Commonwealth Cyber Initiative (CCI) / en George Mason faculty are tackling cybersecurity’s talent pipeline problem /news/2024-05/george-mason-faculty-are-tackling-cybersecuritys-talent-pipeline-problem <span>George Mason faculty are tackling cybersecurity’s talent pipeline problem</span> <span><span lang="" about="/user/1106" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Jennifer Anzaldi</span></span> <span>Fri, 05/10/2024 - 13:01</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">If you’re a cybercriminal, the latest news on cybersecurity talent shortfalls should put a smile on your face. For example, <a href="https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/isaca_state_of_cyber_2023_global_infographic_final.pdf">the majority of cybersecurity leaders report</a> that their teams are understaffed, and they have problems retaining qualified professionals.</span></p> <p>But for <a href="https://business.gmu.edu/profiles/nmenon">Nirup Menon</a>, a AV professor of information systems and operations management (ISOM), and <a href="https://business.gmu.edu/profiles/bngac">Brian Ngac</a>, an instructor in the ISOM area, this workforce challenge is a golden career opportunity for the young people of Northern Virginia and the Washington, D.C., area.</p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/ngac_and_menon_golf_600x600.jpg?itok=iRijGNjV" width="350" height="350" alt="Nirup Menon and Brian Ngac" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Nirup Menon and Brian Ngac</figcaption></figure><p>The pair recently won a two-year award from the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a> (NIST), an agency within the U.S. Department of Commerce, to create unique experiential learning opportunities and workshops designed to enhance cybersecurity education and workforce development.</p> <p>Working closely with industry partners <a href="https://mobius-llc.com/">Mobius Consulting</a> and <a href="https://www.ida.org/">Institute for Defense Analyses (IDA)</a>, Menon and Ngac will recruit and help select students to work on actual cybersecurity projects. “They need to have taken some fundamental cyber class ahead of time,” Menon clarifies. “We want students with a commitment to the field. It allows you to get experience but it’s also competitive.”</p> <p>Throughout the 12-week projects, students will receive mentoring both from the industry participant and from business faculty. “We run it in an agile scrum-like manner,” Ngac says. “Every week, we ask ‘What did you do?’ ‘What are you going to do?’ ‘What are the challenges that are impacting your work?’” If students run into trouble, faculty mentors can work with industry managers to help them get back on track.</p> <p>“We’re trying to build not just the cyber workforce but the skills as well,” Ngac says.</p> <p>Menon and Ngac have developed a specialty in this type of hands-on learning, which they have dubbed the Professional Readiness Experiential Program (PREP). More than 100 Virginia-based undergraduates and 20 industry participants have participated in PREP, which includes projects funded by two <a href="https://cyberinitiative.org/">Commonwealth Cybersecurity Initiative</a> Experiential Learning grants in collaboration with Mobius and IDA. </p> <p>“PREP not only focuses on cybersecurity projects, but also works on many business process improvement projects,” says Ngac. "Honors and high-performing ISOM students work on real-world projects with industry participants on identifying technical solutions to business challenges through rigorous research, modelling, analysis, quantification, risk management, implementation planning, and, at times, execution.”</p> <p><span><span><span><span lang="EN-SG" xml:lang="EN-SG" xml:lang="EN-SG"><span>The NIST award also incorporates workshops for students who are new to cybersecurity but interested in exploring it as a career option. Workshops will be launched in collaboration with <a href="https://www2.trinitydc.edu/" target="_blank" title="Trinity Washington University"><span>Trinity Washington University</span></a> (TWU), an HBCU whose College of Arts and Sciences is women-only. For a field such as cybersecurity, which continues to face diversity challenges, the participation of organizations such as TWU is essential.</span></span></span></span></span></p> <p>“We want to bring in students who have not thought of cybersecurity as a field, because they think it’s all engineering, hacking and coding,” Menon says. The workshops will emphasize the variety of functions that are integral to the space, such as management and auditing, in addition to engineering. </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/ngac_and_menon_golf_group_600x1300.jpg?itok=uNzuuKi8" width="560" height="252" alt="Students and industry participants in the current CCI Experiential Learning Projects" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Students and industry participants in the current CCI Experiential Learning Projects</figcaption></figure><p> “It’s not just tech, there may be creativity involved in anticipating scams and threats,” Ngac explains. “These are different things we’ll be bringing up in the workshop in terms of roleplaying what cybercriminals might do, or how someone might try to socially engineer an attack.”</p> <p>Unlike a standard grant, the NIST award is structured as a cooperative agreement in which the funding agency will collaborate in shaping and delivering programs as they evolve.</p> <p>“The advantage of working with NIST is that top people work there. They are the standards body, so they have seen and surveyed a lot of industry,” Menon says. He also lauds NIST’s high-level view of cybersecurity and its implications. “They’re not just looking at technology but also public policy, human factors, etc. It’s a holistic approach.”</p> <p><em>Organizations interested in being an industry participant (whether they have cybersecurity-focused or business process improvement-focused projects) with PREP are encouraged to contact <a href="mailto:bngac@gmu.edu">Brian Ngac</a>.</em></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="07a7b036-4377-4afd-9d70-f66f9b300e24"> <div class="cta"> <a class="cta__link" href="/admissions-aid"> <h4 class="cta__title">Join the Mason Nation <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4731e68e-8e07-4ddf-a91b-b3f486139b82" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="d25831bc-6cce-452d-b805-bb45b8714043" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-32f9e4f2c0924d4c59da1f0db3db86bea8226567a9626905fe59ab2fdba1ca4c"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-06/college-public-health-receives-nih-grant-pilot-ai-chatbot-african-americans-depression" hreflang="en">College of Public Health receives NIH grant to pilot AI chatbot for African Americans with depression </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 8, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-06/learning-laboratory-community-health-prepares-graduate-students-solve-real-world" hreflang="en">Learning Laboratory for Community Health prepares graduate students to solve real-world public health challenges</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 6, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-06/george-mason-howard-receive-1-million-google-launch-cybersecurity-clinic" hreflang="en">George Mason, Howard receive $1 million from Google to launch Cybersecurity Clinic</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 5, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/george-mason-researchers-harness-power-artificial-intelligence-match-patients-most" hreflang="en">George Mason