Houston Security Day
University of Houston, Texas Southern University, University of Houston – Downtown
Dates: Tuesday, October 13th, 2015 (8:30 A.M. - 5:00 P.M.)
Venue: University of Houston PGH 563 [Map]
This workshop will cover 13 innovative, plug-and-play modules on security topics being developed by faculty at three Houston universities. The modules are organized around three themes: Security Analytics, Distributed Networks and Beyond Computer Science. The goal is to enrich curricula with security topics in computer science courses as well as disciplines beyond computer science. Each module will provide educators with a complete set of materials, including homework, quizzes and hands-on exercises as appropriate, for faculty and advanced graduate students who are interested in teaching security concepts. Partial NSF support for travel will be available to qualified workshop participants.
2 Keynote talks from academia/industry are planned along with a Poster session for Security Research.
Register HERE! Registration Closed!
We are accepting Poster Submissions NOW! Poster Submission Details here.
To submit your posters: send your abstract idea and details to firstname.lastname@example.org
- Natural Language Processing Techniques for Security: Learn how text mining techniques can be used to extract important information and thwart social engineering attacks.
- Data Mining for Security: The National Security Agency has been using data mining techniques for counter-terrorism according to a media article.
- Machine Learning for Security: Can we design programs that evolve to defeat clever attackers? Machine learning teaches how.
- Markov chains and Security: What I plan to cover is to introduce the Markov chains and use that to describe the vulnerability defined by exploitability score. Quantification of Cyber Security Attack Graph. Description of the Cyber Security Vulnerability Process.
- Privacy Preservation in Data Mining: Two major breaches last year of U.S. government databases holding personnel records and security-clearance files exposed sensitive information about at least 22.1 million people, including not only federal employees and contractors but their families and friends.
Security and Privacy in Distributed Network
- Mobile Privacy and Security: In 2013, more than 1200 fraudulent mobile applications, designed to steal users' formation, were published and downloaded thousands of times.
- Security and Protocols for Wireless Sensor Networks: The modules that will be covered: Security of Wireless Sensor Networks (WSNs), Security Protocols and Mechanisms for WSNs and WSN Attack and Countermeasure. The modules describe the characteristics of Wireless sensor networks (WSN), their applications and some examples of WSN test beds and deployments.
- Timing and Implementation Issues for Wireless Sensor Networks
- Intrusion Detection
Security beyond Computer Science
- Electronic Voting: Voting is the bedrock of democracy. Learn about problems and challenges of using computers and the Internet in voting.
- Inference Control: Statistical information is of significant importance in modern society; at the same time, there are legal mandates to protect some of the information stored in statistical databases. Learn about problems and challenges of achieving this protection.
- Internet Crime: Criminals are clearly assisted by computers in their behavior. However there are new types of crimes that only possible because of computers and networks. Learn about the problems and challenges inherent in these ubiquitous communication tools.
- Protecting Digital Content: Most digital content is intellectual property and therefore belongs to someone. Find out how this property can be protected against unauthorized use.
- Topic: Big Data and Cyber Security: A Statistical Viewpoint
- Speaker: David Marchette
- Abstract: Computer security naturally results in very large amounts of extremely complex data, and this provides unique challenges. The speaker will discuss some of the problems inherent in computer security from the perspective of a statistician, in particular the problems involved in obtaining good data from which to design detectors and classifiers for computer and network intrusion detection. The speaker will discuss some of the methodologies that statistics and machine learning bring to the table, and will illustrate some of these ideas on a small problem of classifying malicious code.
- Bio: Dr. David Marchette is a Principal Scientist at the Naval Surface Warfare Center, Dahlgren Division (NSWCDD), Dahlgren, VA where he is responsible for leading basic and applied research projects in computational statistics, graph theory, network analysis, pattern recognition, computer intrusion detection and image analysis.
- Topic: Modern cyber threats and practical security in action
- Speaker: Michael van Strien
- Abstract: Businesses today, large and small, are constantly targeted by cyber criminals. Whether the threat is corporate espionage or politically motivated, companies of all sizes need to be prepared to protect their systems. This presentation looks at the gamut of sources of attack and the methods organizations use to keep their data safe.
- Bio: Michael van Strien has over twenty years of cyber security experience. He spent a decade running ethical hacking engagements for KPMG in Chicago, London and globally. He has been in Houston for ten years working in the Oil & Gas industry helping to make things more difficult for hackers. Michael has an undergraduate degree in Computer Science from John Carroll University and a masters of business administration from the University of Edinburgh and ENPC Paris.
Information for Parking and Transportation at University of Houston
Preferable Parking Spots for Visitors:
- Covered parking garage for visitors at Cullen-Holman
- UH Hilton Visitor's parking
For more information contact: Rakesh Verma at email@example.com