Jump to Navigation


News | Speaker Series | Events

iSecure Lab Invited Speaker Series

May 15, 2017 11AM Graduate Center
Max (Massimiliano) Novelli Census Bureau, NY Regional office
Let the data flow: Data in a neurophysiology lab
Abstract: :

Bio: Max (Massimiliano) Novelli is a Software Engineer with a graduate Laurea from Politecnico di Milano, Milan, Italy. Max has over 20 years of experience in the IT field . Max’s extensive background as a system administrator, software engineer and programmer help him to play a critical role in research environments, leverage technology to bridge the gap between data and users. Max started playing with a Commodore 16 a long time ago. However, since that time he has grown significantly to become an expert in the field with vast understanding of Open Source software, Linux operating systems, Web technologies, Drupal CMS, Data Management, and Big Data. Max’s expertise includes considerable knowledge about sophisticated computing infrastructure and large storage systems targeted for research environments (specifically fMRI, MEG, EEG and neurophysiology research laboratories). His latest research interests are big data and data architecture: primarily the management, organization and automation of structured and unstructured data, including metadata (descriptive data). When Max is not lost in "computer land", he enjoys spending time with his family and friends, playing with his sons, biking, cross-country skiing, traveling, practicing and teaching yoga, cooking, eating good food, and sipping a good glass of wine.

October 29, 2015 6:30pm-8:00pm, 3N-113
David Kraiker Census Bureau, NY Regional office
Life Cycle of a piece of data (invited lecture for BDA761 - Big Data Analytics)
Abstract: The talk shows from beginning to end how we begin gathering data, scientifically send it to the field, receive it, turn it into statistics, etc. We present how to disseminate to the census data to the public, some of the problems with that functionality, and issues on the data-users end of things. We demonstrate the website of one of out data users who have use our data in a very proficient and artistic manner.

Bio: David Kraiker works as a Data Dissemination ("Outreach") Specialist, Census Bureau - New York Regional Office.

October 27, 2015 2:30pm-3:30pm, School of Business Conference Room
Prof. Kim Normann Andersen Copenhagen Business School
Maturity Models for Digital Government: Building On Top of the Layne & Lee and Andersen & Henriksen models
Abstract: Authors of two of the most quoted maturity models for e-government are currently joining forces in developing the next generation of maturity models. The research team has been interviewing local government officials to ground the development of the new maturity model. In the talk, the first iteration of the new model will be presented and discussed. There will be example from Asia, Europa, and the US on progress of e-government how existing models can be supplemented in moving forward our conceptualization and implementation of new generation of technologies in government.

Bio:Kim Normann Andersen is Professor and Study Program Director in the Department of IT Management at the Copenhagen Business School. His research focuses on implementation and impacts of technologies in government such as robots, online communication, self service, and social media. He has published in a range of journals and involved in various NSF and EU funded projects. He has been appointed to various international and national committees within open document standards and large scale IT projects. He holds a PhD from Copenhagen University and have been visiting scholar at UC Irvine and Tokyo University among others.

April 29, 2015 4:15pm-5:30pm, Graduate Center Room 5714
Prof. Jaideep S. Vaidya Rutgers University
Privacy in the era of Big Data: Challenges and Solutions
Abstract: New technology has increasingly enabled corporations and governments to collect and use huge amount of data related to individuals. At the same time, legitimate uses in healthcare, crime prevention and terrorism demand that collected information be shared by more people than most of us ever know. Today, the challenge is enabling the legitimate use of the collected data without violating privacy. From the organizational perspective, enabling safe and secure use of owned data can lead to great value addition and return on investment. In this talk, we will discuss some of the underlying challenges of ensuring privacy in the era of big data, and explore some of the potential tools, techniques and technologies that can enhance privacy.

