20% for 5 or more employees from the same organization.


 

The 23rd Wireless and Optical Communication Conference (WOCC 2014)

Date/Time: May 9 - 10, 2014
Location: Hosted by the New Jersey Institute of Technology and sponsored by IEEE
Call for Papers Deadline February 15, 2014; Acceptance Notification March 15, 2014 !!!
Learn more
Original technical papers are solicited on the topics including, but not limited to, the following:
Wirless Symposium Networks Symposium
Optical Symposium Big Data Symposium
About the Conference:
The 23rd Annual Wireless and Optical Communications Conference (WOCC 2014) will provide a unique opportunity to explore the leading areas of wireless and optical communications technologies, future network and big data.
More Information to come!


 

IEEE Signal Processing Chapter and Circuits and Systems Chapter Seminar at NJIT

Topic: Technology and Standard for Virtual-view 3D Systems

Seminar: 3D video products are aggressively growing recently. One step further, the virtual-viewpoint (or free-viewpoint) video becomes the research focus. It is also an on-going standardization item in the international ITU/MPEG Standards. In addition to the movie special effects, one application of virtual-view system is the multi-view auto-stereoscopic (glasses free 3D) display. Typically, a densely arranged camera array is used to acquire input images and a virtual view picture is synthesized using the depth-image based rendering (DIBR) technique. Three essential components are needed for building a virtual-view system: depth estimation, data compression, and view synthesis. The ITU/MPEG standard committee is now in the process of defining the data compression (delivery format) of the virtual-view system. The committee also provides non-normative depth estimation and view synthesis tools. The entire set of standard specifications is to be done in two years. We will summarize the recent progress and technology trend on this subject. Click here for more information

Date: 19th May 2014

Location: Room ECE 202, NJIT

Speaker:Professor Hsueh-Ming HANG, Chiao-Tung University, Taiwan

All are welcome! You don't have to be an IEEE Member to attend.

For more information contact: Yun Shishi@njit.edu(973)-596-3501, Alfredo Tan tan@fdu.edu(201) 692-2347 or Durgamadhab Misra durgamadhab.misra@njit.edu973-596-5739


 

The Rothman Institute of Entrepreneurship Breakfast Seminar & Our Cybersecurity member, Dr Kiron Sharma, would be presenting

"Synopsis - 2014 Innovation Conference: Counterfeiting - Protecting the Supply Chain"

Date: Thursday, April 24, 2014

About the Seminar: This breakfast seminar is designed to help business leaders learn about innovative strategies being used to fight the counterfeiting of products. In addition, business leaders will understand how to more effectively develop and implement tactics to protect their company, customers and the community.

Agenda:

7:15 Breakfast and Registration
8:00 Welcome & Introductions, James Almeida, Dean, SCB
8:10 Counterfeiting- An Overview, Ron Guido, Life Care Services
8.20 Pursuing Supply Chain Security in the Pharma Industry, Brian Johnson, Pfizer
8:30 The Role of Law Enforcement, Anthony Orosz, U.S. Customs & Border Protection
8:40 Cyber Security Perspectives, Kiron Sharma, FDU
8:50 Panel discussion, Q & A
9:15 Conclusion

Click for details: http://view.fdu.edu/default.aspx?id=3712

Speakers: Ron Guido, Brian Johnson, Kiron Sharma, Anthony Orosz.

Location: Lenfell Hall, Hennessy Hall (Mansion)
Fairleigh Dickinson University's College at Florham
285 Madison Avenue, Madison, NJ 07940

Cost: $75.00

Register: With Eventbrite

Questions? Please call 973-443-8842 or e-mail rothman@fdu.edu.

RSVP by April 20th!


 

IEEE North Jersey Section Computer Chapter Seminar

Seminar: IEEE North Jersey Section Computer chapter and our school will co-sponsor a seminar entitled “Big Data Analysis in Credit Card Industry” on 04/23/2014 at 12:00pm in M105. The speakers, Dr. Lana Song and Dr. Jun Bai, are from JP Morgan Chase. Dr. Lana Song is a Director at JP Morgan Chase leading Core Risk Modeling group for Chase Card Services and Dr. Jun Bai is a Senior Manager at JP Morgan Chase Card Services. The talk will be of interest to engineering, computer science, and math majors and faculty. See flyer for more details

All are welcome!


You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 11:45 A.M.

Date/Time: 12:00PM, Wednesday, April 23, 2014, pre-meeting pizza starting at 11:45 AM.

Location: Muscarelle Center, Auditorium 105 Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666.
http://www.fdu.edu/visitorcenter/directions/teaneck_map.html

For more information contact: Hong Zhao (201)-692-2350, zhao@fdu.edu; or Howard Leach,
h.leach@ieee.org


 

The 2014 International Conference on Frontiers in Education: Computer Science and Compter Engineering

Call for Papers by April 19, 2014 - find out more here.


 

Digital Forensics Special Interest Group (SIG) – Spring 2014

The SIG meets on 2 Monday afternoons per month from 2:00 – 3:00 PM during the Spring Semester of 2014. The SIG is free to attend and is for FDU full or part time faculty, staff, and students. The SIG will help people learn about mobile device forensics, equipment, tools, policy, and techniques. Practical demonstrations and theory are part of the SIG. The location is in the Cybercrime Training Lab 2 on the second floor of Dickinson Hall, Metro Campus, Cybercrime Training Lab.

1. January 27 – Week 1 – GPS Devices
2. February 3 – Week 2 – IPAD Forensics
3. February 10 – Week 3 - Digital Camera Forensics
4. February 17 – Week 4 – Pager Systems (3.5 million in use in USA in 2012)
5. February 24 – Week 5 – Steganography, Detecting Steganography
6. March 3 – Week 6 – Chain of Custody, Computer Usage Policy, Phone Policy, Importance of General Counsel and HR
7. March 10 – Week 7 – Going to Conferences, writing papers, the importance of publishing
8. March 17 – No SIG, Spring recess
9. March 24- Week 8 – CCTV Intro
10. March 31 – Week 9 – Intro to Logic Cube
11. April 7 – Week 10 - Legacy Media Forensics (CF Cards, Jazz Disks, Zip Disks, XD cards, 3.5, 5.25, and 8 inch floppy diskettes
12. April 14 – Week 11 – Software to help parents keep kids safe.

End of SIG for Spring 2014 - Prof. Doherty Ph.D, SSCP, CCE, CPP – email Doherty@fdu.edufor more information


 

Introduction to Legacy Device Forensics, Continuing Education

Date/Time: Monday – April 7, 2014 – 9 AM – 12:15 PM
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd FloorDirections and View of Campus http://view.fdu.edu/default.aspx?id=320
Purpose: The course topics include both theory and practical training in Locard’s Principle of Exchange, chain of custody, identifying, preserving, collecting, and analyzing digital evidence from a cell phone, collecting pictures, deleted pictures, email, SMS Messages, call logs, internal cell phone memory, SIM Cards, external memory, generating a report with hash marks of all evidence gathered, CALEA, communication data warrant, faraday bag, Susteen Secure View, Blackberry phone, Motorola V710 Camera Phone, Cyberbullying, Tracephone, Sexting, Video Voyeurism Act of 2004, Foreign Cell Phones, the FAT File System, RecoverMyFiles, Logic Cube, Helix V1.7, ISO Buster for CDs, Project-A-Phone. We will also talk about the need for isolated forensic examination computers for use with the cell phones as well as write blockers to preserve cell phone data.


