CI master students’ research accepted at the KES2020 international conference in Verona

KES 2020 in Verona but virtual

CSUCI Master of Computer Science students were successful in submitting two papers to KES 2020, the 24rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, which this year is taking place in Verona, Italy, in September 2020. However, due to the COVID pandemic, the conference will be held virtually. The papers are the following:

  • Malware Persistence Mechanisms, co-authored by Zane Gittins and Michael Soltys. Zane Gittins is a masters student in Computer Science at CSUCI, and this paper is the result of his masters thesis. Zane Gittins has worked as a Cybersecurity experts at HAAS, and currently is working at Meissner Filtration. (This paper will be presented in the General Track session G3b: Cybersecurity.)
  • Voyager: Tracking with a Click, co-authored by Samuel Decanio, Kimo Hildreth and Michael Soltys. Sam Decanio is a masters student in Computer Science at CSUCI, and this paper is the result of his masters thesis and a fruitful collaboration between Computer Science at CI and the SoCal High Technology Task Force. Sam Decanio is currently working at the Navy. (This paper will be presented in the General Track session G3b: Cybersecurity.)

IEEE Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS) 2021 conference

May 17 – 19, 2021, McMaster University, Hamilton, ON, CANADA

IEEE RDAAPS is the first annual international conference on research in the broadly defined area of data analytics. It brings together researchers from academia, industry, and the public sector to present and discuss various aspects of data analytics, including privacy, security, and automation. This venue is meant to bring together stakeholders whose interests lie at the interface of these concerns, providing a platform for integrating the needs of industry with state-of-the-art scientific advancements, and inspiring original research on solving enterprise data challenges. IEEE RDAAPS seeks papers presenting original research in the areas including, but not limited to:

Big Data Analytics for Decision Making

  • New models and algorithms for data analytics
  • Scalable data analytics
  • Optimization methods in data analytics
  • Theoretical analysis of data systems
  • Analytical reasoning systems
  • Decision making under uncertainty
  • Learning systems for data analytics
  • Large-scale text, speech, image, or graph processing systems

Accountable Data Analytics

  • Privacy-aware data analytics
  • Fairness in data analytics
  • Interpretable and transparent data analytics
  • Data analytics incorporating legal and ethical factors

Strings in Data Analytics

  • Patterns in Big Data
  • Data compression
  • Bioinformatics
  • Algorithms and data structures for string processing
  • Useful data structures for Big Data
  • Data structures residing on secondary storage

Security in Data Analysis

  • Traceability of decision making
  • Models for forecasting cyber-attacks and measuring impact
  • Data usage in mounting security threats
  • Data analytics for better situational awareness

Domain knowledge modelling and generation

  • Novel ontology representations
  • Scalability of domain-based reasoning on big data
  • Modelling and analyzing unstructured data sets

Automation for data analytics, security, and privacy in manufacturing

  • Application of data analysis in manufacturing
  • Big data in Industry 4.0
  • Privacy and security in manufacturing

Challenges of automation of data analytic processes

  • Case studies of the automation of data analytics processes
  • Architecture for data analytics and security
  • Built-in privacy and security in data analytics automation

Submission instructions:

Successful papers will address real research challenges through analysis, design, measurement, and deployment of data systems. The program committee will evaluate each paper using metrics that are appropriate for the topic area. All submissions must describe original ideas, not published or currently under review for another conference or journal.

Submissions must follow the formatting guidelines of IEEE proceedings, and be submitted electronically as a PDF file through EasyChair.  Submissions not adhering to the specified format and length may be rejected immediately.

The submitted papers can include up to 8 pages in IEEE format, including references, appendices, and figures.

Publication:

All accepted papers will be published in the IEEE conference proceeding.

Important dates:

  • Deadline for full paper submission: December 21st, 2020
  • Notification to authors: February 22nd, 2021
  • Deadline for camera ready version: March 15th, 2021

KES 2020 – 24th International Conference on Knowledge Based and Intelligent information and Engineering Systems

KES-202024th  International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES2020) |  16th  –  18th  September 2020  |   Verona, Italyhttp://kes2020.kesinternational.org/index.php

We are pleased to invite contributions for KES2020 taking place in Verona, Italy organised by KES International, in conjunction with the University of Verona.

