Class Description

In this class researchers from the industry and academia present topics in Computer Science Related to their work or research. If you are taking this class for credit you will be required to write an abstract for each seminar due by Wednesday at 5PM PT of the same week as the presentation. Abstracts will be in pdf format and submitted through the submission page below. Content of the abstracts will be discussed in the first class meeting and in the class schedule below. Number and quality of abstracts relative to the abstract required for each talk will determine the grade. It will be run on a point system for the abstracts as if they were homeworks.

Note because this class is on Monday, when school is not held on Monday there is no class that week. This means our first class is Jan 23. Don't forget!

Time: M 3:30-4:30
Final: None
Location: EP 204
Text: None

Syllabus

This syllabus is an active document describing speakers and topics plus reference material for the seminar talks.

Week

Monday
of that
Week

Topics
wk 1 Jan 9 NO CLASS!
wk 2 Jan 16 NO CLASS! (MLK Day)
wk 3 Jan 23 Class orientation including how homework works for those taking a grade.
wk 4 Jan 30

Speaker: Rachel Otto
Career Development Liaison to the College of Engineering & College of Science
Topic: Advanced Interviewing Skills for Computer Science Students
Supporting Documents:
Abstract:
Learn how to approach the interview from the employer's mind frame and how to promote yourself as an ideal fit for the job/company.
wk 5 Feb 6

Speaker: Seth Samuels (shown), VP of Research and Development and Eric Mann, Director of Product Engineering
Topic: Kochava - Who We Are, What We Do, Why Its Working
Documents:
Abstract: In a sea of millions of mobile apps and billions of dollars of daily advertising spend, Kochava (a mobile tech startup in Sandpoint, ID) has cemented its place as the single pane of glass giving marketers oversight into the effectiveness of their investment.
wk 6 Feb 13

Speaker: Xiaogang (Marshall) Ma, CS Dept., University of Idaho
Topic: SEM+: a tool for concept mapping in the Semantic Web
Supporting Documents:His Power Point slides
Abstract: The amount of domain-specific ontologies and vocabularies encoded in popular Semantic Web languages such as OWL and SKOS grows rapidly as more and more domain scientists realize the power of Semantic Web Technologies. The interlinking between these concepts will enable the possibility of performing data integration and identity recognition, which is crucial in developing applications that use data from multiple sources. In this talk, we discuss a new tool for performing concept mapping called SEM+. SEM+ includes three key steps: (1) use a blocking approach to group possible matching entities into one block and therefore reduce the computation space; (2) use the Information Entropy based Weighted Similarity Model to compute semantic similarity between entity data and suggest possible linking; and (3) create a similarity matrix and select the final matches. Details of those steps will be illustrated with example datasets.
wk 7 Feb 20 NO CLASS! (President's Day)
wk 8 Feb 27

Speaker: Terry Soule and Barrie Robison
Topic: The Darwin's Demons Video Game
Supporting Documents: Polymorphic Games -- Evolving Learning Through Video Game Design
Abstract:
wk 9 Mar 6

Speaker: Rachel Otto
Career Development Liaison to the College of Engineering & College of Science
Topic: Benefit Negotiation Skills for Computer Science Students
Supporting Documents:
Abstract:
Prepare for the important conversation of salary/benefit negotiation by knowing your value, market trends, and do's/don'ts for when/how to approach the conversation.
xx Mar 13 NO CLASS! (SPRING BREAK)
wk 10 Mar 20

Speaker: David Manz, Ph.D. Senior Cyber Security Scientist at the Pacific Northwest National Laboratory
Topic: Cyber Security Resiliency: Measuring the Myth and the Mission
Supporting Documents: davidManzTalk.pdf
Abstract: This talk will introduce the core concepts of cyber security resilience, in the context of more traditional resilience and fault tolerance. Current examples of cyber resilience defenses will be described, as will the challenges with defining, implementing, and testing. Finally the shift from system or component security, to overall business and mission security will be covered.
wk 11 Mar 27

Speaker: Dr. Michael Haney, Assistant Professor of Computer Science at University of Idaho in Idaho Falls
Topic: Gathering Industrial Control Systems Threat Intelligence
Supporting Documents: https://www.uidaho.edu/engr/departments/cs/our-people/faculty/michael-haney
Abstract:
Honeypots are a means of luring in attackers so that their techniques and tactics can be closely studied. This presentation discusses a framework which brings together the best available honeypot technology and new adaptation of existing tools to provide a modernized honeypot suitable for detecting current attacks against cyber-physical systems. The prototype SCADA honeynet uses the IMUNES network simulator, a FreeBSD-based kernel-level network stack virtualization tool with user-friendly facilities that simplify design and managemenet. SCADA emulation has been added with the necessary components to mimic digital controllers by using JAMOD, a Java-based package to support implementation of Modbus/TCP, a protocol widely used by the oil & gas industry. Data control, capture, collection, and analysis are provided by a fully updated honeywall system that brings together prior Honeywall Roo design elements with Security Onion, a widely used network security monitoring Linux distribution. Hybrid honeynets, using both virtualized and real PLCs, will also be discussed. This framework results in a fully functional and highly scalable SCADA honeynet.
wk 12 Apr 3