researchers harness the power of artificial intelligence to match patients with the most effective antidepressant for their unique needs </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 29, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/nanofabrication-lab-opens-scitech-campus" hreflang="en">Nanofabrication Lab opens on SciTech Campus</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 17, 2024</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/15126" hreflang="en">workforce</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/19536" hreflang="en">National Institute of Standards and Technology NIST</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/17356" hreflang="en">Strategic Direction</a></div> </div> </div> </div> </div> </div> Fri, 10 May 2024 17:01:06 +0000 Jennifer Anzaldi 112546 at Mason professors are researching hacker psychology to defend against cyberattacks /news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks <span>Mason professors are researching hacker psychology to defend against cyberattacks</span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Thu, 05/02/2024 - 09:39</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of AV researchers is probing the psychology behind cyberattacks as part of a U.S. intelligence community program aimed at turning the tables on hackers.</span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/cybersecurity_gettyimages-funtap1484313578_.jpg?itok=wb4ntm7k" width="350" height="205" alt="cybersecurity graphics" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Illustration by Getty Images</figcaption></figure><p><span><span><span>As the prevalence and severity of cyberattacks continue to grow, the Intelligence Advanced Research Project Activity (IARPA) has turned its focus on how best to exploit the weakest link in cyberattacks: the human factor. </span></span></span></p> <p><span><span><span>Under a new IARPA program, researchers hope to better understand cyber attackers’ cognitive vulnerabilities and decision-making biases and use those vulnerabilities to derail future attacks. </span></span></span></p> <p><span><span><span>Researchers <a href="https://volgenau.gmu.edu/profiles/dbarbara">Daniel Barbará</a>, <a href="https://computing.gmu.edu/profiles/ateniese">Giuseppe Ateniese</a>, and <a href="https://psychology.gmu.edu/people/gmatthe">Gerald Matthews</a> were recently selected as part of a broader team of computer science, cybersecurity, and psychology experts to forge new research pathways and deliver cutting-edge  technology as part of IARPA’s Reimagining Security with Cyberpsychology-Informed Network Defense, or ReSCIND, program.</span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/110406052e.jpg?itok=s7eJDMa9" width="282" height="350" alt="Daniele Barbara" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Daniel Barbara. Photo by Office of University Branding</figcaption></figure><p><span><span><span>The team of researchers will build defensive tools that first cue in on hackers’ human limitations and use those weaknesses to delay or derail the attack while it is underway.  </span></span></span></p> <p><span><span><span>“You want to make them waste their time,” said Barbará, a computer science professor at George Mason’s <a href="https://cec.gmu.edu/">College of Engineering and Computing</a>. “The more they waste their time, the least damage they’re going to do.”</span></span></span></p> <p><span><span><span>This can be accomplished by luring hackers with decoys such as false networks or documents to distract them. </span></span></span></p> <p><span><span><span>But the trick is two-fold. The decoys must first and foremost appear to be real. They also need to entice the hackers away from their original aim. The latter is where understanding the psychological factors that influence hackers is essential. </span></span></span></p> <p><span><span><span>As part of the first phase of the ReSCIND program, researchers will aim to fill gaps that exist in the current understanding of human cognition and decision making that influence cyber attackers’ behavior. </span></span></span></p> <p><span class="intro-text">“It’s a challenging topic to address because hackers, of course, tend to be somewhat secretive,” Matthews, a professor of psychology at George Mason, said. “There aren’t many opportunities to study hacker psychology.”</span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/giuseppe-ateniese-1x1-profile.jpg?itok=QNcLhVg5" width="350" height="474" alt="Giuseppe" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Giuseppe Ateniese. Photo provided</figcaption></figure><p><span><span><span>Matthews said the current understanding of hackers’ behavior that provides the baseline for their research comes from several areas of study in psychology. Key among those areas is human performance and in particular how emotional states might influence performance. </span></span></span></p> <p><span><span><span>“Hackers themselves are under pressure and potentially anxious about getting caught,” Matthews said. “They’re anxious about looking foolish to the people that they are working with.”</span></span></span></p> <p><span><span><span>Cultural factors that motivate hackers are also important to consider and may vary greatly among hackers. Thrill-seeking college-age hackers, for example, would have different cultural norms and motives than highly trained professionals acting on behalf of a nation-state adversary, Matthews said.</span></span></span></p> <p><span><span><span>Researchers hope to further understand the full scope of psychological factors that influence hackers, including how to measure, predict, and induce their cognitive vulnerabilities. </span></span></span></p> <p><span><span><span>“There’s a certain amount of psychology that allows you to link the emotional reactions that hackers might have to cognitive biases and other vulnerabilities in performance,” Matthews said. “So, in this first part of the research, we’re trying to sketch out what some of those vulnerabilities might be.”</span></span></span></p> <p><span><span><span>As part of the second phase, researchers will further define when cyberpsychology-informed defenses can best be used and how to determine the success of those defenses. The final phase will focus on modeling, adapting, and automating those defenses.</span></span></span></p> <p><span><span><span>Ateniese, a computer science professor and eminent scholar in cybersecurity, said the ReSCIND program reflects the growing importance of cyberpsychology research in shaping emerging technology. </span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/matthews_pic-1.jpg?itok=G5k0FHSz" width="352" height="396" alt="Matthews" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Gerald Matthews. Photo provided</figcaption></figure><p><span><span><span>“I see a myriad of excellent applications, not just this project,” Ateniese said. “As you can imagine, people today are building AI systems that either mimic or seek to improve upon human behavior. So, the psychology perspective is very intriguing.”</span></span></span></p> <p><span><span><span>The ReSCIND program will run for nearly four years and is being carried out through research contracts awarded across five teams.</span></span></span></p> <p><span><span><span>Barbará, Ateniese, and Matthews’ research will contribute to a ReSCIND contract awarded to SRI International, an independent nonprofit research institute headquartered in California.</span></span></span></p> <p><span><span><span>The George Mason team will work alongside experts from the Florida Institute for Human and Machine Cognition, Margin Research, Research and Assessment Design: Science Solution, Two Six Technologies, University of Florida, and Virtual Reality Medical Center.