Continue reading “KES 2020 – 24th International Conference on Knowledge Based and Intelligent information and Engineering Systems”

RDAAPS first annual international conference on research in the broadly defined area of data analytics

Call for papersReconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS) 2020 conference
http://rdaaps.com/conferences/rdaaps20/
July 15 – 17, 2020, McMaster University, Hamilton, ON, CANADA
RDAAPS is the first annual international conference on research in the broadly defined area of data analytics. It brings together researchers from academia, industry, and the public sector to present and discuss various aspects of data analytics, including privacy, security, and automation. This venue is meant to bring together stakeholders whose interests lie at the interface of these concerns, providing a platform for integrating the needs of industry with state-of-the-art scientific advancements, and inspiring original research on solving enterprise data challenges. RDAAPS seeks papers presenting original research in the areas including, but not limited to:
Big Data Analytics for Decision Making– New models and algorithms for data analytics- Scalable data analytics- Optimization methods in data analytics- Theoretical analysis of data systems- Analytical reasoning systems- Decision making under uncertainty- Learning systems for data analytics- Large-scale text, speech, image, or graph processing systems
Accountable Data Analytics– Privacy-aware data analytics- Fairness in data analytics- Interpretable and transparent data analytics- Data analytics incorporating legal and ethical factors
Strings in Data Analytics– Patterns in Big Data- Data compression- Bioinformatics- Algorithms and data structures for string processing- Useful data structures for Big Data- Data structures residing on secondary storage
Security in Data Analysis– Traceability of decision making- Models for forecasting cyber-attacks and measuring impact- Data usage in mounting security threats- Data analytics for better situational awareness
Domain knowledge modelling and generation– Novel ontology representations- Scalability of domain-based reasoning on big data- Modelling and analyzing unstructured data sets
Automation for data analytics, security, and privacy in manufacturing– Application of data analysis in manufacturing- Big data in Industry 4.0- Privacy and security in manufacturing
Challenges of automation of data analytic processes– Case studies of the automation of data analytics processes- Architecture for data analytics and security- Built-in privacy and security in data analytics automation
Submission instructions:Successful papers will address real research challenges through analysis, design, measurement, and deployment of data systems. The program committee will evaluate each paper using metrics that are appropriate for the topic area. All submissions must describe original ideas, not published or currently under review for another conference or journal. 
Submissions must follow the formatting guidelines of IEEE proceedings, and be submitted electronically as a PDF file through the EasyChair author interface for the RDAAPS conference (link to follow soon). Submissions not adhering to the specified format and length may be rejected immediately.
The submitted papers can include up to 8 pages in IEEE format, including references, appendices, and figures. Publication:All accepted papers will be published in the IEEE conference proceeding.

Important dates:– Deadline for abstract submission: March 23rd, 2020- Deadline for full paper submission: March 29th, 2020- Notification to authors: May 15th, 2020- Deadline for camera ready version: June 7th, 2020
We look forward to receiving your submissions!
Best regards,
General ChairsM. Jamal Deen, McMaster UniversityRidha Khedri, McMaster University
Steering CommitteeRidha Khedri, McMaster UniversityWendy MacCaull, St. Francis Xavier UniversityMike Grainge, Adlib Software, Vice President Product EngineeringNeerja Mhaskar, McMaster University
Organizing CommitteeRidha Khedri, McMaster University, Local OrganizerNeerja Mhaskar, McMaster University, Local OrganizerAndrew LeClair, McMaster University, PublicistAlicia Marinache, McMaster University, TreasurerHassan Ashtiani, McMaster University, Publication Co-ChairWenbo He, McMaster University, Publication Co-ChairMike Grainge, Adlib Software, Industrial Liaison
Program Committee ChairsArash Habibi Lashkari, University of New BrunswickRidha Khedri, McMaster UniversityNeerja Mhaskar, McMaster University
Program Committee Members (Current confirmed list)Ken Barker, University of CalgarySolon Pissis, Centrum Wiskunde & Informatica (CWI)Wing-Kin Sung, National University of SingaporeAndrew Malton, Blackberry Ltd.Dan Feng, Beijing University of Posts and TelecommunicationsWendy MacCaull, St. Francis Xavier UniversityKamel Adi, Université du Québec en OutaouaisJian Li, Futurewei TechnologiesMaxime Crochemore, King’s College London and Université Paris-EstJason Jaskolka, Carleton UniversityClaude Baron, LAAS-CNRS, INSAFazle Rabbi, University of BergenYan Liu, Concordia UniversityWilliam F. Smyth, McMaster UniversityCostas Illiopoulos, King’s College LondonNoman Mohammed, University of ManitobaLaurence T. Yang, St. Francis Xavier UniversityHideo Bannai, Kyushu UniversityDon Adjeroh, West Virginia UniversityShunsuke Inenaga, Kyushu UniversityNadia Pisanti, Universita di PisaFei Chiang, McMaster UniversityWenbo He, McMaster UniversityHassan Ashtiani, McMaster UniversityJamal Deen, McMaster UniveristyMourad Debbabi, Concordia UniversityGiovanni Livraga, University of MilanMichael Soltys, California State University Channel Islands

AWS Educate workshop at CI

Today, Friday January 24, 2020, we are hosting an AWS Educate workshop on the CSU Channel Islands campus, on Cloudifyig the Curriculum. The workshop will be held in Broome Library (easily recognizable as the only modern building on campus – here is its location on the campus map: http://maps.csuci.edu/?id=502#!m/189826).