 

IEEE North Jersey Section Exploring Clouds as Enablers of Science

Date/Time: Wednesday, April 2, 2014 at 12:00PM; pre-meeting pizza starting at 11:45AM
Location: Fairleigh Dickinson University, Muscarelle Center, 105 (Auditorium), 1000 River Road, Teaneck, NJ 07666 http://www.fdu.edu/visitorcenter/directions/teaneck_map.html


About the Presentation: Cloud computing has emerged as a dominant paradigm that has been widely adopted by enterprises. Clouds provide on-demand access to computing utilities, an abstraction of unlimited computing resources, and support for on-demand scale up, scale down and scale out. Clouds are also rapidly joining high-performance computing system, clusters and Grids as viable platforms for scientific exploration and discovery. As a result, understanding application formulations and usage modes that are meaningful in such a hybrid infrastructure, and how application workflows can effectively utilize it, is critical. In this talk, I will l explore the role of clouds in science and engineering. I will also explore how science and engineering applications can benefit from clouds and how the cloud abstraction can lead to new paradigms and practices. This talk is based on research that is part of the CometCloud autonomic cloud-computing project at the NSF Cloud and Autonomic Computing Center at Rutgers.


Speaker: Dr. Manish Parashar is Professor of Electrical and Computer Engineering at Rutgers University. He is the founding Director of the Rutgers Discovery Informatics Institute (RDI2) and of the NSF Cloud and Autonomic Computing Center (CAC), and is Associate Director of the Rutgers Center for Information Assurance (RUCIA). Manish received a BE degree from Bombay University, India, and MS and Ph. D. degrees from Syracuse University. His research interests are in the broad areas of Parallel and Distributed Computing and Computational and Data-Enabled Science and Engineering. A key focus of his research is on addressing the complexity or large-scale systems and applications through programming abstractions and systems.
For more information on the event see Event Flyer


 

The 18th Annual Colloquium on Information Systems Security Education
Call for Papers by March 30, 2014 - find out more here.
 


 

Digital Camera Forensics

Date/Time: Monday, March 10, 2014 9a.m. to Noon
Location: Cybercrime Training Lab 2 of Dickinson Hall, 2nd Floor, Fairleigh Dickinson University, Hackensack Campus
Purpose: Locard's Principle of Exchange, chain of custody, identifying, preserving, collecting, and anlyzing digital evidence, metadata, Steganography, data carving, and using tools such as DataLifter 2 and Recover My Files with one or two digital cameras.
See Flyer for more information!!


 

LINCS Canvas Browser: Interactive Web App to Query, Browse and Interrogate L1000 Gene Expression Signatures

Date/Time: Wednesday, March 5, 2014 at Noon (pizza starting at 11:40 a.m.)

Location: Fairleigh Dickinson University, Muscarelle Center, 1000 River Road, Teaneck, NJ 07666

Speaker: Dr. Avi Ma’ayan, Department of Pharmacology and Systems Therapeutics, Icahn School of Medicine at Mount Sinai

Purpose: The LINCS Canvas Browser (LCB) is an interactive HTML5 web-based application that facilitates querying, browsing and interrogating almost all currently available LINCSS gene expression data by implementing two compacted layered canvases. See Flyer for more detailed information or contact Alfredo Tan at tan@fdu.edu or Hong Zhao at  zhao@fdu.edu


2014 Canada-US Cybersecurity Conference: Securing our Financial Infrastructure

Date/Time: Friday, February 28, 2014
Location: Consultant General of Canada, Concourse Level, 1251 Avenue of the Americas, NY, NY 10020
Purpose: An exchangte of ideas on the interconnected nature of governmental policy, economic competitiveness and cybersecurity.
See Flyer for more information!!


 

Image Processing Pipeline of Digital Camera

Date/Time: Wednesday, February 26, 2014
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, 2000 River Road, Teaneck, NJ 07666
Purpose: This presentation will cover CMOS sensor digital image capture and image processing pipeline. Introduction about different techniques applied in image capture pipeline, such as bayer pattern raw image format, auto exposure, auto white balance, auto focus, bad pixel correction, lens shade correction, JPEG compression, etc.
Speaker: Zhicheng Ni, Ph.D. in Electrical and Computer Engineering from NJIT. He has worked on integration and enhancement of video encoders and decoders, as well as experience with various hardware platforms, including TI and Starcore DSPs.
See Flyer for more information!!


 

IEEE North Jersey Section Signal Processing Chapter: Canonical Correlation Analysis for Knowledge Discovery in Distributed Array Systems

Date/Time: Thursday, December 10, 2013 at 12 Noon; pre-meeting pizza starting at 11:40 a.m.
Location: Fairleigh Dickinson University, Muscarelle Center, M105 (Auditorium), 1000 River Road, Teaneck, NJ 07666 http://www.fdu.edu/visitorcenter/directions/teaneck_map.html
About the Presentation:This talk presents our analysis as well as simulation study on the adaptive beamforming and combining techniques applied to a system consisting of distributed antenna arrays. Our analysis reveals the connection between the natural and the practical schemes for data combination in array processing.
Speaker:Dr. Hongya Ge is an associate professor in the department of Electrical & Computer Engineering, New Jersey Institute of Technology (NJIT). Her research interests are in the general areas of statistical signal processing and communication theory with applications to parameter estimation and signal detection, rapid synchronization, interference suppression, and fact converging transceivers for multiuser systems; sensor array signal processing, spectral analysis and passive sensing and ranging in underwater acoustics; and radio frequency interference identification and excision in radio astronomy. She has published 100+ papers in IEEE/IEE Journals and Conference Proceedings.
For more information on the event see Event Flyer


 

Discussion on Law Enforcement and Homeland Security

Date/Time: Wednesday, November 20, 2013 from 10 a.m. - 12 Noon
Location: Fairleigh Dickinson University, Dickinson Hall (Wilson Auditorium), 140 University Plaza Drive, Hackensack, NJ 07601 http://www.fdu.edu/visitorcenter/directions/teaneck_map.html
Speaker:John Miller is a former investigative journalist for WNBC (New York), NYPD Deputy Commissioner of Public Information, ABC co-host of 20/20 with Barbara Walters, LAPD Counter-Terrorism Chief, Assistant Director for Public Affairs of the FBI, Associate Deputy Director of National Intelligence for Analytic Transformation and Technology, and the only American news reporter ever to interview the late Osama Bin Laden (in May of 1998). John is currently a senior correspondent for CBS This Morning (New York).
For more information on the event see Event Flyer