</span></span></span></p> <p><span><span><span>In many ways, the project is a natural progression for the three professors who have worked together on several previous projects requiring a multidisciplinary approach. </span></span></span></p> <p><span><span><span>They were first introduced in 2021 by Amarda Shehu, a computer science professor and co-director at the time of the George Mason’s transdisciplinary <a href="https://cahmp.gmu.edu/">Center for Advancing Human-Machine Partnerships</a> (CAHMP). </span></span></span></p> <p><span><span><span>A call for proposals from Virginia’s Commonwealth Cyber Initiative for a project that sought to bridge cybersecurity and human factors research to help users build secure passwords immediately brought to mind Barbará, Ateniese, and Matthews’ expertise. </span></span></span></p> <p><span><span><span>“I always had the agenda of putting teams together and finding some funding opportunities so that then they could obtain preliminary results through which to demonstrate credibility for larger projects,” Shehu said. </span></span></span></p> <p><span><span><span>The match has led to a series of successful projects by the team, including the Commonwealth Cyber Initiative password project and a project focused on distinguishing authentic videos from deepfakes. </span></span></span></p> <p><span><span><span>“The IARPA project is, in some sense, an example of the culmination of an activity, how you put a team together,” Shehu said. “They find some funding so that they can start that relationship and then that kind of blossoms into a larger project. It's really a perfect example of what we want to see in […] in general at Mason in terms of transdisciplinary research and the fruit of that research.”</span></span></span></p> <p><span><span><span>Shehu, now associate vice president for research for Mason’s <a href="https://idia.gmu.edu/">Institute for Digital Innovation</a>, said bringing teams together with broad collective expertise is critical to solving the most complex impediments to technological progress. </span></span></span></p> <p><span><span><span>“The most challenging problems nowadays don't reside specifically within one discipline,” she said. “They bridge disciplines.”</span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="aa9c41f0-0fb7-46eb-a73e-ea58b759edbb" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="22d313bc-f4a2-4a65-993b-0c1776cceef2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ashehu" hreflang="und">Amarda Shehu</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/ateniese" hreflang="en">Giuseppe Ateniese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="16a5b1cc-1c82-4cf7-a26d-a1bff5841a00" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2023-07/1.png?itok=gPwpqoNE 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2023-07/1.png?itok=jNMZzKgm 1280w, " sizes="(min-width: 1024px) 80vw,100vw" alt="" "" /></div> </div> </div><div data-block-plugin-id="inline_block:text" data-inline-block-uuid="eefb6733-a6f2-492c-ba87-9bfa89ed1cc4" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="a852cad5-39c5-4004-b5c9-a2b2c25e0aea" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-6d936c145917d71336e4abe3abe4b75d1690434470b1798e0485a70284500dc9"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/information-technology-students-stepped-secure-virginias-elections" hreflang="en">Information technology students stepped up to secure Virginia’s elections </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 28, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-08/cybersecurity-honors-college-student-ready-hit-ground-running" hreflang="en">Cybersecurity Honors College student ready to hit the ground running</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/george-mason-faculty-are-tackling-cybersecuritys-talent-pipeline-problem" hreflang="en">George Mason faculty are tackling cybersecurity’s talent pipeline problem</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 10, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks" hreflang="en">Mason professors are researching hacker psychology to defend against cyberattacks</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 2, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/commonwealth-cyber-initiatives-cybersecurity-traineeship-launches-careers" hreflang="en">Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 12, 2024</div></div></li> </ul></div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/1011" hreflang="en">Institute for Digital InnovAtion (IDIA)</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/391" hreflang="en">College of Humanities and Social Sciences</a></div> <div class="field__item"><a href="/taxonomy/term/7096" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> Thu, 02 May 2024 13:39:13 +0000 Colleen Rich 111891 at Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity /news/2024-02/commonwealth-cyber-initiatives-cybersecurity-traineeship-launches-careers <span>Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity</span> <span><span lang="" about="/user/1441" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Teresa Donnellan</span></span> <span>Mon, 02/12/2024 - 22:36</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">The <a href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html">Commonwealth Cyber Initiative Northern Virginia Node (CCI NoVa Node)</a> is preparing for the third iteration of its <a href="https://cyberinitiative.org/talent-development/cci-cybersecurity-traineeship-program.html">Cybersecurity Traineeship Program</a>, which offers a seven-week course to <a href="https://cyberinitiative.org/content/cci_research_vt_edu/en/about/regional-structure/northern-virginia-node/about-nova-node.html" target="_blank">Northern Virginia residents</a> interested in pivoting into the cybersecurity sector followed by career support from AV and Northern Virginia Community College professionals.  </span></p> <figure role="group"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2024-02/image.png" width="1280" height="627" alt="CCI NoVa Node map" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>CCI NoVa Node's region is outlined in light blue.  </figcaption></figure><h3><strong>Course Beginnings</strong></h3> <p>The program’s intensive, full-time course curriculum familiarizes trainees with subjects relevant to Information Technology and cybersecurity, such as Python, database design, SPLUNK, and AWS. Trainees attend class all day and complete homework assignments outside of class.  </p> <p>Keyvon Riley, Aaron Hornbuckle, and Walter WIlliams, members of the program’s first cohort, credit the program with launching their careers in tech.  </p> <p>“The course days go by really quickly, so practicing is important,” said Riley. “The workload was very fair and needed in order to learn as much as a person can in the allotted time.” </p> <p>“Through a fast-paced learning environment, we were introduced to many concepts, processes, and tools that would be useful and relevant to entering this new environment,” said Hornbuckle. “It also prepared me by showing me how much there is to know and learn in this field, which continuously expands the longer I've worked in the industry.” </p> <p>Williams said the program exceeded his expectations: "Despite my initial nervousness due to a lack of industry understanding, I left feeling equipped with a solid foundation of cybersecurity knowledge." </p> <p>Scott Wood, the associate director of IT and Business Programs at Northern Virginia Community College, who designs the course curriculum each year, adapts the course to the shifting needs of the tech sector by consulting <a href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node/about-nova-node/nova-node-industry-partners.html">industry partners</a>. Next year, Wood will also incorporating guidelines set forth in “<a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf">National Cyber Workforce and Education Strategy</a>,” a 2023 report from the White House. </p> <p>“In addition to assessing technical skills, trainees are evaluated on participation, curiosity, creativity, communication, collaboration, and professionalism,” said Wood. “I’ve been amazed at the level of dedication and commitment from trainees in both iterations of the program. The program runs June through August, when most people are thinking about summer vacations and outdoor activities. The trainees in both programs really put in the work. They didn’t just show up for class. They took an active role in learning the skills and remained engaged throughout the seven-week program.” </p> <h3><strong>Time for Internships</strong></h3> <p>After completing the course, high performers in the program are placed in full-time internship roles with tech companies in Northern Virginia. Riley, Hornbuckle, and Williams each completed internships with <a href="https://www.peraton.com/">Peraton</a> before being offered full-time positions at the company. Riley and Hornbuckle are now cyber security systems engineers, and Williams is a UX/UI designer. </p> <p>"It was an honor to gain on-the-job cybersecurity experience," Williams said. "My internship provided opportunities to shadow projects, contribute to use case development, and apply my UX/UI design skills in unexpected ways." </p> <p>Riley noted that behind his success was a significant amount of work. For example, between his internship and starting his formal start date at Peraton, Riley became CompTIA Security+ certified.  </p> <p>“My industry landing did and still does surprise me, because cybersecurity is not for beginners,” Riley explained. “Most cybersecurity [workforce] members have five years or more in the IT field before landing a cyber role. I did not know that when I landed my role and thus had a hard time grasping the level of IT I entered into. Nevertheless, I hit the ground running and would not change it.”  </p> <h3><strong>Moving in New Directions</strong></h3> <p>Riley will begin a master’s in information technology in the fall. “I have made the most of every opportunity since the traineeship, and it has led to my success today,” he said. “My future in tech is bright!” </p> <p>Hornbuckle echoed Riley's sentiments, emphasizing the program's role in facilitating a smooth transition into his role. The program's emphasis on continuous learning resonated strongly with Hornbuckle, who noted the ever-evolving nature of the tech landscape and the importance of staying abreast of emerging trends. </p> <p>A former fine arts teacher, Williams' transition into a UX/UI designer underscores the program's role as a pathway to career reinvention. "The program has undoubtedly led me to a rewarding career in tech/cybersecurity," he said, adding, "I was surprised by the opportunity to utilize my UX/UI design skills within cybersecurity. This fusion of disciplines reflects the dynamic nature of the field and the endless possibilities for professional growth." </p> <p>With a curriculum designed in collaboration with industry experts and with a commitment to continuous improvement, CCI NoVa Node’s Cybersecurity Traineeship Program offers individuals seeking to break into the cybersecurity and IT sectors skills, confidence, and resources to embark on rewarding careers in technology. </p> <p>“CCI created a great way to give new opportunities to those wanting a career change into cybersecurity,” said Riley. “I will always be grateful I was one of the first people to have successfully completed this program." </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4151" hreflang="en">NoVa Community College</a></div> <div class="field__item"><a href="/taxonomy/term/1961" hreflang="en">information technology</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/15126" hreflang="en">workforce</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> </div> </div> </div> </div> </div> Tue, 13 Feb 2024 03:36:28 +0000 Teresa Donnellan 111021 at Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity /news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity <span>Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</span> <span><span lang="" about="/user/1441" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Teresa Donnellan</span></span> <span>Thu, 02/08/2024 - 16:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">AV researcher <a href="/profiles/vshah22" target="_blank">Vijay Shah</a> has joined a $2 million project to develop a system to secure 5G Open Radio Access Network (O-RAN) architecture.</span></p> <p><span><span>Funded by the <a href="https://www.ntia.gov/press-release/2024/biden-harris-administration-awards-nearly-80m-wireless-innovation" target="_blank">National Telecommunications and Information Administration (NTIA)</a>, the project "A Holistic Cybersecurity Testing Framework for 5G Radio Access Networks" is a collaboration with Virginia Tech, Penn State University, and Worcester Polytechnic Institute.</span></span></p> <p><span><span>Shah, who leads <a href="https://www.nextgwirelesslab.org/" target="_blank">Mason’s NextG Wireless Lab</a>, will be allocated nearly a quarter of the project’s budget and be working with Nishith Tripathi and Jeff Reed from Virginia Tech, Syed Rafiul Hussain from Penn State University, and Bo Tang from Worcester Polytechnic Institute.</span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-02/vijay_shah_insta.png?itok=UBR9iUrM" width="350" height="350" alt="Vijay Shah" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Vijay Shah</figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Security vulnerabilities in O-RAN present a critical cybersecurity challenge in the era of 5G. The team aims to create “a holistic and automated cybersecurity testing framework for O-RAN,” per the project’s executive summary.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Shah will also receive funding from the Commonwealth Cyber Initiative (CCI) to investigate fingerprinting technology for 5G/NextG O-RAN supply chain risk management, additional funding that highlights the multifaceted approach taken by the NextG Wireless Lab to address 5G networks cybersecurity challenges. </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">As part of these initiatives, the NextG Wireless Lab is actively growing its research team, with opportunities for postdoctoral researchers and PhD students interested in O-RAN cybersecurity, testing, and supply chain management.</p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Those interested in contributing to cutting-edge research in this field should <a href="mailto:vshah22@gmu.edu" target="_blank">email Shah</a>.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/7181" hreflang="en">Department of Cyber Security Engineering faculty</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/8241" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3776" hreflang="en">cyber infrastructure</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/19211" hreflang="en">WCC</a></div> </div> </div> </div> </div> </div> Thu, 08 Feb 2024 21:06:24 +0000 Teresa Donnellan 110681 at Gisele Stolz wins CCI Impact Award /news/2023-05/gisele-stolz-wins-cci-impact-award <span>Gisele Stolz wins CCI Impact Award</span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Mon, 05/01/2023 - 13:49</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">The <a href="https://cyberinitiative.org/">Commonwealth Cyber Initiative</a> (CCI) has awarded AV’s Gisele Stolz its prestigious <a href="https://cyberinitiative.org/about/cci-impact-award.html">Impact Award</a>. Stolz is the senior director of Entrepreneurship and Innovation Programs at Mason, the lead university for the CCI Northern Virginia Node.