Congratulations! Rutgers, The State University of New Jersey has been designated as a National Center of Academic Excellence in Cyber Defense Research through academic year 2021.
Wednesday, April 8, 2015
Kudos to Rutgers, The State University of New Jersey for this accomplishment.
Congratulations! Rutgers, The State University of New Jersey has been
designated as a National Center of Academic Excellence in Cyber
Defense Education through academic year 2021.
Saturday, March 21, 2015
Kudos to Rutgers, The State University of New Jersey for this
NSF FEDERAL CYBER SERVICE SCHOLARSHIP APPLICATION
Monday, Februray 17, 2014
National Science Foundation started the Federal Cyber Service program about 12 years ago as a means to increase the number of qualified students in the area of computer security and information assurance. The motivation was to build capacity in the U.S. higher education enterprise to deal with the shortage of skilled professionals in the IA and security fields at the various federal agencies. This is one of the high-profile programs started by NSF and during the past few years, universities took up the challenge and produced hundreds of scholars who are now working for the federal government. This program is called Scholarship for Service (SFS).
NSF SFS Scholarships for 2014: Deadline February 28, 2014.
[Workshop:] DIMACS/RUCIA Workshop on Information Assurance in the Era of Big Data
Monday, Februray 3, 2014
This workshop is designed to provide a forum for Information Assurance researchers and practitioners to share their research, experiences, and challenges in the Big Data era. Complex, heterogeneous, dynamic big data are generated from the Internet, social media, retail, finance, healthcare, and more. This data carries with it both information assurance challenges and information assurance opportunities. For example, can be used to help companies address many of the enterprise IT security issues they face today. It can help them understand activities on their networks in near real-time, giving them the ability to make better decisions on information assurance. Leveraging big data in an organization's information assurance program requires an infrastructure capable of capturing viable, time-sensitive information on both the infrastructure's overall state and its internal operations. Conversely, big data itself presents information assurance challenges: data must be collected and maintained in a way that protects its confidentiality and integrity, and must be used in a way that addresses privacy concerns of data subjects.
This workshop will provide the scientific and industry community a dedicated forum for discussing state-of-the-art research on big data analysis, mining, understanding, learning, and security, as well as the data management architecture and visualization of very large data sets.
[Summer Camp:] 2013 Science & Technology Summer Camp at Rutgers!
Monday, July 1, 2013
Engaging young minds in Science, Technology, Engineering and Math is a national priority in creating tomorrow’s work force in this age of information and rapid globalization.This year’s summer camp promises to be an exciting experience that will be full of fun as well as it will be an academically enriching experience.
Using advanced Computer and Information technology, students will learn how to organize, manage and transform business and scientific data to create useful information.
[Topic:] Games, Privacy and Distributed Algorithms for the Smart Grid
Monday, November 5, 2012
Professor H. Vincent Poor from Princeton University gave the talk at Janice Levin, Room 130, 1pm (Video conference at 1 Washington Park, Room 1027).
Smart grid involves the imposition of an advanced cyber layer atop the physical layer of the electricity
grid in order to improve the efficiency and lower the cost of power use and distribution, and to allow for
the effective integration of variable energy sources and storage modes into the grid. This cyberphysical setting motivates the application of many techniques from the information and systems
sciences to problems arising in the electricity grid, and considerable research effort has been devoted to
such application in recent years. This talk will describe recent work on three aspects of this problem:
applications of game theory to smart grid design; characterization of the fundamental tradeoff between
privacy and utility of information sources arising in the grid; and the design of distributed algorithms
for inference and control that are suitable for the topological constraints imposed by the structure of the
[Award from National Science Foundation (NSF)]
Enhancing the Capacity for Information Assurance Education Through Interdisciplinary Collaboration
September 3, 2012
This project is increasing Rutgers University's capacity to produce highly trained information assurance (IA) professionals by developing new interdisciplinary degree programs at both the graduate and undergraduate levels. A unique aspect of the effort is that it addresses the dependability of the information and information services, as well as the big data and cloud computing infrastructure, in an integrated manner.
- Hui Xiong email@example.com (Principal Investigator)
- Rebecca Wright (Co-Principal Investigator)
- Hoang Pham (Co-Principal Investigator)
- Manish Parashar (Co-Principal Investigator)
- Thu Nguyen (Co-Principal Investigator)
[Invited Talk] Professor Bob Grossman gave a talk about Science Clouds and Their Impact on Big Data Science.
February 21, 2012
Professor Grossman is the Director of Informatics at the Institute for Genomics and Systems Biology, University of Chicago and the Open Cloud Consortium.
Professor Hui Xiong has received the unrestrictive grant ($50,000) from AwarePoint Inc.
November 15, 2011
Professor Xiong has received the unrestrictive grant ($50,000) from AwarePoint Inc. for the research on health asset management.
Awarepoint is the leader in providing workflow automation and tracking solutions to the acute care hospital marketplace. Real-time Location System (RTLS) solutions have quickly become must-have tools for hospitals tackling asset management, compliance, and efficient patient throughput challenges. Ever increasing numbers of advanced healthcare provider organizations are turning to Awarepoint and our software and technology platform solution as their RTLS-enabled workflow automation provider of choice. Awarepoint's industry leading RTLS solutions portfolio addresses needs throughout the hospital enterprise versus a best-of-breed island approach that forces hospitals to manage a multitude of vendor solutions for asset tracking and patient flow.
Congratulations to Professor Manish Parashar for the grant "Trusted Content and Context Aware Management and Processing of Managed Information Objects", USAF, AFMC, Air Force Research
Laboratory, $200,000, 09/11 -- 08/13
October 28, 2011
The overarching objective of this effort is to research and provide
algorithmic results as well as implemented mechanisms for the
distributed processing of managed information objects (MIO) and the
data necessary, to support Pub/Sub messaging and Brokering and
specifically the Phoenix/JBI model. The goal is to provide the
fundamental algorithms and mechanisms for data and metadata management
in a trusted network to support intelligent decision-making. Key
research components of this effort include:
Architect and implement a secure overlay composed of the C2TR
nodes/components that is scalable, self-organized and resilient.
Develop algorithms and mechanism for the online indexing of
meta-data associated with the MIO as well as relevant context
Develop resilient MIO handling mechanisms based on meta-data as
well as context.
Develop messaging abstractions based on the routing substrate
and secure overlay to support publish/subscribe/notification services
that are aware of and responsive to credentials, content, context and
Formulate mechanism for transforming data in-transit to "make
the data right" for the destination.
This work will be done in the context of the Air Force's Context and
Content-aware Trusted Router Program (C2TR) and in close collaboration
with AFRL scientists as well as with researchers at University of
Florida who also are engaged in the C2TR project. The research
elements will be consistent with Phoenix architecture tenets, and also
in concert with the effort to reduce the Phoenix architecture into an
embeddable version suitable for the C2TR components.
RUCIA has successfully organized the 2010 Secure Knowledge Management Workshop (SKM-2010).
November 12, 2010
The workshop web site is http://skm2010.rutgers.edu. Dr. Kevin Kwiat from Air Force Research Laboratory gave a keynote talk on "Surviving in Cyberspace".