CIS News and Events

  • 2022 Tech, Cybersecurity and Data Science Micro-Fair

    Thursday, September 22nd 2022, 1:00 pm - 3:00 pm EDT

    Register via Handshake.

    NAVAIR (US Navy) spring 2022 career fair for entry-level scientists, engineers, logisticians, and contract specialists.  

    March 29, 2022 12 PM - 4 PM Eastern. Learn more and register here.

    National Cybersecurity Training & Education Center

    The Virtual Cyber Career Challenge will provide students the opportunity to gain important cybersecurity workforce experience. Students will work virtually in teams of three on a small network of machines, which they will configure, operate, protect, and defend.

    March 14 & 21 - Information sessions (must attend one session)
    April 4 – Introduction to program, work role interests, and selection​
    April 11 – Introduction to the network, requirements, and team selection​
    April 18 – Network Admin basics, Kanban, Gantt charts, Visio Diagrams​
    April 25 – May 30 – Guidance on network management and pentest prep​
    June 6 – Final prep for pentest​
    June 13 – Pentest​
    June 20 – Presentations​
    June-September – Employer sponsored workshops​
    September 16 – National Cybersecurity Virtual Career Fair​

    Learn more and register here.

    Professor Juntao Chen Received an NSF Grant to Advance Cyber-Physical Security and Resilience Research

    Supported by the National Science Foundation, CIS professor Juntao Chen will conduct pioneering research on improving the security and resilience of cyber-physical energy systems (CPES). CPES is one of the most important national critical infrastructures whose operation is challenged significantly by ubiquitous cyber threats. This project will develop cost-effective and holistic mechanisms for enhancing both the security and resiliency of CPES under large-scale IoT botnet attacks. The developed methods will jointly mitigate the risks of cyber components and equip the physical system with agile recovery capability. This grant will also support research assistants working with Dr. Chen.

    Professor Md Zakirul Alam Bhuiyan named 'Highly Cited Researcher' by Clarivate

    Each year, Clarivate™ identifies the world’s most influential researchers ─ the select few who have been most frequently cited by their peers over the last decade. In 2021, fewer than 6,700, or about 0.1%, of the world's researchers, in 21 research fields and across multiple fields, have earned this exclusive distinction.

    Prof. Bhuiyan is among this elite group recognized for his exceptional research influence, demonstrated by the production of multiple highly-cited papers that rank in the top 1% by citations for field and year in the Web of Science™.

    Spring 2022 Virtual Career Fair Prep. Session

    Wed, Feb 2 12:00 pm EST - 1:00 pm EST
    Get ready for the Spring 2022 Virtual Career Fair by attending this Career Fair Prep Session.  Get some tips about how to use Handshake for the fair, how to prepare for a virtual interview, what to bring with you and how to interact with employers that will be there.
    Register via Handshake

    Fordham University's 2022 Virtual Spring Career Fair

    Thu, Feb 3 12:00 pm EST - 3:00 pm EST
    Comprised of employer’s from all industries, this event is the university’s largest career fair. Employers will be advertising a wide variety of positions so every student is sure to find one that sparks their interest! We encourage students to come prepared with questions and an updated resume.
    Register via Handshake


    • Talk title: “Combinatorial Fusion and Learning Algorithm: Rank-score Function and Cognitive Diversity”
    • Speaker: Christina Schweikert, Ph.D. St. John’s University
    • Date: Monday, November 15, 2021
    • Time: 6:00pm
    • Place: Event has passed
    • For more information, please contact Prof. Frank Hsu at: hsu(AT)fordham(DOT)edu.

    Out of the Shadows: Shining a Light on the Next Cyberthreats

    November 10, 2021 | 1- 2 p.m. EST
    This event has passed.

    Across the world, the sun is not always shining on the cyber threats posed by nation/state actors. These sophisticated and well-sponsored attacks pose serious risks to nations’ infrastructure, manufacturing, defense, and livelihood.

    The FBI and Fordham University are honored to sponsor a special ICCS webinar on the cyber threats that loom on the horizon in the coming year. We invite you to hear from a panel of experts about not only the coming threats but also past and present challenges, including the recent APT 40 hack and the Hafnium Exchange Server compromise.


    • Karen J. Greenberg – Moderator - Director, Center on National Security, Fordham Law
    • Cristin Flynn Goodwin - Assistant General Counsel for Cybersecurity and Digital Trust at Microsoft
    • Nowell Agent - Supervisory Special Agent, FBI
    • Adam R. James - Special Agent, FBI

    Join Quanterion Solutions on Tuesday, Oct. 19 at 1100-1200 EDT for this free webinar titled, “Your Pathway to a Successful Cybersecurity Career: Insights from Cybersecurity Experts.

    Interested in entering the growing cybersecurity workforce? Prepare for success with three leading cybersecurity experts who will outline their best tips and insights including how learning more about cybersecurity can enhance your current career or lead you to a new one, why you should consider cybersecurity as a career option, how to prepare for a cyber career and what you can expect on the job.

    You will have opportunities to ask cybersecurity career questions from the speakers:

    • Jon Check, Executive Director of Cyber Protection Solutions at Raytheon Technologies
    • Tony Anscombe, Chief Security Evangelist at ESET
    • Ryan Kalember, Executive Vice President, Cybersecurity Strategy at Proofpoint Inc
    • Learn how to land a lucrative cybersecurity job, discover options for your cybersecurity education, explore the industry outlook, receive insights into making a career change into cybersecurity, and more.

    If you are a cybersecurity or related student, intern, instructor, professional, job changer, or are simply interested in exploring a cybersecurity career pathway or learning how cybersecurity relates to your job, this webinar is for you. Quanterion Solutions will also provide you access to cybersecurity resources.

    Joseph Caroli, Director of Cybersecurity & Information Systems Programs at Quanterion Solutions.

    About Quanterion Solutions
    Quanterion Solutions Incorporated is a small business headquartered in Utica, New York that provides quality analytical services across a wide range of technical disciplines including Cybersecurity and Information Assurance; Reliability, Maintainability, and Quality; Software Development/Engineering; Information Technology; Knowledge Management/Information Sharing; and others.

    Quanterion Solutions’ staff of knowledgeable subject matter experts brings expertise from several scientific fields. The diversity of their expertise allows the organization to address a wide range of technologies while facilitating the development of innovative and cross-domain solutions to complex technical challenges. Visit for more information.

    Join TechTogether New York's third hackathon for people of marginalized genders.