 

A New Challenge for Image & Video Forgery with Viciousness or Innocuity

Date/Time: Thursday, November 14, 2013, pre-meeting pizza starting at 11:45 AM
Location: Muscarelle Center, Auditorium, 105 Fairleigh Dickinson University, 1000 River Rd, Teaneck, NJ 07666; Map: http://www.fdu.edu/visitorcenter/directions/teaneck_map.html
For more information on the event see Event Flyer
Contact: Hong Zhao (201) 692-2350 or zhao@fdu.edu; or Howard Leach, h.leach@ieee.orgDecoding the Next Generation Science


 

Standards: K-12 STEM Education Statewide Event

Dates/Time: Friday, October 25, 2013
Location: Fairleigh Dickinson University, 285 Madison Avenue, Madison, NJ in the Dreyfuss Auditorium
Keynote Speaker: Michael Heinz Science Coordinator of New Jersey Department of Education
Event Flyer
Register online: northjersey.com/STEM or call: 973-569-7562. Registration must be received by Monday, October 21st.


 

IEEE North Jersey Section Computer Society Chapter: Common Mistakes with Software Security

Date/Time:October 24, 2013 at 12:00PM (pre-meeting pizza starting at 11:30AM)
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, 1000 River Road, Teaneck, NJ 07666 (See directions here)
For more information Contact: Hong Zhao (201) 692-2350 or zhao@fdu.edu; or Howard Leach at h.leach@ieee.org


 

2013 3rd Annual New Jersey Cyber Security Conference

Dates/Time: Wednesday, October 23, 2013, 8:30a.m. to 4 p.m.
Location: Law & Public Safety Technical Complex Auditorium, 1200 Negron Drive, Hamilton, NJ 08691
Cost: FREE
Conference Description:

Conference attendees will hear from subject matter experts representing state government, federal agencies and private industry that specialize in various aspects of cyber security including cyber threats and trends. Additionally, panel discussions will be held on virtualization – security best practices, BYOD, cloud computing, and cyber threats and predictions.
Who Should Attend:
Information security specialists, program managers, and individuals with IT responsibility
Registration: Register for the New Jersey Cyber Security Conference at: https://www.surveymonkey.com/s/Z5RSSQJ. Upon completing the online form, please press the Done button at the bottom of the page to submit.
Flyer for Complete Information


 

The 6th Annual Cyber Security Expo "Cyber Espionage and IP Issues"

Date: October 18, 2013
Location:
The University of Memphis Center for Information Assurance, FedEx Institute of Technology, 365 Innovation Drive Suite 335A, Memphis, TN 38152-3115
Registration and Informationhere
Expo Description:
The University of Memphis Center for Information Assurance will be hosting the 6th Annual Cyber Security Expo at the FedEx Institute of Technology on October 18th, 2013. Information Assurance and Cyber Security experts will be onsite for presentations and networking to address current issues of cyber security.

Topics may include:
Intellectual Property(IP) Thefts

·Advanced Persistent Threats

·BYOD & Mobile Devise Security

·Cloug & Big Data Security

·Social Media Threats

·Virtual Supply Chain Security


 

2013 Information Security Curriculum Development Conference (InfoSecCD2013)

Dates/Time: October 11-12, 2013
Location: Kennesaw State University, Georgia
Summit Description:
InfoSecCD seeks to provide academics, researchers, and practitioners with an opportunity to share their perspectives with others interested in the various aspects of Information Security Curriculum Development. Papers offering novel research contributions in any aspect of information security education are solicited for submission to the 2013 InfoSecCD Conference.

The primary focus is on high-quality, original, unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the design, development, implementation, and best-practices in information security education or for best-practices in the design, implementation, and management of information security or digital forensics.
Register and learn more:http://infosec.kennesaw.edu/infoseccd/


 

Introduction to GPS Forensics

Dates/Time: September 26, 2013, 8:30am to Noon
Location: Fairleigh Dickinson University, Cybercrime Training Lab 2, Dickinson Hall, 1000 River Road, Teaneck, New Jersey 07666
Continuing Education/Program Description:
This introductory non credit continuing education course consists of two elements. The first element is practical while the other element is theoretical. The theoretical element consists of the history of GPS and a discussion of other competing systems such as Glonass and the Beidou Navigation Satellite System. We will also discuss relevant vocabulary such as routes, waypoints, trips, points of interest, and possible impairments to the accuracy of GPS data. The practical element consists of learning to use a Tableau write blocker, forensically imaging the GPS navigation device with FTK Imager or Helix, using GPS Babel to change file formats if necessary, and mapping the itinerary file using Google Maps.
Registration: call FDU Continuing Education at 201-692-6500. You may register and pay for the course with a credit card and receive a certificate of completion after participating in the class. The course is limited to 16 students.
See Program Flyer here


 

2013 Cyber Security Summit

Dates/Time: September 25, 2013
Location:Hilton Grand Ballroom, 1335 Avenue of the Americas, New York, NY 10019
Summit Description:
The 2013 Cyber Security Summit connects C-Suite executives in need of innovative solutions to protect their business & critical infrastructure. The event is produced by TechExpoUSA.com, the nation's leader in professional hiring events for the Defense and Intelligence industry. The Cyber Security Summit provides a forum for attendees to learn about cyber security’s most vital issues by directly connecting them with emerging and established service providers, renowned speakers and powerful decision makers across multiple industries.

Held in the world headquarters for business, culture, entertainment, finance, real estate, technology & development, the 2013 Cyber Security Summit will enlighten its global executive audience with expert keynote addresses & stimulating interactive panel discussions.
Review the Agenda and to Register:http://www.cybersummitusa.com/agenda/


 

IEEE North Jersey Advanced Communications Symposium

Dates/Time: September 21, 2013
Location:Babbio Center, Stevens Institute of Technology, Hoboken, NJ
Symposium Description and Call for Posters!!
The IEEE North Jersey Section and its Communications, Computer and Vehicular Technology Chapters are organizing a one-day technical symposium covering wireless communication and related topics at the Babbio Center on Saturday, September 21, 2013. The event consists of eight invited presentations given by distinguished speakers as well as poster sessions by invited graduate students/postdocs. There will be plenty of opportunity to interact with presenters and network with peers at the coffee breaks, during the lunch and the closing reception.

The organizing committee is currently inviting graduate students to prepare a poster presentation on recent work, recent research results, and cutting edge developing technologies in communications and related fields. Masters students, PhD candidates, and post docs are encouraged to participate. The posters session will be particularly helpful for student researchers to have direct interactions with faculty, industry personnel and other peers. This will serve as an excellent platform and opportunity to network for future collaborative research and career advancement.