Once you are in Broome library, please go to the second floor, to room number 2330. We will be starting at 9:30am, and finishing at 3:30. We will be catering both a continental breakfast and a lunch at around 12:30pm.

The registered guests can pick up their parking passes from Placer Hall (see map below). With the passes the guests can park in any lot “A”.

AWS re:Invent, Las Vegas, 2019

I am attending my first AWS re:Invent conference, Las Vegas December 2-6, 2019.

The conference is enormous, with over 60,000 attendees who command most of the big resorts on the strip.

Yesterday I participated in a Security Certification Bootcamp (proper name AWS Certification Exam Readiness: Security – Specialty) and this morning I wrote the certification exam proper; three hours long, 65 questions, and I had 3 minutes to spare at the end. Let’s face it, the exam is hard, and requires studying. I was successful, but it required steady studying over the last 3 months. The AWS certification exams are challenging, but one does learn a lot. As an academic the hardness of the exams is a good thing as it says that this material has a legitimate role to play in academia, especially as we make it accessible to our students, and deploy it toward our research.

How did I prepare? In addition to reading the requisite white papers (such as Introduction to AWS Security Processes and AWS Best Practices for DDoS Resiliency), I was fortunate enough to have access to the Cloud Guru training in security. Their 10 to 15 minute lessons in all the topics are easy to absorb, and the summaries and quizzes are a good preparation for the exam.

I have been teaching Cybersecurity for over a decade, but the AWS security exam is not about foundations of Cybersecurity — it is about how to use AWS tools in order to achieve security objectives; this kind of knowledge arises not from learning principles or cryptography (although that does help too!), but rather from in-depth familiarity with AWS tools, such as CloudTrail, Inspector, Macie, Athena, CloudWatch, KMS, and many many others. My plan now is to incorporate this knowledge into our CI class in Cybersecurity, COMP 524, so that students will have knowledge of fundamentals as well as an understanding of security in the (relatively new) paradigm of cloud computing. COMP 524 students will have the additional benefit of covering the content of the certification

I should also say that even though foundational knowledge such as cryptography is not tested directly, it is nevertheless helpful. For example, a good portion of the exam relates to keys, specifically AWS KMS. It is much easier to remember when symmetric keys are used (e.g., S3 encryption with AES256) rather than asymmetric keys (i.e., public keys, e.g., key pairs to SSH into EC2) when one actually understand the difference between the two. Or, for example, why hashing of encrypted logs in S3 can help with data integrity measures for backups.

The Bootcamp that I took the day before was perhaps the least helpful toward success in the exam. I would suggest to take the bootcamp at the beginning of your studies toward passing the certification exam, as a quick bird-eye overview of what needs to be mastered. I sat through the bootcamp listening to what I knew already, without the possibility of going more in depth (we had 4 hours total), and without the audience being able to ask questions, as the instructor was rushing to cover the material.

Quick Tip: AWS is uncanny in its rolling out of new tools and features, most really captivating and useful. However, keep in mind that a tool or feature that is younger than 6 months will likely not make it to the exam. As I understand, the exam process is too exacting to be done quickly, and hence it take some time before new material is incorporated.

KES 2020

Excited about KES 2020, which is going to take place in Verona, Italy, September 16-18, 2020.

From the conference’s web site: The conference will be held across the Beautiful University Pole Santa Marta Campus only 1km from the historical centre of Verona. Verona is a city in northern Italy’s Veneto region, with a medieval old town built between the meandering Adige River. It’s famous for being the setting of Shakespeare’s “Romeo and Juliet”. A 14th-century residence with a tiny balcony overlooking a courtyard is said to “Juliet’s House”.

For more information visit: http://kes2020.kesinternational.org/

KES 2019

September 4-6, 2019, we attended a very enjoyable and informative KES 2019 conference in Budapest. We presented 3 papers at the conference, co-authored with CI graduate and undergraduate students (see this post for details).

AWS Imagine edu conference

Seattle, July 8-11, 2019

AWS IMAGINE: A Better World, A Global Education Conference

I am attending the AWS Imagine education conference in Seattle. This is a conference hosted by AWS for educators who are interested in offering an AWS based Cloud Computing track at their institutions. I am happy that in the keynote by Andrew Ko, the CSU was mentioned as one of the partner university system: at CI we are offering Cloud Computing with AWS tools to our students, and we are also leveraging the resources of AWS for research. The San Luis Obispo (SLO) campus has been working with AWS tools as well (see Cal Poly Launches World’s First University-Based Cloud Innovation Center Powered by Amazon Web Services). I had the pleasure of meeting Chris Lupo, the chair of Comp Sci at SLO; other CSU campuses, such as Northridge, have also worked with AWS.

