Select a calendar:
Filter May Events by Event Type:
SUNMONTUEWEDTHUFRISAT
Events for May 14, 2018
-
Meet USC: Admission Presentation, Campus Tour, and Engineering Talk
Mon, May 14, 2018
Viterbi School of Engineering Undergraduate Admission
Workshops & Infosessions
This half day program is designed for prospective first-year students (High School juniors and younger) and family members. Meet USC includes an information session on the University and the Admission process, a student led walking tour of campus, and a meeting with us in the Viterbi School. During the engineering session we will discuss the curriculum, research opportunities, hands-on projects, entrepreneurial support programs, and other aspects of the engineering school. Meet USC is designed to answer all of your questions about USC, the application process, and financial aid.
Reservations are required for Meet USC. This program occurs twice, once at 8:30 a.m. and again at 12:30 p.m.
Please make sure to check availability and register online for the session you wish to attend. Reservations are required for the Meet USC program.
Also, remember to list an Engineering major as your "intended major" on the webform!
>> Register for a Meet USC SessionLocation: Ronald Tutor Campus Center (TCC) - USC Admission Center
Audiences: Prospective Undergrads and Families
Contact: Viterbi Admission
-
PhD Defense - Aaron Schlenker
Mon, May 14, 2018 @ 10:00 AM - 12:00 PM
Thomas Lord Department of Computer Science
University Calendar
Title: Game Theoretic Deception and Threat Screening for Cyber Security
PhD Candidate: Aaron Schlenker
May 14th
10am
SSL 150
Committee:
Milind Tambe (Chair)
Jelena Mirkovic
Jonathan Gratch
Muhammed Naveed
Richard John
Abstract:
Protecting an organization's cyber assets from intrusions and breaches due to attacks by malicious actors is an increasingly challenging and complex problem. Companies and organizations who operate enterprise networks deploy various software and tools to protect from these attacks, such as anti-virus software and Intrusion and Detection Systems (IDS), along with dedicated teams of cyber analysts tasked with the general protection of an organization's cyber assets. In order to compromise a network, an adversary must complete the Cyber Kill Chain which is a series of steps outlining the components of a successful cyber breach. During the Cyber Kill Chain, there are numerous opportunities for the network administrator (defender) to intercept the adversary and thwart an attack. In this talk, I will describe how computational game theory can be used to capture the interaction between the adversary and network administrator in cyber security along with two potential applications of game theory to problems faced by the network administrator to optimize the use of their limited security resources. The first application proposes a framework for deceiving cyber adversaries during the reconnaissance phase of an attack and I will describe a model that provides deceptive strategies to the defender that lead to hackers attacking non-critical systems in the defender's network. The Second application corresponds to the prioritization of alerts generated from Intrusion Detection and Prevention systems throughout a network and I will describe a model that accounts for various salient features in cybersecurity alert allocation when determining the best strategies for the network administrator.
Location: Seaver Science Library (SSL) - 150
Audiences: Everyone Is Invited
Contact: Lizsl De Leon