<em> </em></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2023-05/230421502.jpg" width="350" height="391" alt="portrait of Gisele Stolz" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Gisele Stolz, senior director of Entrepreneurship and Innovation Programs. Photo by Ron Aira/Creative Services</figcaption></figure><p><span><span><span>“Gisele’s leadership in developing and expanding the cybersecurity startup internship program along with her work on the <a href="https://cyberinitiative.org/innovation/cyber-acceleration--catapult--fund-2023.html">Commonwealth Cyber Incubator + Accelerator Program (CCI+A)</a> have directly impacted the Virginia innovation ecosystem,” CCI Executive Director Luiz DaSilva said. “We are delighted to present her with this award.”  </span></span></span></p> <p><span><span><span>The annual flagship award is given to an individual, team, group, or organization who through their CCI activities has conducted breakthrough cybersecurity research or innovation or developed a creative means to improve cybersecurity workforce opportunities for our industry partners and students.</span></span></span></p> <p><span><span><span>“From envisioning a cybersecurity startup internship program, to its development, success and, ultimately, scaling, to building out the structure of the Commonwealth Cyber Incubator + Accelerator Program (CCI+A) cohort programming, few people within the CCI network have had such a widespread impact as Gisele,” said Liza Wilson Durant, director of the CCI Northern Virginia Node and </span></span></span>associate dean for strategic initiatives and community engagement at Mason<span><span><span>.</span></span></span></p> <p><span><span><span>“Under her oversight, the cybersecurity startup internship program has attracted more than 700 applicants, placing 83 undergraduate students with more than 50 companies,” Durant noted in the award nomination. “The competitiveness of this program has allowed her to ensure that the highest-quality candidates are placed, increasing the buy-in of, and positive impact to, our industry partners. Of the students placed, 73% were offered follow-up positions with their host company—a combination of additional, nonsupported internships and full-time employment offers.”</span></span></span></p> <p><span><span><span>Impact Award nomination reviewers highlighted the “impressive results” of the programs Stolz created and fostered. </span></span></span></p> <p><span><span><span>Working with students and startups inspires Stolz. “I’m grateful I’m helping to give these students the ability to get a job and the skills they need to start a career. It’s an amazing feeling to be making an impact on their lives and careers.”</span></span></span></p> <p><span><span><span>Working at a startup requires a risk-taking mentality, Stolz said. For students who find uncertainty invigorating, a startup is a great fit.</span></span></span></p> <p><span><span><span>“Students are saying their work at a startup is so much more impactful. They’re a key member of the team, not just a cog.” </span></span></span></p> <p><span><span><span>It’s not only students who benefit from her work. Startups find interns, many of whom become employees, that they need to grow.</span></span></span></p> <p><span><span><span>Stolz is constantly improving the programs, adding what she learns during regular check-ins with students and companies. She also puts the lean startup methodology lessons to work. “I’m applying what I’m teaching in my business classes. It’s a continual improvement loop.” </span></span></span></p> <p><span><span><span>CCI is a statewide network of 41 Virginia public universities and colleges and includes more than 300 researchers and partners focused on cybersecurity, autonomous systems, and intelligence, to further research, innovation, and workforce development within the state. </span></span></span></p> <p> </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">Faculty and Staff News</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> </div> </div> </div> </div> </div> Mon, 01 May 2023 17:49:42 +0000 Colleen Rich 105216 at Commonwealth Cyber Initiative CATAPULT fund launches translational research projects /news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects <span>Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 14:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="90e15bd6-772b-4e20-ba74-f53e2bac4044"> <div class="cta"> <a class="cta__link" href="https://cyberinitiative.org"> <h4 class="cta__title">Learn About the CCI <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>As researchers and their teams work to answer questions and find solutions for protecting privacy and securing information through cybersecurity innovation, many set their sights on commercialization. Still, the path from research ideas to consumer products can be long and winding. To help straighten the path the Commonwealth Cyber Initiative (CCI) is supporting a Cyber Acceleration, Translation, and Advanced Prototyping for University Linked Technology (CATAPULT) Fund. The fund’s purpose‑‑advance collaborative translational research projects among CCI partners, to speed up the progress of academic research outcomes to the marketplace. </span></span></span></span></p> <p><span><span><span>"It is truly exciting to tap into the breadth of innovation from academic institutions across the Commonwealth and introduce these faculty inventors to the opportunity to expand the impact of their research through commercialization,” says Liza Wilson Durant, associate dean, strategic initiatives and community engagement, College of Engineering and Computing. “It is just the right time for Virginia to support and accelerate cybersecurity innovation as the Commonwealth establishes its role as a magnet for new companies with the best and brightest solutions to the nation's greatest cybersecurity challenges."</span></span></span></p> <p><span><span><span><span>In July 2022 CCI awarded seven teams from four universities in the Northern Virginia Node funding for their projects. These research teams received up to $50,000, with funding increments released based on the achievement of agreed-upon milestones. The teams and their projects are as follows.</span></span></span></span></p> <p><span><span><strong><span><span>Protecting Smartphones from Fingerphoto Spoofing</span></span></strong></span></span><br /><span><span><span><span><a href="https://gmu.edu" title="Mason">AV</a> Assistant Professor <a href="https://volgenau.gmu.edu/profiles/emarasco" title="Marusco profile">Emanuela Marasco’s</a> </span></span><span><span>the project addresses the urgent need for a mechanism that properly secures smartphone technology. Contactless fingerprint authentication allows faster capture times, unattended operations, and high hygiene. These systems, however, are still in the early stages of development. Although researchers are advancing matching, the risk of spoofing for contactless authentication must be mitigated as well. This project addresses the problem.