cis.uab.edu
Research Clusters » Computer and Information Sciences
https://cis.uab.edu/labs
Computer and Information Sciences. UAB Class Schedule Link. External Scholarship Resources for Computer Science Students. News & Events. MSDNAA & VMAP. CIS Acceptable Usage Policy. CIS AUP – Computer Forensics Addendum. CIS Student User Guide. CISIT Hours of Operation. The research at the CIS department is organized into multiple core clusters as pictured and defined below. I PROG Reliable and Scalable Systems (iProgress). SECuRE and Trustworthy computing Lab (SECRET). I PROG Reliable and Scalable Systems.
cis.uab.edu
Interdisciplinary Programs » Computer and Information Sciences
https://cis.uab.edu/academics/interdisciplinary-programs
Computer and Information Sciences. UAB Class Schedule Link. External Scholarship Resources for Computer Science Students. News & Events. MSDNAA & VMAP. CIS Acceptable Usage Policy. CIS AUP – Computer Forensics Addendum. CIS Student User Guide. CISIT Hours of Operation. Uarr; Return to Academics Program. MS in Computer Forensics and Security Management. The Master of Science in Computer Forensics and Security Management (MSCFSM). Bioinformatics Fast Track for Biology Majors. For more detailed information.
spies.cis.uab.edu
People (spies) » SPIES
http://spies.cis.uab.edu/people
Subscribe to RSS feed. Follow SPIES on Twitter. Visit SPIES's Facebook page. Security and Privacy In Emerging computing and networking Systems. RFID Security and Privacy. Fault-Tolerant Distributed Security Services. Privacy and Anonymity on the Internet. Kiavash Satvat (starting Fall 2016). Michael Georgescu (@UAB; since Fall 2012). Justin Harrison (@UAB; since Fall 2012). Jacinta Cai (@UAB; since Spring 2013). Oliver Nick Harper (@UAB; since Spring 2013). Anders Borg (@UAB; since Summer 2013). NYU-Poly...
spies.cis.uab.edu
People » SPIES
http://spies.cis.uab.edu/neuro-security/people-2
Subscribe to RSS feed. Follow SPIES on Twitter. Visit SPIES's Facebook page. Security and Privacy In Emerging computing and networking Systems. RFID Security and Privacy. Fault-Tolerant Distributed Security Services. Privacy and Anonymity on the Internet. Ajaya Neupane (PhD student). Michael Georgescu (MS Student). Md Lutfor Rahman (now at Marvin Technology). Rajesh Kana (Department of Psychology, UAB). Leanne Hirshfield (Syracuse University, NY). UAB Dept. of Computer and Information Sciences.
cis.uab.edu
Faculty » Computer and Information Sciences
https://cis.uab.edu/faculty
Computer and Information Sciences. UAB Class Schedule Link. External Scholarship Resources for Computer Science Students. News & Events. MSDNAA & VMAP. CIS Acceptable Usage Policy. CIS AUP – Computer Forensics Addendum. CIS Student User Guide. CISIT Hours of Operation. Assistant Director of CIA-JFR. High Performance Computing Laboratory (HPCL). Computational Representation and Analysis of Language Lab (CoRAL). SECuRE and Trustworthy computing (SECRET). Associate Professor of Ophthalmology.
blog.se-sy.org
Secure Systems: February 2016
http://blog.se-sy.org/2016_02_01_archive.html
Learning to build systems that are secure, easy-to-use, and deployable. Blog for Helsinki Area Secure Systems. Monday, February 22, 2016. OmniShare: Encrypted Cloud Storage for all your Devices. Some services sidestep this issue by deriving these keys from your password, but this does not offer much security since passwords are notoriously easy to guess. To overcome this challenge, we have developed OmniShare. How secure is your cloud storage? Who has your data? Some of the provider's staff have legitima...
blog.se-sy.org
Secure Systems: Zero-effort authentication : useful but difficult to get right
http://blog.se-sy.org/2016/02/zero-effort-authentication-useful-but.html
Learning to build systems that are secure, easy-to-use, and deployable. Blog for Helsinki Area Secure Systems. Monday, February 15, 2016. Zero-effort authentication : useful but difficult to get right. At the forthcoming 2016 Networking and Distributed Systems Symposium. And in our project page. With co-author and guest blogger Nitesh Saxena (University of Alabama at Birmingham). Two years ago, researchers from Dartmouth college described a system called ZEBRA. At IEEE Security and Privacy Symposium.
amitdutta.net
Education
http://www.amitdutta.net/education.php
Protected override void . MS in Computer and Information Sciences (August 2012 - April 2014). The University of Alabama at Birmingham (UAB). Birmingham, Alabama, USA. CS 660: Artificial Intelligence ( Steven Bethard. CS 636: Computer Security ( Nitesh Saxena. CS 537: Cybercrime and Forensics ( Gary Warner. CS 630: Computer Systems ( Robert Hyatt. CS 650: Automata/Langs/Computation ( Alan P. Sprague. CS 680: Numerical Computing Foundation ( Anthony Skjellum. CS 696: Directed Reading ( Ragib Hasan. Online ...
alexgallego.org
about
http://www.alexgallego.org/about
A real time distributed stream processor. ". Alex Gallego is the CTO of concord. A modern, performant distributed stream processor. Previously, he worked at YieldMo, a mobile yield optimization advertising company as first engineer and employee 3 yrs. He’s also engineered software at FactSet research systems, Forex Capital Markets among others. He is alumnus of Tandon School of Engineering of New York University, formerly known as Brooklyn Poly or Polytechnic University. Thank you for visiting.