    About this event
    This year’s theme "Uniquely NYC Things" will primarily focus on what makes New York the greatest city in the world. Come on by and enjoy some interesting workshops, create a hack, and meet some amazing people. We wish to inspire all individuals of marginalized genders and hope to see you there!!

    Why attend TechTogether New York's virtual hackathon?

    • Connect with early-talent recruiters at notable companies at our career fair!
    • Develop and grow your skill-set with 24-hour access to mentorship.
    • Access to over 30+ technical and professional development workshops for hackers of all skill levels.
    • Build a project (optional) that will help your resume stand out.
    • Don't want to compete? Not sure if hackathons are for you?

    Hackathons can be overwhelming. If you don't want to build a project at the event, you don't have to! You can just attend the workshops and fun activities. We even have a prize for the hacker that attends the most events during the hackathon.

    Did you know that last year TechTogether hackathons had an average 98% recommendation rating?

    To learn more about TechTogether New York 2021, visit the event website.

    Workshops Preview

    • Beginners Guide to Hackathons
    • Introduction to Game Development
    • Resume Tips for those going into Tech
    • Introduction to UI/UX Design & Figma
    • Introduction to Web App Development

    TechTogether New York is a chapter of TechTogether, the nation's largest initiative to address the gender inequities in the hackathon community.

    TechTogether is credited in part with increasing the representation of women and non-binary people in the hackathon community by 18% to 39% from 2019 to 2020. (Source: MLH 2020 State of the League Report)

    Register for the hackathon (free).

    Computer Science Ph.D. Program Opens

    The Department of Computer and Information Sciences is pleased to announce that the University has received New York State Approval for the Department's proposal to begin a Ph.D. program in Computer Science. This new program will address an unmet need for CS doctorates with strong research methods and skills as well as training in ethics and pedagogy. It is now accepting applications.

    National Cybersecurity Virtual Career Fair

    (formerly known as the CAE in Cybersecurity Virtual Career Fair)
    September 17, 2021
    9 a.m. - 1 p.m. PDT
    The National Cybersecurity Training and Education (NCyTE) Center and the Centers of Academic Excellence (CAE) in Cybersecurity Community are hosting the fifth annual National Cybersecurity Virtual Career Fair (VCF), sponsored by the NCyTE and the CAE in Cybersecurity Community, on September 17, 2021, from 9 a.m. - 1 p.m. PT. This event is open to students and alumni from over 300 institutions designated as Centers of Academic Excellence in Research(CAE-R), Cyber Defense (CAE-CD), and Cyber Operations (CAE-CO), and institutions in the Candidate's Program (pending approval).

    As the CAE in Cybersecurity program continues to designate new CAEs, the number of students participating in the VCF grows each year. Last year, over 1400 students and alumni participated in the virtual career fair.

    Survey data from the 2020 event indicate both employers and students positively receive the CAE VCF. Many students find careers through the VCF, and many of the same employers return each year to participate.

    Register for the Virtual Career Fair.

    NCyTE Center is funded by the National Science Foundation (Grant #1500375, Grant #1800589, and Grant #1902329). CAE Community is funded by the National Security Agency (Grant #H98230-20-1-0292).

    Spring 2021 Newsletter of the Office of Research

    Research from CIS Faculty and Students is highlighted.

    CIS Graduate Student Jason Hughes wins best presentation award at the 2021 IEEE ICCAR Conference for Autonomous Drone paper

    CIS Graduate Student Jason Hughes has won the best presentation award at the 2021 IEEE International Conference on Control, Automation, and Robotics. His paper was entitled "Wall Detection via IMU Data Classification in Autonomous Quadcopters" and was co-authored with Dr. D. Lyons.

    Cyber Security Special Event

    The Federal Bureau of Investigation and Fordham University will host a complimentary ICCS Special Event FBI Case History, Crisis, Collaboration, and China: The 2017 Cyber Attack on Equifax, on Tuesday, April 20, 2021, at 2 p.m. (EDT) as part of the virtual ICCS Speaker Series.

    Crisis, Collaboration, and China: The 2017 Cyber Attack on Equifax
    For 76-days, a cyber unit in China went undetected, slowly extracting data from multiple databases of Equifax. As a result of the incident, the personal information of at least 145 million individuals was exposed—an event that stands today as one of the most consequential cyber attacks in history. Jamil Farshchi (chief information security officer of Equifax) and Chad Hunt (supervisory special agent, FBI Atlanta Field Office), will discuss the anatomy of the attack on Equifax and how their collaboration contributed to the indictment of four members of the Chinese military.

    Event has occurred.

    Fordham University's 2021 Computer Science, Data Science, and Cybersecurity Networking Event

    Thursday, February 25, 1 - 3 p.m. EST

    Welcome to the 2021 Computer Science, Data Science, and Cybersecurity Networking Event! We are excited that you will be joining us for what promises to be another great event!

    With careers in data and cybersecurity becoming ever more important in this rapidly changing technological landscape, this invitation-only networking event provides students and employers with the opportunity to meet virtually and facilitate meaningful networking connections. Students attending this event will be studying computer and data science as well as part of Fordham’s graduate cybersecurity program, which was recently designated by the U.S. National Security Agency (NSA) and Department of Homeland Security (DHS) as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE).

    Please come prepared to network with employers and discuss your interests, and don't forget to have a copy of your resume ready!

    Be sure to pre-register for the event in Handshake and sign up for group and 1:1 sessions

    Networking Event Checklist
    Before the Event

    • Review the Handshake tutorial on how to navigate virtual fairs in Handshake; register and sign up for group and 1:1 sessions
    • Research the companies in Handshake in which you are interested so you can tailor your professional pitch to them and ask relevant questions.
    • Draft your 30-second pitch and practice it beforehand.
    • Proofread your resume for grammar, spelling, etc.
    • Be sure to fill out your Handshake profile and upload your resume to be visible to employers.
    • Dress appropriately! Business professional is always a safe choice.

    During the Event

    • If using the video chat function, smile and be engaging – make eye contact and state your full name.
    • Ask questions including the next steps in the hiring process and take note of application deadlines.
    • Be aware that employers have a limited amount of time and ask for their email to follow up.
    • Ask the employer for their contact email or if you can connect through LinkedIn.
    • Make notes to remember information for your follow-up email/letter.
    • Talk with a variety of companies even if they don’t have immediate openings in your field.

    After the Event

    Follow-up within 24 hours with a personalized thank you note by email.