Education is built on AWS slide

Partnering with AWS: Community Colleges (CC) have already partnered with AWS in some states. At the conference we heard from Sharron Morrissey from the Virginia Community College System, where AWS was introduced comprehensively in the entire system. The Virginia CCs are able to capitalize on the fact that Amazon chose Arlington (Virginia) as the site for its 2nd headquarters, and the preponderance of data-centers in Virginia. We also heard from Monty Sullivan, the president of the Louisiana Community Colleges system, who spoke about “educational institutions are not any more in the business of furnishing diplomas, but rather they are the gateway into the job market”. Finally, we heard from Sheneui Weber who spoke about the CCs in California, and their thriving partnership with AWS: she cited a study showing that there are about unfilled 30,000 jobs in Cloud Computing in LA County and Orange County, and 5,000 of those jobs specifically mention AWS.

Amazon Fiona building

On Monday, at the Amazon Fiona building, I attended an excellent workshop conducted by the AWS Educate team on how to integrate the AWS curriculum in different degrees – my interest was to explore the possibility of introducing AWS into the Computer Science program (or the IT program) at CI. Some of the resources that AWS offers could also be deployed in our Mechatronics Engineering program (such as AWS Robomaker). At the workshop I was interested in the experience of George Mason University that partnered with Nova and AWS. Just last month this partnership announced a Bachelor of Applied Science (BAS) pathway in cloud computing.

For us at CI, the benefits of such a pathway would be as follows:

  • As we have a hands on practical degree, we are more or less ready; we would have to introduce examples of AWS tools in 3 or 4 courses, such as Networking (COMP 429), Databases (COMP 420) and Cybersecurity (COMP 424), and possibly some DevOps in our Software Engineering class (COMP 350).
  • Once approved by Amazon Educate, students would have then the ability to have educational AWS accounts with some credits, as well as access to the AWS job forum, and vouchers for AWS certification. They would also be more ready for the rapidly expanding Cloud Computing job market.

As a university we have to be technology agnostic to some extent, but since AWS is a platform, on which one can deploy practically any technology, we would not be teaching one tool. Also, we should compare and contrast the AWS offering to other solutions such as Google Cloud and Microsoft Azure. In any case, Cloud Computing is becoming the new computing paradigm, and in order to give our students the best degree possible, we need to teach it.

Rich Mendola from Emory on Building a Secure and Manageable Cloud Environment

I was keen to hear a talk on Machine Learning by Balaji Iyer, as we are currently using AWS SageMaker on a Navy Cybersecurity project. I also really enjoyed an excellent talk by Rich Mendola from Emory, on Building a Secure and Manageable Cloud Environment. It was interesting to hear about the AWS Shared Responsibility Model, a very interesting concept from the Cybersecurity point of view: AWS has built and maintains an extremely secure infrastructure, but it is up the the user to wield the tools correctly in order to maintain security.

Finally, I was excited to be for the first time in a city (Seattle) with the 5G cellular network 🙂

CI students’ research accepted at the KES2019 international conference in Budapest

KES 2019 conference in Budapest, Hungary

CI Computer Science students were successful in submitting three papers to KES 2019, the 23rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, which this year is taking place in Budapest, Hungary, in September 2019. The papers are the following:

  • Approximating consistency in pairwise comparisons, co-authored by Chris Kuske, Konrad Kułakowski and Michael Soltys. Chris Kuske was a masters student in Computer Science at CI, and this paper is the result of his masters thesis [pdf], which was co-supervised by Prof. Konrad Kułakowski (AGH), who at the time was a Kościuszko Scholar in Computer Science at CI. Chris Kuske is a Software Lead at Teledyne Controls where he develops avionics software for commercial aircrafts. (This paper will be presented in the Invited Session IS18: Decision modeling with and without pairwise comparisons.)
  • SEAKER: A mobile digital forensics triage device, co-authored by Eric Gentry and Michael Soltys. Eric Gentry was a masters student in Computer Science at CI, and currently working at GBL Systems, and lecturing for Computer Science at CI. This paper is the result of a collaboration between Computer Science at CI and the SoCal High Technology Task Force. For more details on this collaboration please see here. (This paper will be presented in the Invited Session IS13: Cybercrime Investigation and Digital Forensics.)
  • Deploying Health Campaign Strategies to Defend Against Social Engineering Threats, co-authored by Noelle Abe and Michael Soltys. Noelle Abe is a senior student at CI, who just graduated this May with a degree in Computer Science. Noelle Abe was both a President’s Scholar at CI, and the vice-president of the Computer Science Girls Club. This paper was initiated by Noelle as part of her research as an exchange student in the UK in 2017. (This paper will be presented in the Invited Sessions IS24: Knowledge-based Learning and Education Support System: Design and Function.)