Poster presentations will be on display all day and a special dedicated exhibition hour is scheduled for all attendees. Presenters have opportunities to interact with all attendees. There is no charge of registration fee to poster presenters. Three outstanding posters will receive 2013 IEEE North Jersey Section Communications Poster Awards. The 1st/2nd/3rd place winners will receive prizes of $400/$300/$200 respectively (one prize per winning poster). All poster presentations will receive participation certificates. All submissions will be subject to review by the organizing committee. If interested, please submit a title and a short abstract of 250 words to the poster session coordinator Prof. Hong Man at hong.man@stevens.edu by September 6, 2013. If accepted, the electronic version of the poster is due on September 15, 2013.


 

IEEE North Jersey Advanced Communications Symposium

Babbio Center, Stevens Institute of Technology, Hoboken, NJ

GRADUATE STUDENTS - CALL FOR POSTERS!!!

 

The IEEE North Jersey Section and its Communications, Computer and Vehicular Technology Chapters are organizing a one-day technical symposium covering wireless communication and related topics at the Babbio Center on Saturday, September 21, 2013. The event consists of eight invited presentations given by distinguished speakers as well as poster sessions by invited graduate students/postdocs. There will be plenty of opportunity to interact with presenters and network with peers at the coffee breaks, during the lunch and the closing reception.

 

The organizing committee is currently inviting graduate students to prepare a poster presentation on recent work, recent research results, and cutting edge developing technologies in communications and related fields. Masters students, PhD candidates, and post docs are encouraged to participate.

 

Three outstanding posters will receive:2013 IEEE North JerseySection Communications Poster AwardsThe 1st/2nd/3rd place winners will receive prizes of$400/$300/$200 respectively (one prize per winning poster). All poster presentations will receive participation certificates. All submissions will be subject to review by the organizing committee. If interested, please submit a title and a short abstract of 250 words to the poster session coordinator Prof. Hong Man at

 

hong.man@stevens.edu by September 6, 2013. If accepted, the electronic version of the poster is due on September 15, 2013.


 

The 2013 NICE Workshop: Navigating the National Cybersecurity Education InterState Highway

Dates/Time: September 17-19, 2013
Location: Gaithersburg, MD
Workshop Description:
The National Initiative for Cybersecurity Education (NICE) will host its annual “Shaping the Future of Cybersecurity Education Workshop” at the National Institute of Standards and Technology (NIST) location in Gaithersburg, MD. The NICE Initiative is focused on enhancing the overall cybersecurity posture of the United States by accelerating the availability of educational and training resources designed to improve the cyber behavior, skills, and knowledge of every segment of the population.

The 2013 NICE Workshop theme is "Navigating the National Cybersecurity Education Interstate Highway". The Workshop will highlight cybersecurity education concepts, tools, and best practices with a focus on successes at the State and Federal levels. The goal is to highlight cybersecurity awareness, education, and training programs that can be adopted, copied, or used, or built-on by small businesses, educational institutions, industry, and government at the states, local, tribal and Federal levels to advance the strategic goals of NICE.

The workshop asks presenters, panelists, and participants to share information and use lessons learned and best practices to help attendees grow their cybersecurity toolkit and remind everyone of the critical role each plays in advancing the strategic goals of NICE:

·Raise national awareness about risks in cyberspace;

·Broaden the pool of individuals prepared to enter the cybersecurity workforce; and

·Cultivate a globally competitive cybersecurity workforce.

More information about NICE the Strategic Plan and past NICE Workshops can be found by visiting http://csrc.nist.gov/nice/


 

International Conference on Cyber Security

Dates/Time: August 5 - 8, 2013
Location: Fordham University at Lincoln Center, 113 West 60th Street, New York, NY 10023
Registration: Click here to register for the Conference
Conference Description: ICCS is the premier global cyber security event spanning three days with more than 85 unique lectures from distinguished speakers from government, the private sector and academia. Each brings unique insights from their expertise in the disciplines of emerging technologies, operations and enforcement, academic and pragmatic experience. A range of keynote presentations, panel discussions, sponsors' presentations, exhibitions and exceptional networking opportunities provide a rare chance to learn and speak with leading cyber security subject matter experts and solution providers from throughout the world. The cost for ICCS 2013 is $725.

 


 

ICF International's CyberSci Summit 2013

Dates/Time: June 25-26, 2013
Location: Arlington Hilton Hotel, Arlington, VA Registration:
Registration: CyberSci Summit 2013 event information

Summit Description: ICF International's CyberSci Summit 2013 (formerly known as Network Science and Reconfigurable Systems for Cybersecurity - NSRSC) will present and examine the latest emerging technology applications in next generation and beyond cybersecurity solutions. The goal of this technical gathering is to provide a venue for government, industry, and academia to discuss state-of-the-art and visionary developments spanning emerging technologies to meet the evolving requirements of security in cyberspace. For more information, speaker details, or registration costs, please visit  ICFI.com/CyberSci


 

IEEE International Workshop on Security and Privacy of Mobile, Wireless and Sensor Networks

Dates/Time: June 23, 2013/ 9:00 AM - 5:00 PM
Location: Co-located with IEEE SECON 2013 at New Orleans, USA
Workshop Description:
To cope with the rapid increased in mobile users and the increasing demand for mobile, wireless and sensor networks (MWSNs), it is becoming imperative to provide the necessary security protocols and privacy guarantees to users of MWSNs. In turn, these specific demands in security and privacy require new methodologies that are specifically designed to cope with the strict requirements of the networks. In general, the real-world performance of MWSNs crucially depends on the selected protocols, and their suitability and efficiency for the layers of the implementation. A satisfactory security design and protocol are therefore crucial for the performance of MWSNs. It is a great challenge to achieve efficient and robust realizations of such highly dynamic and secure MWSNs. Moreover, the study of security and privacy in the context of MWSNs provides insights into problems and solutions that are orthogonal to programming languages, programming paradigms, computer hardware, and other aspects of the implementation. The objective for this workshop is to address those topics, which we believe will play an important role in current and future research on and education of MWSNs.

Important Dates: Paper Submission Deadline: March 22, 2013; Acceptance Notification: April 22, 2013


 

The 17th Annual Colloquium for Information Systems Security Administration

Dates/Time: June 10-12, 2013.
Location: Mobile Bay, Alabama
Registration: Click here to register for the Colloquium
Colloquium Description:
The Colloquium for Information Systems Security Education recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels. See complete agenda here.