    Make an appointment with a career counselor to discuss your event experience, draft a thank-you note, and/or share your questions or concerns.

    Register by
    Thursday, February 25, 2021, 3 p.m. EST
    Nicole Catalfamo, Associate Director of Employer Relations
    [email protected]

    The Federal Bureau of Investigation and Fordham University are pleased to invite you to the first session of the ICCS Speaker Series.

    The FBI's Strategy for Tackling Cyber Threats in 2021 and Beyond with Director Christopher A. Wray

    January 28, 2021 | 2- 3 p.m.
    Space is limited.
    Registration closes on Friday, January 22 at 3 p.m. ET.

    Event has passed.

    Director Wray's remarks will be followed by a discussion with Ed Stroz, Founder of Stroz Friedberg, now known as Aon Cyber Solutions, and Matt Gorham, Assistant Director of the FBI’s Cyber Division. The session will be moderated by Fordham University President Joseph M. McShane, S.J.

  • Intellectual Property Security: Challenges and New Frontiers

    By: Sheikh Ariful Islam

    Time: Tuesday, March. 24 at 10 a.m. Eastern Time (US and Canada)
    Join the Zoom meeting for "Intellectual Property Security: Challenges and New Frontiers"

    Abstract: The emergence of billions, smart, connected, and deeply embedded devices has led to Cyber-Physical System (CPS). The complexity of CPS has opened new opportunities for malicious attacks. The current globalized and decentralized Integrated Circuit (IC) business model faces several security challenges including overbuilding, counterfeiting, piracy, and hardware trojan. The existing protection mechanisms against Intellectual Property theft face several challenges in terms of performance overhead and are more vulnerable to side-channel attacks. In this talk, we will first discuss the major security issues of hardware protection. We will then describe the role of High-Level Synthesis (HLS) for hardware obfuscation early-on during the design cycle. Further, we will discuss DLockout, which locks out the design when finite, but incorrect trials are made from which recovery is only possible by legal authorities. We will then present camouflaging to increase the difficulty of reverse engineering followed by the resistance of proposed techniques against side-channel attacks. The novelty of proposed approaches is that we are free from storing the key bit in memory. The HLS-based Register Transfer Level (RTL) obfuscation technique which is application-agnostic results in the area, delay, and power overhead of 2.45%, 2.65%, and 2.61% respectively for a 32-bit key.

    Bio: Sheikh Ariful Islam received his B.Sc. degree in Electronics and Communication Engineering from Khulna University of Engineering and Technology, Bangladesh, in 2011. From 2011 to 2013, he worked as a full-time faculty in Northern University Bangladesh. Currently, he is working towards Ph.D. degree in Computer Science and Engineering at the University of South Florida, Tampa, FL. His current research focuses on the development of security-driven hardware synthesis tools and cyber-physical systems. He completed an internship at ON Semiconductor, Idaho in Fall 2018. Arif received the best paper nomination at the 2018 AsianHOST Conference and is a recipient of the DAC Richard Newton Young Fellow award in 2016. He has served in the Technical Program Committee in IEEE Dependable and Secure Computing and as a reviewer for several IEEE and ACM publications. He has published nine (9) conference proceedings and journal articles and currently six (6) works are under review.

    Large-Scale and Robust Software Authorship Identification with Deep Feature Learning

    By: Mohammed Abuhamad
    Time: Mon. Mar 23, 2020, 9:10 a.m. Eastern Time (US and Canada)

    Join the Zoom Meeting for Large-Scale and Robust Software Authorship Identification with Deep Feature Learning
    Meeting ID: 631 463 371

    Abstract: Software authorship identification is the process of software developer identification by associating a programmer to a given code based on the programmer's distinctive stylometric features. The software can be presented with the original source code or the executable binaries, which can be decompiled to generate pseudo-code as higher-level construction of the binary instructions. Successful software authorship de-anonymization has both software forensics applications and privacy implications. However, the process requires an efficient extraction of authorship attributes. The extraction of such attributes is very challenging, due to various software code formats from executable binaries with different toolchain provenance to source code with different programming languages. Moreover, the quality of attributes is bounded by the availability of software samples to a certain number of samples per author and a specific size for software samples. To this end, this work proposes a deep Learning-based approach for software authorship attribution, that facilitates large-scale, format-independent, language oblivious, and obfuscation-resilient software authorship identification. The proposed approach incorporates the process of learning deep authorship attribution using a recurrent neural network, and ensemble random forest classifier to de-anonymize programmers. Comprehensive experiments are conducted to evaluate the proposed approach over the entire Google Code Jam (GCJ) dataset across all years (from 2008 to 2016) and over real-world code samples from 1987 public repositories on GitHub. The results of our work show high accuracy despite requiring a smaller number of samples per author.

    Bio: Mohammed Abuhamad is a Ph.D. candidate in the Department of Computer Science at the University of Central Florida (UCF), and a Ph.D. candidate in the Department of Computer Engineering at INHA University. He received his Master's degree in Information Technology (Artificial Intelligence) from the Faculty of Information Science and Technology, National University of Malaysia. Mohammed Abuhamad is a member of the Security Analytics Research Lab at UCF, and the Information Security Research Lab at INHA. His research interests include software security, authentication, privacy, and deep learning-based applications to information security.

    Spring 2020 CIS Seminar Series

    The Future of Narrative

    Speaker: Justus Robertson
    Postdoctoral Research Associate, University of York
    Date: Thursday, March 5th
    Location: JHM 302
    Abstract: What do computer games, storytelling, artificial intelligence, and Star Trek: The Next Generation have in common? The answer is: the holodeck, an immersive virtual reality facility capable of shaping dynamic stories around the live actions of human participants. This talk presents the history and future of automated interactive narrative with a focus on the scientific and engineering challenges that stand between us and a narrative controller fit for the holodeck.

    Bio: Dr. Justus Robertson received a Ph.D. in Computer Science from North Carolina State University where he studied video games, symbolic planning, cognitive psychology, and their applications to interactive storytelling. He is currently a postdoctoral research associate in the Department of Theatre, Film, Television and Interactive Media at the University of York where he is researching data-driven storytelling in applied real-world domains, like eSports.