</span></span></span></span></p> <p><strong>Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing  </strong><br /><span><span><span><span>As the number of Internet of Things (IoT) devices has increased rapidly, IoT botnets and information stealer attacks have exploited the vulnerabilities of IoT devices. It is still challenging, however, to detect the initial intrusion on IoT devices before massive attacks. Professor Gang Zhou,</span></span><span><span> from the College of William & Mary, </span></span><span><span>and his partners at Old Dominion University are addressing the challenge of the lack of accurate models in real-time for ubiquitous attack detection with their project.</span></span></span></span></p> <p><strong>Algorithm Evaluation for Backdoor Detection and Mitigation in Remote Sensing Systems</strong><br /><span><span><span><span>Artificial Intelligence (AI) technology has advanced to the point that it is inescapable in life and work. AI models extract knowledge from data to make decisions. Though AI has achieved state-of-the-art performances for many applications, it can be easily deceived by the backdoor attack.<strong> </strong><a href="https://odu.edu" title="Old Dominion University">Old Dominion University</a></span></span><span><span><strong> </strong>Professor<a href="https://www.odu.edu/directory/people/j/jli" title="Jang Li"> Jiang Li</a> </span></span><span><span>and his partners at <a href="https://maxar.com" title="Maxar">Maxar’s</a> </span></span><span><span>project leverages a novel approach to addressing this concern.</span></span></span></span><br />  </p> <p><span><span><strong><span><span>RF Fingerprinting Techniques for Millimeter-Wave Device Authentication in 5G/NextG Wireless Communication</span></span></strong><br /><span><span>Millimeter-wave (mmWave) technology is a key enabler for 5G and NextG wireless communications as it supports applications that require high-throughput and ultra-low latency. Due to the broadcast nature of the wireless medium, however, mmWave communication is vulnerable to various attacks. With this project <a href="https://volgenau.gmu.edu/profiles/kzeng2" title="Kai Zang">Kai Zeng,</a> </span></span><span><span>associate professor, AV</span></span><span><span> and his team aim to develop robust and efficient techniques to address these vulnerabilities.</span></span></span></span></p> <p><strong>Extended Reality Empowered 5G Telemedicine Mentoring</strong> <br /><span><span><span><span>Old Dominion University</span></span><span><span> Associate Professor <a href="https://ww2.odu.edu/~sshetty" title="Shetty">Sachin Shetty</a>’s</span></span><span><span> project looks at the development and commercialization of a 5G telemedicine platform that leverages Extended Reality technologies and a 5G environment. Because 5G technology supports massive capacity connections and fast data rates it has the potential to transform healthcare training and service delivery. One example, 5 G-enabled telemedicine, connects remotely located medical providers and allows access to near real-time data, and permits split-second decision-making critical in health care environments.</span></span></span></span></p> <p><span><span><span><span><strong>Super Timelines</strong><br /> When a cybersecurity incident occurs, analysts need to quickly construct a forensic timeline of events to assess the impact and plan the response. This effort typically involves extracting logs and other artifacts from various sources and then combining them into a single list, ordering them by date and time. Only then can an analyst look for clues to help better understand the course of events before, during, and after the incident. With Super Timelines, Florian Buchholz, </span></span><span><span>professor at <a href="https://jmu.edu" title="James Madison University">James Madison University</a>,</span></span><span><span> and his partners at Gigasheet (https://www.gigasheet.com) will develop a turnkey solution for this problem, based on a modern cloud-based infrastructure.</span></span></span></span></p> <p><span><span><span><span>“Without this funding from CCI, the research and start-ups that are so critical to Virginia’s strategy of building a high-impact cyber economy would not have the opportunity to meet the wonderful members of the tech community who have rallied around them to provide advice, guidance, and structure to launching new products and companies,” says Associate Vice President of the Office of Research Innovation and Economic Development, at AV, Paula Sorrell.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 18:18:33 +0000 Martha Bushong 99511 at Drawing a diverse cybersecurity applicant pool /news/2022-10/drawing-diverse-cybersecurity-applicant-pool <span>Drawing a diverse cybersecurity applicant pool</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 08:54</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span>If you’re developing a program or event and want to learn how to attract a diverse audience, take a lesson from a recent </span></span><a href="https://cyberinitiative.org/" title="Commonwealth Cyber Initiative"><span><span><span>Commonwealth Cyber Initiative (CCI) </span></span></span></a><span><span>success story. </span></span></span></span></span><span><span><span><span><span>This spring, the <a href="https://www.cci-novanode.org/" title="CCI Novanode">CCI Northern Virginia Node </a>sponsored a traineeship and apprenticeship program that attracted about 400 diverse applicants for 21 positions. </span></span></span></span></span></p> <p><span><span><span><span><span><span>On October 27 at 11 a.m. CCI</span></span></span><span><span> NoVa Node Program Manager Jordan Mason will describe his successful outreach strategy, and provide a possible blueprint for you to follow, </span></span><span><span>CCI’s Inclusion & Diversity Committee is sponsoring the event as part of its mission of workforce development which includes a commitment to increasing the number of underrepresented groups in the cybersecurity field. </span></span></span></span></span></p> <p><span><span><span><span><span>Mason’s discussion will focus on strategies that the NoVa Node uses to field diverse cohorts in its programs, with a focus on its Cybersecurity Traineeship and Apprenticeship Program. These topics will include the identification of an ideal threshold in program representation and building relationships.</span></span></span></span></span></p> <p><span><span><span><span><span>About Jordan Mason</span></span></span></span></span><br /><span><span><span><span><span>Mason is a <a href="https://www.pmi.org/certifications/project-management-pmp">certified Project Management Professional</a> who cares deeply about building systems and processes that promote equity and accessibility. Before working in his current role, he spent six years working in Student Affairs at George Washington University, helping the university’s portfolio of student organizations navigate institutional financial policies and processes.