A Symposium on Cybersecurity & Information Assurance at FDU


 

A Symposium on Academic and Industry Perspectives on Cybersecruity

Dates/Time: Wednesday, May 1, 2013 (8 a.m. to 4 p.m. - Breakfast and Lunch included)
Location: Fairleigh Dickinson University, Dickinson Hall, Wilson Auditorium, Teaneck, New Jersey
Presenters: Dr. Kevin Kwiat (Air Force Research Laboratory; Dr. Jungwoo Ryoo (Penn State/Altoona); Mr. William Beckett (AT&T Labs Research); Dr. Justin Cappos (Polytechnic Inst of NYU); Fred Carl (InfoAge Museum); Dr. Eamon Doherty (FDU Cybercrime Laboratory: Hands-on demonstration)

Visit the event page to learn more and register online


 

Transforming ICT Networks for a Sustainable Future

Date/Time: Thursday, April 11, 2013 at 12 Noon; pre-meeting pizza starting at 11:30 a.m.
Location: Muscarelle Center Auditorium 105, Fairleigh Dickinson Univ, 1000 River Rd., Teaneck, NJ
For More Information Contact: Hong Zhao (201) 692-2350, zhao@fdu.edu ; or Howard Leeach, h.leach@ieee.org
Presenter: Dr. Thierry E. Klein, Head of Green Research at Bell Labs, Alcatel-Lucent

Abstract

With the continued exponential growth of applications, services, devices and machines all being connected to the network, the total Internet traffic in the next decade is expected to grow to a level that is 30 to 100 times that of current levels. One of the challenges for next-generation networks is the ability to support the predicted traffic in a sustainable and economically viable way. In addition to the resulting increased power consumption, the rising energy costs, the environmental impact of networks, and more socially conscious consumers and service providers demand that our future communication and data networks are greener and more sustainable. During this presentation, Dr. Klein will review some of the current trends in communication and data networks and discuss the latest research to improve energy efficiency and reduce power consumption in wireless, wireline access, packet data and optical networks. He will also provide an overview and a status update of the GreenTouch consortium, an industry-wide initiative founded under the leadership of Bell Labs with the mission to deliver architectures, solutions and specifications, and to demonstrate key technologies, to improve the network energy efficiency by a factor 1000 compared to 2010 levels.

[Full Bio and Abstract]


 

IEEE GeSI SMARTer2020: The Role of ICT in Driving a Sustainable Future

Dates/Time: Wednesday, March 20, 2013/12 p.m.
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105, Teaneck, New Jersey
Presentation Flyer can be accessed here.
Presenter: Mr. Tom Okrasinski is Senior Manager of Sustainability & Environmental Engineering at Alcatel-Lucent's Bell Labs in Murray Hill, NJ.
Talk Description:
The Global e-Sustainability Initiative or GeSI published the SMARTer2020 Report in December of 2012. The Report demonstrates how the increased use of information and communication technology (ICT) such as video conferencing and smart building management could cut the projected 2020 global greenhouse gas (GHG) emissions by 16.5%, amounting to $1.9 trillion in gross energy and fuel savings and a reduction of 9.1 Gigatonnes carbon dioxide equivalent (GtCO2e) of greenhouse gases. This is equivalent to more than seven times the ICT sector’s emissions in the same period. The SMARTer2020 report evaluates GHG abatement potential from ICT-enabled solutions ranging across six sectors of the economy: power, transportation, manufacturing, consumer and service, agriculture, and buildings. The report also includes detailed national studies of the GHG abatement potential of ICT in seven countries: Brazil, Canada, China, Germany, India, the United Kingdom and the United States.

For more information contact: Dr. Hong Zhao (201) 692-2350, zhao@fdu.edu or Howard Leach at h.leach@ieee.org


 

Tri-State Best Practices Conference: The Community College as a Place of Transition

Dates: March 9, 2013
Location: Bergen Community College/the Meadowlands Campus
Registration: Click here to register for this Conference. Additional information.
Conference Description:
The purpose of the conference is to provide community college educators, high school educators, employers in the community, and four year college educators with a forum to exchange successful strategies for transitioning students and discuss expectations and learning goals at each level in the education system. What competencies and skill sets are high school students mastering or struggling to master before they enter community college? How can community colleges meet the needs of these incoming students and transition them to meet the expectations of a four year college? What skills are employers seeking from their applicants and how can community college instructors in all disciplines better prepare students for these workforce demands? What kinds of assignments, learning experiences, projects, technologies, and classroom practices have we found to be successful in aiding this transition and better assessing our students’ learning? The overarching goal, therefore, is the improvement of student learning outcomes, creation of more meaningful assessment techniques, and introduction of new technology and approaches that will best meet the needs of our community college students today and allow them to move successfully into the next stage of their education or professional life.
Full Conference Description

FDU Presenters:
Dr. Neelu Sinha, Associate Professor, Department of Mathematics, Computer Sciences and Physics, Becton College of Arts & Sciences will be presenting during Session IV from 3:00-4:15pm Transitions through Technology in the Classroom with two FDU students (D. Bitsack and M. LaFranca) on Cyber Games - Fun to Play - That's the Learning Way.


 

7th International Technology, Education and Development Conference INTED2013

Dates: March 4 through 6, 2013
Location: Valencia, Spain
Invitees: Representatives from over 70 countries are expected inclusive of lecturers, researchers, academics, educational scientists and technologists from all disciplines and cultures.
Contacts: For information on the conference contact inted2013@iated.org

Conference Description: The general aim of the conference is to promote international collaboration in Education and Research in all educational fields and disciplines. The attendance of more than 700 delegates from 70 different countries is expected.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Registration link
Conference Website


 

Introduction to the SAFETY Act

Date/Time: February 14, 2013, 11 a.m. - 12 p.m. EST
Location: Webinar
Host: The Department of Homeland Security/SAFETY Act
Webinar Description:
The DHS S&T Directorate of the Department of Homeland Security will be conducting its first SAFETY Act webinar, "Shaping your company's future with the SAFETY Act." We will discuss the mission of the SAFETY Act program and the substantial benefits that Designation and Certification can provide to your organization. The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies - whether they are products or services. In addition, SAFETY Act protections encourage greater innovation and may make critical technologies and services more readily available.

Presented by:
Mr. Bruce B. Davidson
Director, Office of SAFETY Act Implementation
Science and Technology Directorate

How to Register: Please register here. A confirmation email will follow with specific login details for the webinar.


 

Tagging and Tracking Technologies for High Value Material and Personnel

Date/Time: Monday, February 11, 2013, 11:30 a.m. - 12:30 p.m. EST
Location: Webinar
Host: The Department of Homeland Security/Office of National Laboratories
Webinar Description:
The Savannah River National Laboratory (SRNL) was requested to lead a Law Enforcement Working Group that ranked advanced tagging and tracking as the highest priority. Specifically the participating agencies were looking for technologies more robust than GPS. Using prototype technologies from Boeing, On Ramp and Fortress, SRNL was able to demonstrate the ability to track personnel and material in all scenarios including indoors, in heavily wooded areas, canyons and in parking garages. Bi-directional communication was achieved in areas that Wifi, cell towers or traditional radios would not perform. The results of the exercise will be presented. These technologies may be suitable for seamless tracking of high value material and personnel anywhere in the world, and in hazardous conditions.

Presented by:
Mr. Joseph V. Cordaro
Advisory Engineer, Savannah River National Laboratory
Research and Development Engineering Technology

How to Register: Please register here. A confirmation email will follow with specific login details for the webinar.