    Neuroimaging for Mental Disorders Research

    Speaker: Xiaofu He Assistant Professor, Columbia University Medical Center
    Date: Wednesday, March 4
    Location: JMH 302

    Abstract: ​Mental disorders are common throughout the United States, affecting an estimated nearly one in five U.S. adults. Mental disorders are the leading cause of disability in the U.S. which greatly influences Americans lives. Although the latest neuroimaging techniques can be used to study brain structure and function, mental disorders are still not yet objectively diagnosed by neuroimaging. Moreover, the mechanism of cause-and-effect relationships between the human brain and behavior for mental disorders is still unknown. In this talk, I will discuss how we can use neuroimaging techniques (focus on Diffusion Tensor Imaging and fMRI) to identify brain biomarkers for mental disorders and how we can use real-time fMRI neurofeedback to investigate the cause-and-effect relationships between brain and behavior which can be applied to psychiatric disorders.

    Bio: Dr. Xiaofu He, Assistant Professor of Clinical Neurobiology at Columbia University Medical Center and a Research Scientist at New York State Psychiatric Institute. He is also a Faculty member at the Data Science Institute, Columbia University. Dr. He has a broad background in computer science, machine learning, neuroscience, and brain imaging. His research interests include developing brain imaging data analysis tools, exploring new diagnosis and prediction methods using machine learning including deep learning, and investigating potential treatments using real-time fMRI/fNIRS/EEG neurofeedback, which he is currently applying to psychiatric disorders.

    Invited Talk in Cybersecurity 
    By: Mohamed Rahouti

    Tuesday, March 3 at JMH 302   

    Title:  A Dynamic Threshold-Based Modular Framework for SYN Flood Attack Detection and Mitigation Using SDN

    Abstract: Denial of Service (DoS) attacks and in particular, SYN flood attacks (half-open attacks) have been proven a serious threat to Software-Defined Networking (SDN)-enabled environments. A variety of Intrusion Detection and Prevention Systems (IDPS) have been introduced for identifying and preventing such security threats, but they often result in significant performance overhead and response time. In addition to this shortcoming, previously proposed solutions are based on a static detection threshold that needs to be manually set prior to deployment. Therefore, those existing solutions are inflexible for at-scale networks as the malicious traffic rate may continuously change over time.

    As the centralized control capability of SDN presents a unique opportunity for enhancing Quality of Service (QoS) and security in networks, in this talk, I will present a novel and dynamic threshold-based kernel-level intrusion detection and prevention system to address these challenges through leveraging SDN capabilities and filtering mechanisms. The proposed solution is based on a self-adjusted detection threshold that aligns with the legitimate and malicious traffic rates in order to guarantee an efficient response to threats with optimal delay.  

    Bio: Mohamed Rahouti received an M.S. degree in Statistics in 2016 at the University of South Florida and is currently pursuing a Ph.D. degree in Electrical Engineering at the University of South Florida. Mohamed holds numerous academic achievements in the area of computer science and engineering. His current research focuses on computer networking, Software-Defined Networking (SDN), and network security with applications to smart cities.

    The Geometry of Functional Spaces of Neural Networks

    Speaker: Matthew Trager Post-doc Researcher, New York University
    Date: Wednesday, Feb. 26
    Location: LL 601

    Abstract: The reasons behind the empirical success of neural networks are not well understood. One important characteristic of modern deep learning architectures compared to other large-scale parametric learning models is that they identify a class of functions that is non-linear, but rather has a complex hierarchical structure. Furthermore, neural networks are non-identifiable models, in the sense that different parameters may yield the same function. Both of these aspects come into play significantly when optimizing an empirical risk in classification or regression tasks.

    In this talk, I will present some of my recent work that studies the functional space associated with neural networks with linear, polynomial, and ReLU activations, using ideas from algebraic and differential geometry. In particular, I will emphasize the distinction between the intrinsic function space and its parameterization, in order to shed light on the impact of the architecture on the expressivity of a model and the corresponding optimization landscapes.

    Bio: Matthew Trager is a post-doc at the Center for Data Science at New York University. He has a Master’s degree in mathematics from the University of Pisa and Scuola Normale Superiore, and a "Master 2" degree in Mathematics, Machine Learning and Computer Vision from École Normale Supérieure de Cachan. He completed his PhD in computer science at École Normale Supérieure of Paris, under the supervision of Jean Ponce and Martial Hebert. During his PhD, he worked on the geometry of vision. He is now interested in mathematical aspects of deep learning.

    Understanding security threats with data-driven and human-centered approaches

    By Doowon Kim

    Tuesday, February 25 at JMH 302

    Abstract: Recent cyberattacks involve various actors including diverse adversaries, where each actor plays subtle but prominent roles. It is essential to understand the real-world actors from various aspects to mitigate security threats and protect end-users from the threats. In this talk, I will present fundamental findings from several measurements and user studies exploring and understanding the unique behaviors of adversaries as well as benign software developers that cause various security incidents. First, I will discuss the malicious actor, adversaries: particularly, how they abuse the Code-Signing Public Key Infrastructure (PKI) by exploiting the weaknesses in other actors (i.e., certificate authorities, publishers, and end-users). Second, I will describe why benign software developers often fail in secure development and present blueprints for improvement. Finally, I will conclude by discussing my future research directions in understanding new security threats and actors from emerging technologies (e.g., IoT).

    Bio: Doowon Kim is a Ph.D. candidate in the Department of Computer Science at the University of Maryland, College Park. His research focuses on data-driven security and usable security. Specifically, he investigates the root causes of security threats by better understanding actors (e.g., adversary and end-users) involved, with data-driven and human-centered perspectives. Moreover, his work covers the Code-Signing PKI, the Web PKI, and the security behaviors of benign software developers. His research has resulted in a real-world impact on the Code-Signing PKI and has generated interest from media such as Ars Technica, The Register, Schneier on Security, and Threatpost. He is a recipient of the NSA Best Scientific Cybersecurity Paper Award and Ann G. Wylie Dissertation Fellowship.

    Built-in Security and Resilience for Assured Autonomy: A Unified Game, Decision, and AI Approach

    By Juntao Chen
    Thursday, Feb. 20 at JMH 342

    Abstract: Mobile autonomous systems (MAS) are increasingly important due to their wide application in mission-critical tasks, such as surveillance, search, and rescue. Enabled by the Internet of Things (IoT) devices, multiple heterogeneous MAS can also be integrated together as a multi-layer MAS network to offer holistic services. On one hand, the networked MAS can improve the interoperability between different systems. On the other hand, it creates new challenges for enhancing the real-time security and resiliency of autonomy at different scales against cyber-physical attacks. To achieve assured autonomy, I will first establish universal metanetwork modeling which offers a gestalt view of heterogeneous autonomous components, and by leveraging which we can analyze the performance of the global MAS. Then, I will discuss metagame-theoretic approaches to enable decentralized and interdependent decision making between different operators under adversarial attacks. I will also provide AI-enabled algorithms for the online implementation of policies that yield a high level of autonomy in a dynamic environment. In the second part of the talk, I will also briefly discuss how to design strategic trust mechanisms for achieving assured cloud-enabled autonomy. Finally, a number of future research directions on AI and learning for human-centered cyber-physical security will be elaborated.

