Logo: University of Southern California

Events Calendar

Select a calendar:

Filter May Events by Event Type:

Events for May 14, 2018

  • Repeating EventMeet USC: Admission Presentation, Campus Tour, and Engineering Talk

    Mon, May 14, 2018

    Viterbi School of Engineering Undergraduate Admission

    Workshops & Infosessions

    This half day program is designed for prospective first-year students (High School juniors and younger) and family members. Meet USC includes an information session on the University and the Admission process, a student led walking tour of campus, and a meeting with us in the Viterbi School. During the engineering session we will discuss the curriculum, research opportunities, hands-on projects, entrepreneurial support programs, and other aspects of the engineering school. Meet USC is designed to answer all of your questions about USC, the application process, and financial aid.

    Reservations are required for Meet USC. This program occurs twice, once at 8:30 a.m. and again at 12:30 p.m.

    Please make sure to check availability and register online for the session you wish to attend. Reservations are required for the Meet USC program.

    Also, remember to list an Engineering major as your "intended major" on the webform!

    >> Register for a Meet USC Session

    Location: Ronald Tutor Campus Center (TCC) - USC Admission Center

    Audiences: Prospective Undergrads and Families

    View All Dates

    Contact: Viterbi Admission

    Add to Google CalendarDownload ICS File for OutlookDownload iCal File
  • PhD Defense - Aaron Schlenker

    Mon, May 14, 2018 @ 10:00 AM - 12:00 PM

    Thomas Lord Department of Computer Science

    University Calendar

    Title: Game Theoretic Deception and Threat Screening for Cyber Security

    PhD Candidate: Aaron Schlenker

    May 14th
    SSL 150

    Milind Tambe (Chair)
    Jelena Mirkovic
    Jonathan Gratch
    Muhammed Naveed
    Richard John


    Protecting an organization's cyber assets from intrusions and breaches due to attacks by malicious actors is an increasingly challenging and complex problem. Companies and organizations who operate enterprise networks deploy various software and tools to protect from these attacks, such as anti-virus software and Intrusion and Detection Systems (IDS), along with dedicated teams of cyber analysts tasked with the general protection of an organization's cyber assets. In order to compromise a network, an adversary must complete the Cyber Kill Chain which is a series of steps outlining the components of a successful cyber breach. During the Cyber Kill Chain, there are numerous opportunities for the network administrator (defender) to intercept the adversary and thwart an attack. In this talk, I will describe how computational game theory can be used to capture the interaction between the adversary and network administrator in cyber security along with two potential applications of game theory to problems faced by the network administrator to optimize the use of their limited security resources. The first application proposes a framework for deceiving cyber adversaries during the reconnaissance phase of an attack and I will describe a model that provides deceptive strategies to the defender that lead to hackers attacking non-critical systems in the defender's network. The Second application corresponds to the prioritization of alerts generated from Intrusion Detection and Prevention systems throughout a network and I will describe a model that accounts for various salient features in cybersecurity alert allocation when determining the best strategies for the network administrator.

    Location: Seaver Science Library (SSL) - 150

    Audiences: Everyone Is Invited

    Contact: Lizsl De Leon

    Add to Google CalendarDownload ICS File for OutlookDownload iCal File