 

U.S. Export Controls: A Case Study

Date: January 23, 2013
Host Institution: Stevens Institute of Technology
Location: Hoboden, New Jersey
Invitees: academic faculty and administrators

Program Description:
As part of the FBI’s Strategic Partnership Academic Alliance initiative, Assistant U.S. Attorney William Mackie will provide an overview of the Dr. Reece Roth case and keys to an effective compliance program.

Mr. Mackie will provide an overview of how academic or private sector research and development projects can exist successfully with the limits of U.S. export control laws using a case study of the prosecution and conviction of AGT, a defense contractor, and Dr. Reece Roth, a University of Tennessee professor, for export control violations. The keys to an effective compliance program and a mutually beneficial partnership with U.S. government research program will be highlighted.

About Mr. Mackie
Assistant U.S. Attorney William Mackie is a career prosecutor who has been with the Department of Justice for over fifteen years after starting out in private litigation practice in Atlanta and Washington DC. He is a graduate of Duke University Law School and Washington & Lee University. He started with the Department of Justice as a trial attorney in DC working on bank, tax and government program fraud cases. Later, he was appointed as an Assistant U.S. Attorney in Florida and subsequently transferred to his current position as an AUSA in Knoxville, TN.

During his time at DOJ, Mr. Mackie’s work focused primarily on white collar crimes, public corruption, organized crime, tax evasion and money laundering. Over the past five years, Mr. Mackie’s work has focused on national security related cases, including domestic and international terrorism, material support matters and weapons related export control cases.

 


 

IEEE 2013 International Conference on Computer Communication and Informatics (ICCCI 2013)

Dates: January 4 – 6, 2013
Location: Coimbatore, India
Invitees: International conference attendees

Conference Description: The International Conference on Computer Communication and Informatics (ICCCI 2013) is technically co-sponsored by IEEE Madras Section and aims to provide an outstanding opportunity for both academic and industrial communities alike to address new trends and challenges and emerging technologies on topics relevant to today's fast moving areas of Computer, Communication and Informatics. The conference will feature invited talks and referred paper presentations. The vision of this international conference is to foster communication among researchers and practitioners working in a wide variety of areas in Communication and Informatics with a common interest.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.


 

The International Relation of Cyber Crime

Dates: Tuesday, December 4, 2012 at 1:30 – 3:30 p.m. and Wednesday, December 5 at 3:30-4:30 p.m.
Location: Fairleigh Dickinson University (FDU), Edward Williams Hall, 150 Kotte Place, Hackensack, NJ
Invitees: Open to the general public, faculty, students and staff

Topics on 12/4/12:
(1) The International Relation of Cyber Crime
(2) Public Policy, Politics & Official Corruption

Speaker(s):
(1) Lt. Andrew Donofrio, Ret. Cybercrime Expert, Bergen County Prosecutor's Office and
(2) William "Pat" Schuber, Assistant Professor, School of Administrative Science, FDU

Topic on 12/5/12: An Answer to Gangs, Guns & Drugs
Speaker(s): Larry Spagnola, Chief of Police Ret., and Sergeant John Spano, Ret., Paterson Police Department
Invitees: Admission to these presentations is FREE, open to FDU community and general public


 

Fourth IEEE International Workshop on Information Forensics and Security

Dates: December 2-5, 2012
Location: Tenerife, Spain
Invitees: Open to the scientific community and general public
Location: Tenerife, Spain

Webinar Description: A detailed Technical Program can be found http://www.wifs12.org/technical_program.html

Registration link


 

Cyber-Enabled Sustainability Science and Engineering (CyberSEES)

Dates: November 19, 2012, 4 to 5 p.m
Location: Coimbatore, India
Contacts: Kenneth Whang (703) 292-5149 or kwhang@nsf.gov
Invitees: Open to the scientific community and general public

Webinar Description: The Cyber-Enabled Sustainability Science and Engineering (CyberSEES) program aims to advance interdisciplinary research in which the science and engineering of sustainability are enabled by new advances in computing, and where computational innovation is grounded in the context of sustainability problems. The CyberSEES program is one component of the National Science Foundation's Science, Engineering, and Education for Sustainability (SEES) activities, a foundation-wide effort aimed at addressing the challenge of sustainability through support for interdisciplinary research and education. In the SEES context, a sustainable world is one where human needs are met equitably without harm to the environment or sacrificing the ability of future generations to meet their own needs. This program is a joint effort of all of the NSF organizations listed on the cover page and the Semiconductor Research Corporation (SRC), through its Energy Research Initiative (ERI) program. While the scope of CyberSEES is broad as detailed herein, the NSF and SRC ERI collaboration within CyberSEES focuses on cyber-enabled sustainability research that addresses computational aspects of smart infrastructures, in particular the smart electric grid.


 

Machine-to-Machine Communications and Internet of Things

Dates: November 15, 2012, 11:30 for Pizza and Noon for Seminar

Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105
Invitees: Open to the general public, faculty, staff and students

Seminar Description: Machine-to-machine (M2M) communications, involving wide area communication of sensor data to an Internet based application, is emerging as an important paradigm in communications. With diminishing voice revenues, mobile network operators are increasingly relying on data services for revenue growth and M2M is a major area of focus within data services. Projections for number of M2M communication devices are around 12 Billion devices by the end of the decade with over 2 Billion M2M devices expected to directly attach to the mobile network by 2020. We will describe the current M2M market environment, emerging M2M solution architecture and various technology enhancements that will enable this phenomenal growth. We will also discuss ongoing standards activity in M2M and then summarize some of the main challenges that need to be addressed to realize the vision where everything is connected.

Speaker/Biography: Dr. Harish Viswanathan : Dr. Harish Viswanathan received his bachelor degree in Electrical Engineering from Indian Institute of Technology, Chennai, India, and M.S. and Ph.D. degrees from the School of Electrical Engineering, Cornell University, Ithaca, New York. Since joining Alcatel-Lucent, Bell Labs in October 1997 he has worked on multiple antenna technology for cellular wireless networks, network optimization, mesh networking, mobility management and optimization of video over mobile networks. He is currently CTO Advisor for M2M and Devices in the Corporate CTO organization within Bell Labs. His current responsibilities include identifying strategic directions that Alcatel-Lucent should pursue in the M2M and sensor networks areas and architecting end-to-end solutions for sensor related applications.


 

IEEE Smart Tech Metro Area Workshop

Dates: October 19-20, 2012
Location: Crowne Plaza White Plans, Westchester, NY
Costs: $129 for members and $179 for non-members, when you register by 15 September. Early Bird rates extended to 15 September
Invitees: Open to the general public, faculty, staff and students

Workshop Description: The two-day intensive Smart Tech Workshop offer parallel, all-day track sessions that allow attendees to immerse themselves in a given technology. The agenda and course description for each track can be found here.
Attendees may choose one full-day track on each day of IEEE Smart Tech, or two half day courses.


