Spring 2013: CYB 5660 Secure Software Development
Software vulnerabilities are far too common, but a security-oriented development process can help. This course explores the components of secure software development, including the characteristics of resilient software, best practices for development, and other topics spanning the software lifecycle. This course is acceptable as an Advanced Electiv
BioComplex Lab: Journal Paper Accepted
Congratulations to Srividhya Venugopal (PhD student) and Evan Stoner (BSc student) for for having their paper entitled "Understanding Organ Transplantation in the USA using Geographical Social Networks" has been accepted for publication at the Journal of Social Network Analysis and Mining (SNAM) published by Springer Verlag.
Spring 2013: High Volume Automated Testing
Many of the most maddening software errors cause intermittent failures. Do something—the program fails. Do what you think is the same thing again—no failure. These are hard to diagnose and almost impossible to provide customer support for, but they can be serious irritants or critically dangerous. For example, at least some of the flaws underlying
Spring 2013: CSE 4510/5400-E6: A Survey of Interdisciplinary CS ("CS in Action")
This course provides a survey of how CS can help solve problems in other disciplines, such as Biology and Sociology. For each discipline, we first discuss a sample problem(s) and the associated background knowledge to understand the problem(s). We then discuss possible algorithmic solutions and compare them. Faculty members from other disciplines m
Spring 2013: CYB 5675: Data Mining for Cybersecurity
This course explores data mining and machine learning in cybersecurity environments. The student will learn a variety of data mining and machine learning algorithms and their utility in cybersecurity tasks, such as signature, anomaly, scan, and intrusion detection. Network traffic profiling and privacy-preserving data mining will also be covered.
Cem Kaner - Software Test Luminary Award Winner
This is an award voted on by practitioners (worldwide), given to a person who they think has made a strong, long-term impact on the field. Dr. Cem Kaner is the third award winner.
The two before him were
•Gerald Weinberg (you've probably studied his work on software quality, software measurement and software requirements) and
Spring 2013: CYB 5272: Computer and Information Security
This course provides an introduction to computer and information security with an emphasis on a system-wide view of security issues. Students will review common threats to applications, operating systems, networks and databases and will be introduced to techniques for mitigating those threats. Other topics include privacy and information
Spring 2013: CSE5810 - Scientific Computing
Modern science and engineering practices depend on computation. In a spiral fashion, the availability of faster computers is fueling a data explosion in all branches of these disciplines, and in turn demanding better computing resources. Developing efficient algorithms is a part of the equation. This course covers such mathematical algorithms. The
Fall 2012: CSE4510/5400: Social Network Analysis
The course is very hands-on. Students will be required to work with a Social Network Dataset.
The coursework consists of: analysis assignments on specific social networks, presentations in class of your results,
research paper critiques.
The course is a good opportunity to students to gain some experience on research and writing about resear
Fall 2012: CYB 5665 Secure Web Services
Machine-to-machine communications are essential to many enterprises. Web services enable automated, interoperable communications and function discovery. Semantic Web services allow machines to interpret content. This course explores these technologies through practical examples with an emphasis on security considerations. The course counts as a Com