    Bio: Juntao Chen is currently a final-year Ph.D. candidate at the Department of Electrical and Computer Engineering of Tandon School of Engineering, New York University (NYU). He received the B.Eng. degree in Electrical Engineering and Automation from Central South University, China, in 2014. He has published more than 25 research papers and a book. He is a recipient of the Ernst Weber Ph.D. Fellowship and Dante Youla Award for Graduate Research Excellence from NYU. He is a research associate of the Laboratory for Agile and Resilient Complex Systems (LARX) and a member of Center for Cybersecurity (CCS) at NYU. His research interests include cyber-physical systems, security and resilience, game and control theory, and artificial intelligence. 

    Program Analysis and Testing for Reliable Android and Wear Apps

    Feb 18
    JMH 330
    Hailong Zhang, Ph.D. candidate, Ohio State Univ.

    Abstract: Due to the widespread use of Android devices and apps, it is important to develop tools and techniques to improve app quality and performance. However, traditional program analyses cannot be used directly for Android apps because of their unique characteristics.

    In this talk, I will discuss program analysis specific for control-flow modeling and testing of software for regular Android and Android Wear. I will introduce effective hybrid techniques with static control/data-flow analysis, automated test generation and runtime monitoring for detection of resource leaks in apps.

    Bio: Hailong Zhang is a Ph.D. candidate in the Departments of Computer Science and Engineering at the Ohio State University, where he works with Prof. Atanas Rountev. Before that, he graduated from the Beijing University of Posts and Telecommunications with a Master and a Bachelor degree. His research interests revolve around problems that are related to software reliability, security, and privacy. His current focus is on foundational program analysis and testing of apps for mobile and wearable devices and privacy-preserving software analysis and analytics. Refreshment and coffee provided.

  • CAE Certificate Ceremony, Tuesday May 7, 2019, 5:30 PM
    Fordham University School of Law, Constantino Room
    Hosted by Professor Thaier Hayajneh
    View the evite.

    Google @ LC
    RSVP for Event
    Tuesday, March 12th 2019, 5:30 pm - 7:00 pm EDT
    McMahon Hall 109, Lincoln Center 

    Join us for a talk by Google Engineer James Apfel (FCRH '17) as he gives us a peek behind the curtain at some of the Math and Computer Science that makes Google tick! All years, majors, and degree levels welcome! 

    GSAS Futures / Office of Career Services
    Presents a Conversation on Careers in Data Science and Cybersecurity
    Wednesday, November 13, 2019 | 2:30 – 4:00 p.m. | Lincoln Center Campus |
    Lowenstein South Lounge

    Data analysis and information security analysis are two of the most in-demand skill sets of the twenty-first century. In today’s information economy, a growing number of organizations and corporations are relying on team members with the capacity for data visualization and analysis to drive strategic decision-making and actions. In addition, organizations and companies in a range of industries are calling for cybersecurity specialists to plan and implement security measures to protect their information systems and networks from vulnerabilities.

    GSAS Futures and the Office of Career Services invite all students in the GSAS community to join a panel of data scientists and cybersecurity specialists for a special conversation on career opportunities in these fields. The panel event is pertinent to both students actively enrolled in computer science-based disciplines and those in outside fields with an interest in data analysis and information security. Panelists will reflect on their professional journeys, their day-to-day routines as data professionals, and strategies for interviewing effectively and landing jobs in data science and cybersecurity.

    Panel participants include Fordham alumni and influential professionals in the New York City metropolitan region. They include:

    • Rocco Grillo, Managing Director, FCRH ‘89, Global Cyber Risk Services, Alvarez and Marsal
    • Krystin Vitale, GSAS ’16, Data Scientist at Consolidated Edison
    • Matias Berretta Magarinos, GSAS ‘19, Data Scientist at Health First

    Note: A limited number of internship opportunities are available at Alvarez and Marsal in the summer of 2020. This event is an excellent opportunity for interested students to become acquainted with current employees from the well-regarded cybersecurity firm.

    The panel will be moderated by Yijun Zhao, Ph.D., Assistant Professor and Program Director, M.S. Data Analytics. Lunch will be served.

    RSVP here.

  • Added November 9, 2018

    Data Incubator Fellowship

    The Data Incubator is an intensive 8 week fellowship that prepares masters students, PhDs, and postdocs in STEM and social science fields seeking industry careers as data scientists. The program is free for Fellows and supported by sponsorships from hundreds of employers across multiple industries.

    Anyone who has already obtained a masters or PhD degree or who is within one year of graduating with a masters or PhD is welcome to apply. Applications from international students are welcome.

    Apply for the fellowship for next session which will run from 2019-04-01 to 2019-05-24.

    Added October 2, 2018

    IT Seminar/Cyber Security
    From Victim to Victor: Best Practices to Protect Your Business and Yourself Personally
    Wednesday October 10, 2018 | 3 - 5 p.m.
    Fordham University
    113 W 60th St, New York, NY 10023
    Location: LL South Lounge

    Ileana Van Der Linde, Executive Director for J.P. Morgan Asset & Wealth Management (AWM) Cybersecurity Awareness Global Program Lead

    Ileana leads AWM’s Cybersecurity Awareness Program – educating clients and employees globally on how to better protect themselves and those they work with from increasing cybersecurity threats. Ileana’s team develops timely cybersecurity education materials on various topics  to help address the needs of wealthy individuals, family offices, businesses and others, so they are better prepared to deal with the reality of cyber threats. Ileana has a Bachelors degree from Georgetown University, and MBA from Columbia Business School.

    Thaier Hayajneh
    Director, Fordham Center of Cybersecurity
    University Professor, Computer Science
    Program Director, M.S. in Cybersecurity
    Thaier Hayajneh, Ph.D. is the founder and director of Fordham Center for Cybersecurity, University Professor of Computer Science, program director of MS in Cybersecurity at Fordham University, New York. He served on several NSF Cybersecurity review panels and serves as a CAE reviewer and mentor for NSA. His research focuses on cybersecurity and networking, including wireless security, applied cryptography, blockchain and cryptocurrency. He published over 70 conference and journal papers and serves as editor, associate editor, guest editor and reviewer for several prestigious journals.

