Congratulations! Rutgers, The State University of New Jersey has been designated as a National Center of Academic Excellence in Cyber Defense Research through academic year 2021.

Wednesday, April 8, 2015

Kudos to Rutgers, The State University of New Jersey for this accomplishment.

Congratulations! Rutgers, The State University of New Jersey has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2021.

Saturday, March 21, 2015

Kudos to Rutgers, The State University of New Jersey for this accomplishment.


Monday, Februray 17, 2014

National Science Foundation started the Federal Cyber Service program about 12 years ago as a means to increase the number of qualified students in the area of computer security and information assurance. The motivation was to build capacity in the U.S. higher education enterprise to deal with the shortage of skilled professionals in the IA and security fields at the various federal agencies. This is one of the high-profile programs started by NSF and during the past few years, universities took up the challenge and produced hundreds of scholars who are now working for the federal government. This program is called Scholarship for Service (SFS).

NSF SFS Scholarships for 2014: Deadline February 28, 2014.

[Workshop:] DIMACS/RUCIA Workshop on Information Assurance in the Era of Big Data

Monday, Februray 3, 2014

This workshop is designed to provide a forum for Information Assurance researchers and practitioners to share their research, experiences, and challenges in the Big Data era. Complex, heterogeneous, dynamic big data are generated from the Internet, social media, retail, finance, healthcare, and more. This data carries with it both information assurance challenges and information assurance opportunities. For example, can be used to help companies address many of the enterprise IT security issues they face today. It can help them understand activities on their networks in near real-time, giving them the ability to make better decisions on information assurance. Leveraging big data in an organization's information assurance program requires an infrastructure capable of capturing viable, time-sensitive information on both the infrastructure's overall state and its internal operations. Conversely, big data itself presents information assurance challenges: data must be collected and maintained in a way that protects its confidentiality and integrity, and must be used in a way that addresses privacy concerns of data subjects.

This workshop will provide the scientific and industry community a dedicated forum for discussing state-of-the-art research on big data analysis, mining, understanding, learning, and security, as well as the data management architecture and visualization of very large data sets.


[Summer Camp:] 2013 Science & Technology Summer Camp at Rutgers!

Monday, July 1, 2013

Engaging young minds in Science, Technology, Engineering and Math is a national priority in creating tomorrow’s work force in this age of information and rapid globalization.This year’s summer camp promises to be an exciting experience that will be full of fun as well as it will be an academically enriching experience.

Using advanced Computer and Information technology, students will learn how to organize, manage and transform business and scientific data to create useful information.


[Topic:] Games, Privacy and Distributed Algorithms for the Smart Grid

Monday, November 5, 2012

Professor H. Vincent Poor from Princeton University gave the talk at Janice Levin, Room 130, 1pm (Video conference at 1 Washington Park, Room 1027).

Abstract: Smart grid involves the imposition of an advanced cyber layer atop the physical layer of the electricity grid in order to improve the efficiency and lower the cost of power use and distribution, and to allow for the effective integration of variable energy sources and storage modes into the grid. This cyberphysical setting motivates the application of many techniques from the information and systems sciences to problems arising in the electricity grid, and considerable research effort has been devoted to such application in recent years. This talk will describe recent work on three aspects of this problem: applications of game theory to smart grid design; characterization of the fundamental tradeoff between privacy and utility of information sources arising in the grid; and the design of distributed algorithms for inference and control that are suitable for the topological constraints imposed by the structure of the grid.

[Award from National Science Foundation (NSF)] Enhancing the Capacity for Information Assurance Education Through Interdisciplinary Collaboration

September 3, 2012

This project is increasing Rutgers University's capacity to produce highly trained information assurance (IA) professionals by developing new interdisciplinary degree programs at both the graduate and undergraduate levels. A unique aspect of the effort is that it addresses the dependability of the information and information services, as well as the big data and cloud computing infrastructure, in an integrated manner.


[Invited Talk] Professor Bob Grossman gave a talk about Science Clouds and Their Impact on Big Data Science.

February 21, 2012

Professor Grossman is the Director of Informatics at the Institute for Genomics and Systems Biology, University of Chicago and the Open Cloud Consortium.

Professor Hui Xiong has received the unrestrictive grant ($50,000) from AwarePoint Inc.

November 15, 2011

Professor Xiong has received the unrestrictive grant ($50,000) from AwarePoint Inc. for the research on health asset management. Awarepoint is the leader in providing workflow automation and tracking solutions to the acute care hospital marketplace. Real-time Location System (RTLS) solutions have quickly become must-have tools for hospitals tackling asset management, compliance, and efficient patient throughput challenges. Ever increasing numbers of advanced healthcare provider organizations are turning to Awarepoint and our software and technology platform solution as their RTLS-enabled workflow automation provider of choice. Awarepoint's industry leading RTLS solutions portfolio addresses needs throughout the hospital enterprise versus a best-of-breed island approach that forces hospitals to manage a multitude of vendor solutions for asset tracking and patient flow.

Congratulations to Professor Manish Parashar for the grant "Trusted Content and Context Aware Management and Processing of Managed Information Objects", USAF, AFMC, Air Force Research Laboratory, $200,000, 09/11 -- 08/13

October 28, 2011

The overarching objective of this effort is to research and provide algorithmic results as well as implemented mechanisms for the distributed processing of managed information objects (MIO) and the data necessary, to support Pub/Sub messaging and Brokering and specifically the Phoenix/JBI model. The goal is to provide the fundamental algorithms and mechanisms for data and metadata management in a trusted network to support intelligent decision-making. Key research components of this effort include:

  1. Architect and implement a secure overlay composed of the C2TR nodes/components that is scalable, self-organized and resilient.
  2. Develop algorithms and mechanism for the online indexing of meta-data associated with the MIO as well as relevant context information.
  3. Develop resilient MIO handling mechanisms based on meta-data as well as context.
  4. Develop messaging abstractions based on the routing substrate and secure overlay to support publish/subscribe/notification services that are aware of and responsive to credentials, content, context and capabilities.
  5. Formulate mechanism for transforming data in-transit to "make the data right" for the destination.

This work will be done in the context of the Air Force's Context and Content-aware Trusted Router Program (C2TR) and in close collaboration with AFRL scientists as well as with researchers at University of Florida who also are engaged in the C2TR project. The research elements will be consistent with Phoenix architecture tenets, and also in concert with the effort to reduce the Phoenix architecture into an embeddable version suitable for the C2TR components.

RUCIA has successfully organized the 2010 Secure Knowledge Management Workshop (SKM-2010).

November 12, 2010

The workshop web site is Dr. Kevin Kwiat from Air Force Research Laboratory gave a keynote talk on "Surviving in Cyberspace".

About Us | Contact Us | © 2014 Rutgers Center for Information Assurance