 

FlashLinq: Enabling Proximal Internet

Dates: Thursday, October 11, 2012 Hours: 12 p.m.
Location: Fairleigh Dickinson University, Muscarelle Center, Auditorium 105
Host: Fairleigh Dickinson University, Gildart Haase School of Computer Science and Engineering (GHSCSE) and the IEEE North Jersey Section Computer Society Chapter
Invitees: Open to the general public, faculty, staff and students

Program Description: FlashLinQ is a wireless communications system founded on the realization of a "wireless sense"-a sense whose embodiment in devices provides Internet application peers with a direct awareness of each other's physical proximity and relevance, creating a new form of proximity-aware internetworking, and thereby realizing a necessary step towards what we term a "Mobile Proximal Internet". The need for such a system arises from the pervasive spread of Internet devices and applications in our daily lives, and the practical limitations of current communications technologies in conveying knowledge of mutual proximity and relevance. In this talk, we introduce a mobile proximity-aware social network use case and describe the overview of air link technology.

Speaker/Biography: Dr. Junyi Li : Dr. Junyi Li is a Vice President of Engineering at Qualcomm Flarion Technologies, responsible for conceptualizing and developing next-generation wireless networking solutions. He was a key inventor of Flash-OFDM, arguably the first commercially deployed OFDMA-based mobile broadband wireless communications system. He holds over 150 U.S. patents and has more than 400 pending patent applications. He was a founding member of Flarion Technologies, a startup acquired by QUALCOMM in 2006. Prior to that, he was with Bell-Labs research in Lucent Technologies. He has a Ph.D. degree in E.E. from Purdue University and an MBA from the Wharton School at University of Pennsylvania. He is a Fellow of the IEEE.


 

Cyber Warfare - Dawn Of A New Era In Computers & Communications

Dates: September 20, 2012 from 11:30 to 2 p.m
Location: Fairleigh Dickinson University (FDU) Muscarelle Center, Auditorium 105, 1000 River Rd, Teaneck, NJ 07666
Sponsors: The IEEE North Jersey Section Computer Society Chapter and the Gildart Haase School of Computer Sciences and Engineering at FDU
Host: The Seminar was organized by Dr. Hong Zhao, Assistant Professor, Fairleigh Dickinson University, GHSCSE, and Computer Society Chair of IEEE North Jersey Section. IEEE responsibilities include organizing seminars and meetings for computer society.
Invitees: IEEE seminar series are open to the university public, both faculty and students.

Seminar Description: President Obama's words, "cyber threat is one of the most serious economic and national security challenges we face as a nation" are now being echoed by many around the world. Recently, Gen. Keith Alexander, who commands the U.S. Cyber Command, stated that the capability exists today for destructive cyber attacks against critical infrastructures. Stuxnet and Flame were just two (now known) viruses that have unleashed significant destruction against Iran's nuclear program. In this talk, Dr. Pruthi will give an overview of the cyber security threat landscape, from cyber wars to espionage to hacktivism and everything in between. Traditional cyber defense tools and techniques will be discussed and their weaknesses will be highlighted. A case will be made for novel computer and communications technologies necessary to address the ever growing threat vectors. New technologies and paradigms and efficient strategies that are proving effective against sophisticated advanced persistent threats, trojans, botnets and worms will be discussed.

Speaker Biography: Dr. Parag Pruthi: Dr. Pruthi is the Founder and CEO of NIKSUN which he has built from a startup to a highly successful global ompany in the cyber security, wireless, and network monitoring markets. Recognized as one of the foremost experts in advanced cyber security technologies, Dr. Pruthi advises on cyber defense strategies with some of the highest levels of governments and enterprises around the world. He is a frequent speaker on cyber security issues, including keynotes to delegates from across 28 NATO nations, agencies, and strategic commands at the NATO Information Assurance Symposium 2010, 2011, and 2012. Dr. Pruthi received his Doctorate in Telecommunications from The Royal Institute of Technology, Stockholm, Sweden, and his thesis, "An Application of Chaotic Maps to Packet Traffic Modeling," was the first to apply chaotic and fractal systems to accurately model the seemingly erratic nature of network traffic. Dr. Pruthi continues to drive the advancement of cyber security and network monitoring applications and practices to new levels, regularly introducing highly innovative and state-of-the-art products that continue to pave the way in the industry.


 

Third Cyber Infrastructure Protection Conference 2012

Dates: September 13-14, 2012 (see program below for times)
Location: City College of New York, New York, NY10031
Host: CCNY and SSI, US Army War College, and Co-sponsored by IEEE New York Section and Computer Society NYC Chapter, http://www.ccny.cuny.edu/cip.
Invitees: Open to the general public, faculty, staff and students

Conference Description/Program:
Thursday, September 13

08:00- 04:00

Registration (Open to the General Public)

09:00- 09:15

Conference Chairs: Tarek Saadawi (City University of New York, City College), Colonel Louis Jordan (SSI, US Army War College)

09:15- 10:00

Keynote Speaker:
Prosecuting Cyber crime: An overview of the Manhattan District Attorney's Office's efforts to combat cyber crime and identity theft, David Szuchman, NYC DA

10:00- 10:15

Networking - Coffee Break

10:15- 11:45

Session I: Cyber Infrastructure

  • Practices for Winning the Battle against Insider Threats, Carly Lauren Huth, SEI, Carnegie Mellon University
  • Protecting a Global Services Company in a World of Evolving Threats , John Gevertz, ADP
  • (TBA) , E. Alshaer, University of North Carolina (To Be Confirmed)

12:00- 01:30

Luncheon

01:30- 02:15

Keynote Speaker:
Leveraging Cyber Militias as a Force Multiplier in Cyber Operations, Major Scott D. Applegate, George Mason University

02:15- 02:30

Coffee Break

02:30- 04:30

Session II: Cyber Crime
Session Chair: Douglas Salane from the Center for Cybercrime Studies, John Jay College

  • Cybercrime & Information Security Risks: New rewards & new risks - Why a different approach is needed. Mehul J. Vaidya, PricewaterhouseCoopers, LLP
  • Cyber Fraud Trends - The Musical, David Nelson, FDIC
  • Legislative and Regulatory Attempts to Address Cyber Crime: the Good, the Bad and the Ugly. Douglas Salane, Evan Misshula , John Jay College, CUNY
  • Analyzing Search-Engine Manipulation Campaigns. Nicolas Christin, CyLab, Carnegie Mellon


Friday, September 14

09:00- 09:45

Keynote Speaker:
Internet Security, William Cheswick

10:00- 10:15

Networking Coffee Break

09:15- 10:00

Keynote Speaker:
Prosecuting Cyber crime: An overview of the Manhattan District Attorney's Office's efforts to combat cyber crime and identity theft, David Szuchman, NYC DA

10:00- 10:15

Networking - Coffee Break

10:15- 11:45

Session III: Policy and Decision Making
Session Chair: Thomas Holt, Michigan State University