Speaker: Ananth Jillepalli
Topic: An Architecture for a Policy-Oriented Web Browser Configuration Management System - HiFiPol: Browser
Supporting Documents:
Abstract:
Web browsers are a necessity of today s economy and government. This success is attributed to their flexibility, which is afforded by Turing-complete execution and powerful graphic capabilities, both accessible through the network to trusted and untrusted sites. These capabilities, if maliciously undermined, have high potential for data or system compromise. An approach that can be successfully applied to prevent and mitigate compromise is tailoring browser security settings according to device, user/role, and domain. To make such a high-fidelity security configurations practical, we are designing and implementing HiFiPol: Browser: a policy-oriented and multiplatform Hi-Fidelity security Policy management system for Web Browsers. In this presentation, we talk about the architecture of HiFiPol: Browser. We describe in detail: all components of the architecture, the tasks needed to implement it in a fully operational system, and the current status on the progress of each task. HiFiPol: Browser has been designed to provide: a) a human-friendly and high-level policy specification language and environment, b) security policy conflict detection and resolution, c) automatic instantiation of high-level policies into configurations, and d) distributed browser configuration deployment. We believe that HiFiPol: Browser will enable the design and implementation of domain-, application-, device-, and user- tailored secure policies within a technically diverse organization. Picture: Attached to this e-mail is the picture file.
wk 13 Apr 10

Speaker: J.R. Tietsort: Chief Information Security Officer at Micron
Topic: Cybersecurity and its application for business. How business should think about cybersecurity while maintaining a high rate of innovation.
Supporting Documents:
Abstract:
wk 14 Apr 17

Speaker: James Price - CTO of Clearwater Analytics
Topic: Bursting the Mortgage Model Performance Bubble
Bio: James Price is CTO and Director of Development for Clearwater Analytics. Clearwater Analytics, headquartered in Boise, Idaho, is a software-as-a-service company that provides automated investment accounting, performance, compliance, and risk reporting for insurance companies, asset managers, corporations, banks, governments, and other institutions. Clearwater solutions automate investment accounting, monitors investment policy compliance, and analyzes portfolio performance and risk. James is responsible for all the people, systems and processes that build, test, deploy and maintain the Clearwater product line. Clearwater Analytics has grown to nearly 600 people today. James is a graduate in Computer Science from Utah State University.
Abstract: In this three act talk, James will describe the forces leading to the mortgage crisis almost ten years ago and Clearwater Analytics' role in bringing more transparency to massive investment portfolios. A real world relational database performance problem that couldn't be solved by hardware alone will be delved into, giving students some real insight into problems large SaaS companies face. Come learn how we applied a principle from the No SQL playbook to solve this relational database performance problem.
wk 15 Apr 24

Speaker: Dustin Arendt, Data Scientist with Pacific Northwest National Laboratory
Topic: Storyline Visualization for Understanding Complex Temporal Dynamics
Supporting Documents:
Abstract:
Storyline visualization can be used to visually convey a system’s evolution through the interactions of its constituent components. With this technique, when two entities are interacting, their timelines are drawn close together; otherwise they are drawn far apart. This technique has typically been used in specialized applications such as understanding the plot of a movie in terms characters scene co-occurrence (xkcd cartoon). The talk will cover an introduction to data visualization and the storyline visualization technique, related work, an overview of our state-of-the-art layout algorithm, and several of our applications of storyline visualizations.
Bio:
Dustin Arendt is a senior visualization scientist in the Visual Analytics group at Pacific Northwest National Laboratory (PNNL), joining the lab in October 2014. His received his PhD from Virginia Tech in 2012, where he studied social network analysis and modeling and simulation of complex systems. Limitations in available techniques for understanding rapidly changing complex systems, especially those defined on networks with changing structure, inspired him to pursue a postdoc in visualization at the Air Force Research Laboratory from 2012 to 2014. Currently, Dustin's interests are at the intersection of human-computer interaction, machine learning, and visual analytics, with a focus on novel and intuitive ways gain insight from high-dimensional and dynamic systems. For example, Dustin is well known for his work in storyline visualization layout algorithms and the application of storyline visualization to novel application domains.

wk 16 May 1

Speaker: Dr. Robert Brigantic, Pacific Northwest National Laboratory
Topic: Translating a Vision to a Computing Platform for Risk Reduction
Supporting Documents: National Security Directorite Applications, Risk Reduction and Assessment Model (3RAM)
Abstract:
In this presentation we will walk through the process of guiding a vision for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues to implementation of this vision in a computing platform. We’ll start by discussing the initial vision, and then move on to the creation of a prototype tool to demonstrate this vision. We’ll then discuss how this vision and prototype are now currently being implemented in a full-scale computing platform. The presentation will also review the mathematics of the methodology which starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. Our approach is to formulate the problem as a mathematical program which is concerned with optimizing the allocation of limited resources between competing activities while simultaneously satisfying all constraints associated with the problem. Once formulated, this mathematical program can be solved by traditional methods to yield the best allocation of the constrained resources that minimize the overall venue risk. Additional solution algorithms can also be invoked to help keep to the problem tractable when the number of variables involved becomes large.
wk 17 May 8 NO FINAL EXAM

Services

Policies and Processes