    Added September 17, 2018

    Clavius Distinguished Lecture Comets, Craters, and Calendars: Christopher Clavius, S.J. (1538 - 1612)
    Monday, October 1, 2018 | 1 p.m.
    Bepler Commons | Faber Hall
    Rose Hill Campus

    In this year marking the 480th anniversary of the birth of Christopher Clavius, S.J., it seems appropriate for this lecture series, named in his honor, to focus on his life and legacy. That legacy ranges from the Gregorian calendar, which is the calendar that we all use today, to the Stanley Kubrick film 2001: A Space Odyssey. It ranges from popular textbooks to worldwide curricular reform. And it ranges from the history of science in China to the Vatican Observatory, which Pope Gregory XIII established in 1580 to help confirm and refine astronomical observations made in support of Clavius’ reform of the Gregorian calendar. Paul Mueller, S.J., who serves as vice director of the modern-day Vatican Observatory, will explore Clavius’ life and work in their early-modern context and illuminate his enduring legacy for modern science, religion, and culture.

    Google @ Fordham
    Join us for our Google at Fordham event, this talk will help students gain insights on the hiring process and how to pass technical interviews at Google and throughout the tech industry!

    Wednesday, September 19, 2018
    Keating 3rd Floor Auditorium
    4 - 6 p.m.

    Added August 28, 2018

    2018 CAE Virtual Career Fair

    Last year the Centers of Academic Excellence in Cybersecurity hosted the first Virtual Career Fair, sponsored by CyberWatch West and the National Science Foundation, for the students and alumni of CAE designated institutions. A total of 637 students/alumni and 69 employers participated in the career fair with initial survey data indicating the event was well perceived by students/alumni and employers.

    This year the Centers of Academic Excellence in Cybersecurity is hosting the second CAE Virtual Career Fair, sponsored by Cyber Watch West and the National Science Foundation, on October 5, 2018, from 9 a.m. - 1 p.m. PT. The job fair will connect students from CAE designated schools with employers looking to fill internships, part-time positions, and full-time positions. Each student will be required to upload a resume before attending the CAE Virtual Career Fair. Students in Cyber Security degrees from schools designated as Centers of Academic Excellence in Cyber Security (CAE-C), Cyber Defense (CAE-CD), Cyber Operation (CAE-CO) are invited.

    Added May 11, 2018

    Central Jersey Technology Job Fair

    May 15, 2018
    11 a.m. - 1 p.m.
    Bell Works
    101 Crawfords Corner Rd

    Join us for the 2018 Central Jersey Technology Job Fair coming to Bell Works on Tues., May 15 from 11 a.m. to 1 p.m. Employers will be accepting resumes and conducting on-site interviews for open technology positions, including project management, cybersecurity, IT, software development, help desk technicians and more. This event is free and registration is not required.

    Distinguished Lecture Speaker: Prof. Yike Guo

    Big Data for Better Science
    Founding Director of the Data Science Institute (DSI), Imperial College London, UK
    Date: April 26, 2018
    Time: 6 p.m.
    Venue: 12th Floor Lounge, Corrigan Conference Center, Lowenstein Center, Lincoln Center Campus

    FinTech Conference

    The Fordham FinTech Network's 2nd Annual FinTech Conference gathers college and graduate school students, faculty and professionals across New York City to celebrate and learn more about the innovation and evolution of the converging financial technology industry.

    Join us as we explore the future of the fintech industry on Tuesday, April 24, 2018 from 5 - 9 p.m..

    The event will take place at Fordham University – Lincoln Center (113 W 60th St. New York, NY 10024) in Pope Auditorium.

    Topics to be discussed include emerging technologies, blockchain, cryptocurrencies, digital payments, capital markets, and regulation.

    Welcome Remarks by Donna Rapaccioli, Dean of the Gabelli School of Business at Fordham University.

    Applications of Behavior-based Authentication in the Business World

    This talk will look at the applications of behavior-based authentication in the business world and how it has been affected by research. We’ll look at the field as a whole, and also at the vision for us at TwoSense, and demonstrate that this is a problem that is insoluble without the application of machine learning. We will then take a deeper look at the machine learning challenges that must be overcome, and a few novel solutions from our labs. We will then look at some of the lessons learned from deploying behavioral biometrics in the wild in product settings. From there, we will look at some research methodology issues that we’ve come across and conclude by proposing a few best practices for the behavioral biometrics community.
    Speaker: Dawud Gordon, Ph.D., CEO & Co-Founder at TwoSense, NYC
    Date: April 23, 2018
    Time: 5:30 p.m.
    Venue: Leon Lowenstein (LL) 305
    View a description of the talk.

    Blockchain Disruptor Conference, Skadden Conference Center at Fordham Law School (April 28-29)

    Do you want to learn the basics of blockchain? Do you want to meet Fordham alumni who are leaders in the space? Do you want to hear from CEOs, COOs and CTOs of top blockchain companies from around the world?

    The Blockchain Disruptor Conference is purposely scheduled on the weekend (April 28-29) so attendees do not have to face the trade-off of fulfilling work/school responsibilities and trying to learn about a technology that is going to change the world. Day 1 of the conference is "Blockchain for Beginners" and will break down all the jargon to help beginners grasp the language of blockchain and cryptocurrencies. Topics includes: Why Bitcoin Matters (Beyond its Market Price) | Hashing 101 | What is Consensus and How Does It Work? | Cryptography & Security | Smart Contracts | Internet of Things (IoT) | Permissioned vs. Unpermissioned Blockchains | The Five Roles of Tokens/Cryptos in Blockchain | Investing in the Blockchain Space (Cryptos & Otherwise). There will be a reception on Saturday evening (the end of Day 1) that is open for any registered participant across Days 1 and 2.

    Day 2 is "Blockchain for Disruptors" and will entail various industry-specific panel sessions:

    • How Blockchain is Juicing Energy Markets
    • Insurance & Reinsurance Efficiencies through Blockchain
    • How Blockchain is Changing Healthcare
    • Digital Marketing and Blockchain
    • Blockchain and the Financial System
    • Can Blockchain Save Content Creators (Publishing, Music, Film & Visual Arts)?
    • Value Creation and Appropriation in Identity and Privacy Markets
    • Blockchain for Humanitarian Efforts

    Fordham CIS students may register for the conference at an 80% discount (only $40 per day):

    Discount Code: CIS80
    Expiry: April 29, 2018 (midnight)

    The Fordham Computer Science Society Workshop

    Join The Fordham Computer Science Society and Dennis Egan, a Fordham alum and data scientist at Alpha Vertex for an intro to machine learning workshop. Also an intern recruitment opportunity!
    WHEN: Thursday, April 19
    WHERE: JMH 404
    TIME: 7 - 8 p.m.