</span></span></span></span></span></p> <p><a href="https://www.eventbrite.com/e/drawing-a-diverse-applicant-pool-to-your-cyber-program-tickets-428730904677" title="Register here"><span><span><span><span><span>Register for the webinar here. </span></span></span></span></span></a></p> <div class="align-center"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-10/DEI%20graphic%2010.27%20website.png" width="1280" height="720" loading="lazy" typeof="foaf:Image" /></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/12556" hreflang="en">Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 12:54:47 +0000 Martha Bushong 99476 at Information systems and operations management profs awarded $100,000 Commonwealth Cyber Initiative Grant /news/2022-08/information-systems-and-operations-management-profs-awarded-100000-commonwealth-cyber <span>Information systems and operations management profs awarded $100,000 Commonwealth Cyber Initiative Grant</span> <span><span lang="" about="/user/1106" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Jennifer Anzaldi</span></span> <span>Tue, 08/09/2022 - 00:25</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bngac" hreflang="en">Brian Ngac</a></div> <div class="field__item"><a href="/profiles/nmenon" hreflang="en">Nirup Menon</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-03/brian-ngac_0.jpg?itok=wGdLrY6h" width="278" height="350" alt="Brian Ngac" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Brian Ngac</figcaption></figure><p><span><span><span><span>Brian Ngac and Nirup Menon, from the <a href="https://business.gmu.edu/faculty-and-research/academic-areas/information-systems-and-operations-management-area" title="Information Systems and Operations Management Area | AV School of Business">information systems and operations management area</a> at the School of Business, were recently awarded a $100,000 grant from the Commonwealth Cyber Initiative (CCI) located in Arlington, Virginia. This Commonwealth Cyber Initiative Grant was awarded for their proposal to develop a new experiential learning program that will engage students and companies from the Commonwealth.</span></span><br />  <br /><span><span>According to Menon and Ngac, there is a workforce and skills shortage internationally in the cyber security market across all sectors of the economy. Experiential learning can counteract this shortage. </span></span></span></span></p> <p><span><span>“We are hoping to grow the cyber workforce to address the skills gap that currently exists,” says Ngac. Ngac and Menon propose providing students with hands-on training through real projects, with real industry participants. “With this grant, we will choose 24 cyber-interested undergraduates and graduate students from across the state to participate, along with eight industry participants over the spring 2023 and summer 2023 semesters. Each cohort will run for about 12 weeks.”</span></span></p> <p><span><span>Ngac and Menon’s proposal for this program stemmed from the successful past performance of their experiential learning course titled <em>MIS 491: Technology Analysis & Proposals with Clients</em>.  After three semesters of offering the course, Ngac and Menon have overseen 15 projects by students ranging from cyber to business process improvement. Working in teams, students planned and recommended technology solutions for solving business problems.</span></span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2021-08/nirup-menon_1.jpg?itok=MAzLTmIK" width="278" height="350" alt="Nirup Menon" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Nirup Menon</figcaption></figure><p><span><span><span><span>“Having run experiential learning courses since spring 2021, our team’s methodology has evolved to provide students an effective and enjoyable experience to be remembered, and leveraged for their early career years,” says Ngac. </span></span></span></span></p> <p><span><span>The integration of industry participation is the key differentiator for Ngac and Menon. In addition to recruiting students interested in the cyber security field, the duo plans to recruit industry leaders interested in mentorship, and then work with these leaders to design the challenging and engaging cyber projects that will be used. Industry leaders will also guide the students through the execution of these projects. </span></span></p> <p><span><span>“The experience benefits our industry participants by leveraging our talent pool for recruitment opportunities, and by providing a cost-effective method for attempting new/risky projects,” says the team.</span></span></p> <p><span><span>“I am really excited about this grant as it will serve the dual purpose of training students across the Commonwealth using hands-on projects, and addressing the critical need of businesses in the area to find cyber ready individuals,” says Pallab Sanyal, area chair of information systems and operations management.</span></span></p> <p><span><span>At the conclusion of the 12-week course, students will present their work and lessons-learned to the CCI community, and other business and academic leaders.</span></span></p> <p>“By integrating business leaders from the industry into the students’ learning journey, our experiential learning efforts will prepare students with practical skills and theoretical understanding to be more marketable and effective in the workforce,” says Menon.</p> <p class="xxx"> </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Tue, 09 Aug 2022 04:25:50 +0000 Jennifer Anzaldi 75576 at Mason students build drones as part of Commonwealth Cyber Initiative /news/2022-05/mason-students-build-drones-part-commonwealth-cyber-initiative <span>Mason students build drones as part of Commonwealth Cyber Initiative </span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Tue, 05/31/2022 - 10:11</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/mgebril" hreflang="und">Mohamed Gebril</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="c7744d06-b960-496f-88a9-1ccf03710edd" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><span class="intro-text">AV Cybersecurity Engineering associate professor Mohamed Gebril led a team of students to the first-ever BattleDrone competition, an exercise coordinated through the Commonwealth Cyber Initiative. </span></p> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="d3bb67dc-1664-49c6-88b5-4eb7c039f46f"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/academics/bachelor-science-cyber-security-engineering"> <h4 class="cta__title">Learn about Mason's Cybersecurity Engineering Bachelor's <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-05/20220415%20-%20Drone%20Battle%20-%20Drone%20Cage%20-%20By%20Peter%20Means-1721%282%29.jpg" width="1200" height="800" alt="group outside around a drone" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>In April, Mason professor Mohamed Gebril (center in green) took a team of students to Commonwealth Cyber Initiative's BattleDrones Competition at Virginia Tech’s Drone Park. Photo by Peter Means/Virginia Tech</figcaption></figure><p><span><span><span><span><span><span>In April, <a>Mohamed Gebril, </a></span></span></span><span><span>an </span></span><span><span><span>associate professor in AV’s <a href="https://cec.gmu.edu/strengths/cybersecurity" title="Cyber Security">Cyber Security Engineering Department</a>, took a team of students into “battle.” The team traveled to Blacksburg, Virginia, for a BattleDrones Competition that was hosted by the </span></span></span><a href="https://cyberinitiative.org/"><span><span>Commonwealth Cyber Initiative</span></span></a><span><span><span> (CCI) at Virginia Tech’s </span>Drone Park<span>. </span></span></span></span></span></span></p> <p><span><span><span><span><span>Gebril emphasized that the inaugural battle was not really a competition but a learning experience. </span></span><span><span><span>CCI began working on this competition in 2020, but the pandemic halted its progress. This was the first time the event was held.</span></span></span></span></span></span></p> <p><span><span><span><span><span>“It was not a competition per se. All the teams worked together to get this project off the ground,” said Gebril, who teaches in Mason’s<a href="https://cec.gmu.edu/" target="_blank" title="College of Engineering and Computing website, new tab"> College of Engineering and Computing</a>. “CCI-VT ran into some issues with some of the computer vision tools, but overall it was a great learning experience.”