Academia

The document was issued by academy or academy organization.
news

Visible to the public CyberSTEM Camps at Maryland CyberSecurity Center (2017)

MC2 facilitates a wide variety of educational opportunities on the UMD campus. MC2 also sponsors a number of educational/outreach events for lower-school, middle-school, and high-school students, especially targeting women and under-represented minorities. MC2 will host two camps in Summer 2017 focusing on STEM and cybersecurity topics.

CyberSTEM Camp for Girls entering 7th and 8th Grade
Dates: Monday, July 17 - Friday, July 21, 2017

file

Visible to the public Design Studio for Rigorous System Design using Architecture Styles and BIP

Presented as part of the 2017 HCSS conference.

ABSTRACT

file

Visible to the public Keynote Presentation: Differential Privacy and Data Analysis

ABSTRACT: In this talk, we will give a friendly introduction to Differential Privacy, a rigorous methodology for analyzing data subject to provable privacy guarantees, that has recently been widely deployed in several settings.

file

Visible to the public Security of Cyber-Physical Systems: Challenges and Approaches

ABSTRACT: Cyber-physical systems (CPS) are used to monitor and control real-world systems, ranging from implantable life-critical medical devices to large safety-critical infrastructures.

file

Visible to the public An Approach to Incorporating Uncertainty in Network Security Analysis

ABSTRACT: Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets.

file

Visible to the public Learning a Privacy Incidents Database

ABSTRACT: A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype.

file

Visible to the public Global Variation in Attack Encounters and Hosting

ABSTRACT: Countries vary greatly in the extent to which their computers encounter and host attacks. Empirically identifying factors behind such variation can provide a sound basis for policies to reduce attacks worldwide.

file

Visible to the public Surveying Security Practice Adherence in Software Development

ABSTRACT: Software development teams are increasingly incorporating security practices in to their software development processes. However, little empirical evidence exists on the costs and benefits associated with the application of security practices.