Bio: Jaideep Vaidya is an Associate Professor in the MSIS Department at Rutgers University. He received the B.E. degree in Computer Engineering from the University of Mumbai, the M.S. and Ph.D. degree in Computer Science from Purdue University. His general area of research is in data mining, data management, security, and privacy. He has published over 120 technical papers in peer-reviewed journals and conference proceedings, and has received several best paper awards from the premier conferences in data mining, databases, digital government, and informatics.

March 26: Invited speaker for the CUNY Computer Science Colloquium series Time: 4:15pm-5:30pm, Graduate Center rm 9204/9205
Professor Yi Chen, New Jersey Institute of Technology
Where is my needle in the haystack?
ABSTRACT: With data volume ever growing, information discovery becomes increasingly challenging. While Web Search Engines have been successful in finding relevant documents among trillions or quadrillions of documents on the Web, they are insufficient to satisfy the needs of web users to access structured data, such as products, bibliographies, finance, and social networks. The information discovery processes are further complicated by the prevalence of uncertain data, diverse interests of users and profit consideration from publishers. In this talk, I will discuss the challenges, opportunities, and then some of the solutions that we have developed for information search.
BIO: Yi Chen is an Associate Professor and Leir Chair in the School of Management, with a joint appointment with the College of Computing Sciences, New Jersey Institute of Technology. Her research interests focus on data management technologies and their applications in healthcare, business and Web, such as search and recommendation systems, social computing, and workflow management. She was a general chair of SIGMOD'2012, and is serving an associate editor for PVLDB, DAPD, and ECRA. Yi Chen is a recipient of a Google Research Award, IBM Faculty Award and an NSF CAREER Award. She received her Ph.D. from the University of Pennsylvania and her B.S. from Central South University in 2005 and 1999, respectively.
March 25, 2015 4:15pm-5:30pm Graduate Center Room 5714
Prof.Wendy Hui Wang Stevens Inst. of Technology
Integrity verification of outsourced data mining computations
Abstract: With the advance of the Cloud computing technology, a paradigm called the Data-Mining-as-a-Service (DMaS) has emerged. There are several security concerns that must be addressed. In this talk, I focus on the result integrity of outsourced data mining computations, one of the important security concerns of the DMaS paradigm. I will present our recent work on result integrity of various types of data mining computations.
Bio: Dr. Wendy Wang is currently a tenure-track assistant professor of Department of Computer Science at Stevens Institute of Technology, Hoboken, NJ. She obtained her PhD degree from University of British Columbia, Vancouver, Canada. Her research focuses on data management and mining, in particular, the security and privacy issues of data analysis applications.

March 5, 2015 4:15pm-5:30pm Location:Graduate Center rm 9204/9205
Dr. Edgar Weippl
Vienna University of Technology Empirical and Applied Research in Information Security
Abstract: Over the last years, there is an increasing number of descriptive works observing and describing complex phenomena, e.g., the efficiency of different spam campaigns, the distribution of bots, or the likelihood of users to accept false identities as friends in social networks. These studies are characterized by large sets of samples. Future research will focus on networks and cloud systems; the research methodology will be empirical systems security: (1) passively observing large systems and (2) active probing that stimulates revealing behavior of the systems. The research contribution lies in observing, describing and inferring the behavior of complex systems that cannot be directly observed and have a large impact on users.
Bio: Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is Research Director of SBA Research and associate professor (Privatdozent) at the Vienna University of Technology and teaches at several universities of applied sciences (Fachhochschulen). His research focuses on applied concepts of IT-security; he is on the editorial board of Elsevier’s Computers & Security journal (COSE) and general chair of ACM CCS 2016. After graduating with a Ph.D. from the Vienna University of Technology, Edgar worked for two years in a research startup. He spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant for an HMO in New York, NY and Albany, NY, and for the financial industry in Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and founded together with A Min Tjoa and Markus Klemen the research center SBA Research.
Wednesday, May 14, 2014 Time: 11am-12:00pm, 3N-219 Conference Room, School of Business
Professor Bhavani Thuraisingham The University of Texas at Dallas

Sponsored by

Main menu 2

Dr. Radut Consulting