</span></span></span></span></span></p> <p><span><span><span><span>The main objective of the competition, according to Gebril, was to have student teams assemble their own drones with materials provided by CCI-VT research group, as well as promote interest in these kinds of activities among younger students.</span></span></span></span></p> <p><span><span><span><span>For the competition, Gebril pulled together a team of Mason <a href="https://cybersecurity.gmu.edu/academics/bachelor-science-cyber-security-engineering" target="_blank" title="B.S. in Cybersecurity Engineering info page, new tab">cyber security engineering majors</a> interested in hands-on opportunities, which included senior Kylie Amison, senior Corrado Apostolakis, senior Brandon Henry, junior Casey Cho, sophomore Zaid Osta, and Mahmoud Zaghloul, an area high school student.</span></span></span></span></p> <p><span><span><span><span>By all accounts, it was a successful trip.</span></span></span></span></p> <p><span><span><span><span><span>“</span></span><span>The team did really well,” Gebril said. “They were able to assemble the drone successfully. We are also working on continuing this project by adding cybersecurity features to enhance this learning experience.”</span></span></span></span></p> <p><span><span><span><span>Will they compete again?</span></span></span></span></p> <p><span><span><span><span>“Yes, indeed,” he said. “Our students love this project and how it applies concepts learned in classrooms toward this hands-on activity.”</span></span></span></span></p> <p><span><span><span><span><a href="https://idia.gmu.edu/current-partnership-programs/" target="_blank" title="CCI Partnership, Mason IDIA, new tab"><span><span>CCI </span></span>is a network of Virginia industry, higher education, and economic development partners</a> dedicated to cybersecurity research, innovation, and workforce development. Mason leads the Northern Virginia Node of the network.  </span></span></span></span></p> <p> </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/2561" hreflang="en">high-tech talent</a></div> <div class="field__item"><a href="/taxonomy/term/7096" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> Tue, 31 May 2022 14:11:38 +0000 Colleen Rich 70761 at Research teams address multidisciplinary cyber challenges  /news/2022-05/research-teams-address-multidisciplinary-cyber-challenges <span>Research teams address multidisciplinary cyber challenges </span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Fri, 05/06/2022 - 13:43</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/hpurohit" hreflang="und">Hemant Purohit</a></div> <div class="field__item"><a href="/profiles/vmotti" hreflang="und">Vivian Genaro Motti</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Whether you are an experienced software developer, a teen texting on a smartphone, or an older adult checking a bank statement, cybersecurity is part of your life. Humans and computers interact every minute of every day and cybersecurity is there to keep information safe and actions private. But normal human behavior can compromise safety and privacy. </p> <p>In 2022, researchers funded by the <a href="https://cci-novanode.org" target="_blank">Commonwealth Cyber Initiative’s </a>(CCI) Northern Virginia Node (NoVa Node) will be exploring the impact of human behavior on cybersecurity systems. Divided into six teams, the researchers will seek to leverage the power of their academic expertise in the social sciences, and related fields. The teams include faculty from the <a href="https://cec.gmu.edu" target="_blank">Colleges of Engineering and Computing</a>, <a href="https://chss.gmu.edu" target="_blank">Humanities and Social Sciences</a>, <a href="https://cehd.gmu.edu" target="_blank">Education and Human Development</a>, and the School of Business. Each team will explore a different aspect of the problem as they aim to translate those understandings into solutions or areas for additional investigation that can impact the welfare of Virginians. Two of those teams are being led by faculty from the Department of Information Sciences and Technology. </p> <p><strong>“Human-Centric Training for Privacy and Security Controls: Bridging the Awareness Gap for Diverse Populations” </strong></p> <p>PI: Vivian Genero Motti, College of Engineering and Computing (CEC), AV; Co-PIs: Samy El-Tawab, and Ahmad Salman, <a href="https://isc.jmu.edu/programs/academic-programs/integrated-science-and-engineering" target="_blank">College of Integrated Sciences, James Madison University</a> </p> <p>If you retired from the workforce 25 years ago, before Wi-Fi, online shopping, banking, or smartphones, you are likely vulnerable to cyberattacks. In fact, older adults face a disproportionate risk of suffering cyberattacks; still, they do not have access to resources and educational materials suitable to meet their needs related to human behavior and privacy protection. </p> <p>Vivian Motti and her team want to do something about that. They plan to reach out to underrepresented users and characterize their level of awareness about cybersecurity. Motti and her team believe that gaining a better understanding of these populations will help inform educational content development, providing content, language, and design aspects that are all suitable to their specific user profiles. </p> <p>“By adopting a user-centric design approach, this project will ensure that cybersecurity training meets users' needs for minority groups. By involving older adults front and center in the research agenda, we will establish training contents that are appropriate to their level of understanding,” says Motti.  Also, besides following the training contents and retaining what they learn, they will be able to act and prevent potential attacks that could pose privacy risks. </p> <p>   </p> <p>"Characterizing Biases in Automated Scam Detection Tools for Social Media to Aid Individuals with Developmental Disabilities"  </p> <p>PI: Hemant Purohit, CEC; Co-PIs: Géraldine Walther, CHHS; Matt Peterson, CHHS; YooSun Chung, CEHD  </p> <p>Designers of scam detection tools often focus on improving the computational accuracy of the methods, especially those with state-of-the-art Natural Language Processing (NLP) and Machine Learning (ML)-based techniques, but their understanding of the diverse human behavior can be limited. This project aims to build a foundation for inclusive cybersecurity technologies to protect individuals with disabilities from online scams using a unique interdisciplinary collaborative approach between computing and non-computing researchers. </p> <p>Specifically, the team’s objective is to uncover the biases in the existing scam detection techniques for social media using NLP and ML methods. “We will conduct Eye Tracking analyses using a labeled scam dataset of social media posts from existing literature on online cybersecurity and study the differences between the attention patterns of individuals with and without developmental disabilities when perceiving scam posts,” says Hemant Purohit. </p> <p>The project hopes to gain insights that will support cybersecurity training development for reducing online fraud for individuals with special education needs. At the same time, the researchers want to identify limitations in automated scam detection tools and help create more effective cybersecurity tools that can protect user groups in our communities. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> </div> </div> </div> </div> </div> Fri, 06 May 2022 17:43:57 +0000 Martha Bushong 69756 at