  • Predicting Cyber Attacks Against Critical Infrastructure, Thomas J. Holt, Michigan State University
  • Offender Decision Making in Industrial Control Systems Cybercrime, Aunshul Rege, Temple University
  • Cybercrime and Cyber-attacks Associated with China: Economic and Institutional Consideration, Nir Kshetri, University of North Carolina-Greensboro

11:45- 2:00

Luncheon

01:30- 02:15

Keynote Speaker:
Leveraging Cyber Militias as a Force Multiplier in Cyber Operations, Major Scott D. Applegate, George Mason University

02:15- 02:30

Coffee Break

02:30- 04:30

Session II: Cyber Crime
Session Chair: Douglas Salane from the Center for Cybercrime Studies, John Jay College

  • Cybercrime & Information Security Risks: New rewards & new risks - Why a different approach is needed. Mehul J. Vaidya, PricewaterhouseCoopers, LLP
  • Cyber Fraud Trends - The Musical, David Nelson, FDIC
  • Legislative and Regulatory Attempts to Address Cyber Crime: the Good, the Bad and the Ugly. Douglas Salane, Evan Misshula , John Jay College, CUNY
  • Analyzing Search-Engine Manipulation Campaigns. Nicolas Christin, CyLab, Carnegie Mellon

 

Overview of the National Initiative for Cybersecurity Education (NICE)

Dates: August 16, 2012 at 12:00-1:00pm

Location: Webinar. Registration was required
Host: NICE

Webinar Description: This presentation is an overview of the National Initiative for Cybersecurity Education (NICE). Initiative history, current status, and future directions will be covered along with insight into how cybersecurity education, awareness, training, and workforce development all interact and enable the larger Science, Technology, Engineering, and Mathematics (STEM) education enterprise of this country. A National Cybersecurity Workforce Framework document has been produced as part of this effort and provides the opportunity for the first time to discuss the total cybersecurity workforce using a common language. The ongoing adaption of this document inside and outside of Federal government will also be discussed.

Speaker(s): In early 2010 the National Institute of Standards and Technology (NIST) was selected as the lead agency for the National Initiative for Cybersecurity Education (NICE) and they identified Dr. McDuffie to be the Lead for this effort and has now completed his transition to this new position. In his previous position he had been appointed the Associate Director of the National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD) in February 2008. From early September 2009 until early November 2009 he served as Acting Director of the NCO. His appointment as the Associate Director of the NCO comes after joining the NIST as a Computer Scientist in their Information Technology Laboratory, Office of Federal and Industrial Relations. In August 2006, Dr. McDuffie joined the NCO where he served as the Technical Coordinator for the Cyber Security and Information Assurance (CSIA) Interagency Working Group (IWG), Federal Agency Administration of Science and Technology Education and Research (FASTER) Committee of Practice (CoP), and the Software Design and Productivity (SDP) Coordination Group (CG). Prior to joining the NCO, Dr. McDuffie served as the Deputy Director of the Office of Naval Research (ONR) - Science and Technology for America's Readiness (N-STAR) Initiative. He served as the Lead Program Director for the Federal Cyber Service: Scholarship for Service (SFS) Program at the National Science Foundation (NSF). He served as an Assistant Professor at Florida State University in the Department of Computer Science where he taught both graduate and undergraduate courses in CS for seven years. Dr. McDuffie has participated in software engineering projects for the U.S. Air Force, the National Center for Atmospheric Research, the Federal Aviation Administration, Lockheed Missiles and Space Company, Los Alamos National Laboratory, and the National Security Agency. Dr. McDuffie received his Ph.D. and M.S. degrees in Computer Science from the Florida Institute of Technology in Melbourne, Florida.


 

14th Information Hiding Conference

Dates: May 15-18, 2012
Location:Berkeley, California
Invitees: Open to the public, faculty, students and staff.

Course Description: For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled.

Topics: Prospective authors are invited to submit the manuscripts of their original research contributions to iccci2013@siet.ac.in, review articles are also invited. Soft copy (.doc or .pdf formats) of the full papers not exceeding six pages and as per IEEE style which can be found in the conference website shall be submitted for the conference. Further, the paper should contain name of the corresponding author with E-mail ID and affiliation of all authors. Please indicate the discipline of the paper in the subject column of the mail. All the submitted papers will be sent for peer review and the corresponding author will be notified the outcome of the review process. If reviewers recommend for further improvements in the paper, the paper will be sent back to the corresponding author and the revised version should be submitted with in fifteen days on the date of receipt. Proceedings of ICCCI 2013 will be archived in IEEE Xplore Digital library.

Program and Speakers
Presentations and Proceedings


 

Expeditions in Large-Scale Computational Science on Production Distributed Cyber Infrastructure

Dates: March 7, 2012 from 11:30 a.m. to 1:30 p.m

Location:Fairleigh Dickinson University, Auditorium M105, Muscarelle Center, Teaneck, New Jersey 07666
Invitees: Open to the public, faculty, students and staff.

Course Description: Dr. Jha will discuss a series of cross-disciplinary research projects he has been involved in over the past several years. The ultimate aim of these projects has been to further an understanding of scientifically important processes. But the aim has not been confined to performing leading domain science; it has also been to develop the algorithms, formalisms and infrastructure to enable such science, at scales and with a sophistication and reduced time-to-solution that would not be possible otherwise. Dr. Jha posits that this requires working at the triple point of Computer Science, Computational Science and Cyber-infrastructure Research. Dr. Jha will present how these three strands come together to enable scientific advances in several grand challenge problems facing the Computational Biology community, for example data-analytics for next-generation gene sequencing, enhanced sampling algorithms at scale, and in-silico personalized and predictive health-care

Speaker Biography: Dr. Shantenu Jha is an Assistant Professor at Rutgers University, and a member of the Graduate Faculty in the School of Informatics at the University of Edinburgh (UK), as well as a visiting scientist at University College London. Till recently (08/2011) he was the Director, for Cyber-infrastructure Development at the CCT at Louisiana State University (LSU). His research interests lie at the triple point of Computer Science, Cyber-infrastructure Development and Computational Science. Prof. Jha leads the SAGA project (http://www.saga-project.org), which is an OGF standard and is part of the official middleware/software stack of most major Production Distributed Cyber-infrastructure -- such as US NSF's XSEDE and the EGI. Jha currently is the lead author of a book on "Abstractions for Distributed Applications and Systems: A Computational Science Perspective" to be published by Wiley in early 2012. He is the author of more than 60 publications. Jha is a co-PI for $2.6M NSF award that enables LSU/LONI participation as a TeraGrid Resource Provider. He is also the co-PI of a prestigious NSF award, "Large-Scale Replica-Exchange Studies Using Production Cyber-Infrastructure"; his work has been funded by US National Institute for Health (NIH) as we all as the UK EPSRC (OMII-UK project and Research theme via e-Science Institute).