    Women in Cybersecurity: A CAREERS SUMMIT

    Employers are looking to fill jobs in the rapidly growing field of cybersecurity. It offers high salaries, career security, and promotion opportunities, and yet has a talent gap and a diversity gap, with women and minority groups underrepresented. Join us as industry executives and members of the FBI’s Cyber Branch hold a panel discussion on the leading role women can play in the cybersecurity field, with an emphasis on cyber careers in the FBI. View the flyer.
    Date: MONDAY | APRIL 16, 2018
    Time: 1 – 2:30 P.M.

    Office of Career Services is hosting a STEM Career Fair on April 10 at Rose Hill, 2 - 4 p.m.

    To view the list of employers attending, students can log into their Handshake accounts -> Click Events tab. A few that are attending include: NYU Langone, FBI, and The Albert Einstein College of Medicine.

    What: STEM Career Fair
    When: Tuesday April 10, 2 - 4 p.m.
    Where: McGinley Ballroom
    View the 2018 STEM Career Fair flyer.

    Adversarial-Resilience Assurance for Mobile Security Systems

    Wei Yang, Ph.D. candidate University of Illinois at Urbana-Champaign
    Date: Thursday March 15, 2018, Thursday, 1 -2 p.m.
    Room: JMH 342
    View a full description of the talk.

    Exploring the Power of Source Reliability in Information Integration

    Houping Xiao, Ph.D. candidate, SUNY Buffalo State
    Date: Wednesday March 14, 2018, 1 -2 p.m.
    Room: JMH342
    View a full description of the talk.

    Individual Differences in Deception and Deception Detection in Spoken Dialogue

    Sarah Ita Levitan, Ph.D. candidate, Columbia University
    Date: Tuesday March 13, 2018, 2 - 3 p.m.
    Room: LL601
    View a full description of the talk.

    Spring 2018 CIS Faculty Research Talk Series

    Download the Spring 2018 Schedule and Description of All of the Talks.

    Option Implied Volatility Prediction by Integrative Learning with Dr. Henry Han.
    Date: Wednesday February 28, 2018,
    Time: 12 - 1 p.m.
    Room: JMH342

    Smartphone and Smartwatch-based Activity Recognition and Biometrics with Dr. Gary Weiss
    Date: Wednesday April 25, 2018
    Time: 12 - 1 p.m.
    Room: JMH342

    Spring 2018 CIS Distinguished Lecture Series

    Download the Spring 2018 Schedule

    Cyber Intelligence and Counterterrorism within the NYPD: A View from the Inside

    Presented by Mitch D. Silber, Principal and Founder, The Guardian Group, Former Director of Intelligence Analysis, NYPD

    Date: Thursday, March 1, 2018
    Time: 6 p.m.
    Venue: The University Club
    1 West 54th Street, New York City
    Cost: $25 for alumni, but free for students, faculty, and staff, who can email Annelice Morales

    Please join the Gabelli School of Business and Sander Flaum, chair of the Fordham Leadership Forum, for this Flaum Leadership Lecture Series event featuring cyber intelligence expert Mitch D. Silber.

    A reception will immediately follow the lecture.
    Business attire is strictly enforced by the University Club.

  • On the Design of an Industrial IoT Device 

    (IEEE members are eligible to apply for 0.1 CEU/ 1.0 PDH credit)  
    Time: 6:30pm - 7:45pm, Tuesday, December 12, 2017
    Location: Fordham University - Leo Loweinstein, Room: LL 306
    113 West 60th Street, New York, NY 10023

    The session will provide introduction on the beginning of an Industrial Internet of Things (IIoT) solution that eventually could be deployable worldwide, and on how to realize a simple inexpensive IIoT method with large scalability. The speaker will explain the methodology from two aspects. The first part addresses the market and practical considerations required prior to product definition and development, including the reasons behind choice of a Boat Area Network (BAN) networking scheme, the final MCU chip selection, Internet access gateways and standards involved required to provide for retrofit with existing wired networks, or for new installations. The second part is a description of the architecture of the first IIoT product resulting from this development and lessons learned. 

    Managing Principal, iOTA World Inc. BSc EE, Electrical, Royal Military College, Kingston, ON Canada BSc EE, Communications-Electronics, Queen’s University, Kingston, ON, Canada Graduate work, Systems Engineering, University of Delaware, Newark, DE, USA Professional: Life Senior Member of IEEE  Senior past Chair- IEEE Communications Society NYC Chapter ;  Member , American Water Works Association (AWWA)  Warner has done engineering work for major entities, countries, cities, companies and regional– in the United States, Canada, India and China. Warner's experience includes technical consulting, embedded micro-controllers, LAN and WAN network design, wireless network design, complete 9-1-1 system design, QA/QC reviews, complex system design and budgeting, contract review, implementation and project management

    Contact Information: 
    Dr. Yun Ye, Email: [email protected]
    Dr. Frank Hsu, Email: [email protected] 


    The Hour of Code is here!  Volunteer here:

    Members of IEEE-NY Computer Society are supporting Computer Science Week's Hour of Code event that runs from Dec. 4-10 each year in honor of Admiral Grace Murray Hopper's birthday on Dec. 9th. The goal of this event is to teach children coding skills using material provided by Hour of Code. 

    Humanitarian Blockchain Summit
    November 10, 2017

    The Humanitarian Blockchain Summit will bring technology experts, scholars, and humanitarian practitioners together for dynamic discussions about the future of blockchain technology in humanitarian operations and in pursuit of the UN Sustainable Development Goals.

    The summit is designed for those interested in using blockchain for tangible humanitarian impact. Breakout sessions will focus on overcoming challenges to using blockchain, as well as identifying the best ways to develop humanitarian-friendly blockchain platforms, among other topics. The sessions will also include collaborative exercises and presentations about how some organizations are using blockchain.

    The goal of the event is for participants to recommend policies for using blockchain in specific humanitarian interventions.

    Integrative Neuroscience Poster

    Thursday October 12, 2017
    Concordia College New York
    171 White Plains Road, Quad | Bronxville, NY, USA 10708

    Dialogues on the Quad 2017: The Conversation Continues

    Artificial Intelligence Panel Tech Fluency for the 21st Century

    Panel Liaison/Moderator:

    Mr. Charles Frank Director of Off-Site Programs, Concordia College New York


    Rev. Dr. Joshua Hollmann, Assistant Professor of Theology, Chair of the Theology Department, Concordia College New York

    Dr. Damian M. Lyons, Professor of Computer Science, Fordham University, Director of Fordham's Robotics and Computer Vision Laboratory

    Lieutenant Colonel Alexander S. Mentis, Assistant Professor of Computer Science,The United States Military Academy at West Point

    Dr. Rocio Ng, Senior Data Scientist, Kickwheel Co.

    Maria Rachelle, CEO and Founding Member at Living Leadership Today, LLC

    “The development of full artificial intelligence could spell the end of the human race.”

    -Stephen Hawking

    Amazing advances in technology known as “AI,” artificial intelligence, have generated a surge of interest, but what do these tech evolutions mean for us? The purpose of this panel is to facilitate a campus-wide conversation on the topic of artificial intelligence and its impact on what it means to be human.

    These dialogues will include discussion of the following questions:

    • What is AI?
    • What are the benefits and dangers of AI?
    • Which industries will benefit the most from AI?
    • What does the future hold for humanity’s interface with AI?

    Fall 2017

    CIS Faculty Research Talk Series
    Time: 12 – 1 p.m.
    Venue: John Mulcahy Hall (JMH) 342

    September 27, 2017
    Investigating Connected k-Coverage in Two-Dimensional Wireless Sensor Networks:
    Habib M. Ammari

    October 18, 2017
    Ranking and Scoring for Big Data Analytics
    D. Frank Hsu, Clavius Distinguished Professor of Science

    November 1, 2017
    Computational Robotics
    Damian Lyons, Graduate Program Director

    December 6, 2017
    Research in Computational Neuroscience
    Daniel Leeds, Associate Chair for Undergraduate Studies

    Fordham IBM Blockchain Workshop

    At this inaugural university workshop, IBM presented a blockchain demo, and speakers from Fordham and several government, finance, technology, and law firms offered their thoughts on how students and other members of academia can play a role in advancing this technology in a wide variety of professions and fields.

  • 1/26/2016: Seminar on "Visual object representations in the human cortex: Dissimilarity analysis for model comparison" by Assistant Professor Dr. Daniel D. Leeds at 12PM in JMH312(RH)

    2016 Fordham/IBM Symposium on Cyber Security, Data Analytics and Mobile Systems
    1 - 10 p.m.
    Lowenstein 12th Fl. Lounge,
    E. Gerald Corrigan Conference Center, Lincoln Center

  • 11/11/2015: Seminar on "Combining Static Analysis and Machine Learning for Industrial-quality Information-flow-security Enforcement" by Dr. Marco Pistoia, IBM Thomas J. Watson Research Center in New York at JMH-312 at 1 p.m.

    5/5/2015: Celebrating Scholarship and Creativity Series: Big Data

    4/17/2015: Dr. Marios Polycarpou—Intelligent Big-Data Monitoring of Critical Infrastructure Systems

    3/12/2015: Mary Flanagan—Humanist Games

    3/2/2015: Dr. Minh Hoai Nguyen—Toward large-scale human behavior analysis

    2/12/2015: Dr. Ishfaq Ahmad—Optimization techniques for sustainability in high-performance computing

    2/12/2015: Beth Noveck—Government With the People: Digital Media and Re/Designing Government

    2/11/2015: Mr. Arif Khan—From the Front Lines: All About the Data

    2/5/2015: Dr. Mohammad Obaidat—Key Enabling ICT Systems for Smart Homes and Cities: Trends, Challenges and Samples of Our Related Works

    2/4/2015: Dr. Stuart Brown—Building Draft Genomes for New Species

    2/3/2015: Tom Marshall—A Brief Introduction to Quantum Computing

    1/15/2015: Dr. Prabir Bhattacharya—Content-based image retrieval using machine learning and similarity matching

  • 11/6/2014: Dr. Kevin Bowyer—Iris matching and de-duplication of the Somaliland trial voter registration dataset

    10/15/2014: Dr. Runhe Huang—From personal big data to human-centric smart services

    10/3/2014: Dr. Wen-Hsiung Li—How to assemble a genome for next generation sequencing reads.

    5/2/2014: Dr. Jiming Liu—Data Driven Modeling and Hidden Cause Discovery in Global Healthcare

    4/28/2014: Dr. Asohan Amarasingham—Trial-to-trial variability, non-stationarity, and the interpretation of firing rate in neurophysiology

    4/10/2014: Dr. Yuval Kluger—From heterogeneity in cancer to heterogeneity in bioinformatics tools

    4/7/2014: Dr. Ying Liu—A tripartite clustering analysis on microRNA, gene and disease model

    3/27/2014: Dr. Shinsuke Shimojo—Sensory substitution, multisensory plasticity, and the third kind of "qualia"

    3/26/2014: Dr. Andy Rindos—Open Cloud for STEM-focused Computing and the Virtual Computing Lab(VCL) Environment

    3/11/2014: Information Panel—Reducing the Nation's Cyber Risk

    01/29/2014: Interdisciplinary Faculty Seminar in Bioinformatics & Big Data—Exploring visual feature spaces for cortical object perception by Daniel Leeds

  • 11/06/2013: Fordham Informatics ("FICS") Seminar—A big data investigation on algorithmic trading and liquidity by Siyi Shen

    09/20/2013: Invited Talk—Multi-Instance Multi-Label Learning by Prof. Zhi-Hua Zhou, Nanjing University

    08/27/2013: IEEE_PES/IAS Invited Talk—Robotic Mapping Issues Dr. Damian M. Lyons, Fordham University

    08/5-8/2013: ICCS 2013—International Conference on Cyber Security

    07/16-18/2013: ICCI*CC 2013—IEEE Conference on Cognitive Informatics & Cognitive Computing

    04/25/2013: NY Tech Day—Tech Startup Expo; 400 startups; 10,000+ tech enthusiasts & entrepreneurs

    04/10/2013: Dr. Cristina Dalfo—Manhattan Street Networks

    03/20/2013: Dr. Gustavo Stolovitzky—The Future of Genomics and Next Generation Sequencing

    02/21/2013: Dr. Damian Lyons—Robotics! Science and Systems