talk: Does Wireless and Mobile Networking Research Still Matter? 12pm Wed 2/27, ITE325

Does Wireless and Mobile Networking Research Still Matter?

Dr. Dmitri Perkins, National Science Foundation

12:00pm Wed. Feb. 27, 2019, ITE325, UMBC

The miniaturization of radio and communication technologies has led to the widespread proliferation of wireless-enabled devices and to an explosion of mobile applications and services. Without question, wireless networking has become an enabling and critical component in practically every business sector. Wireless technologies and terms, such as, WiFi, Bluetooth, and broadband cellular are now embedded in our world and have become a part of society’s regular vocabulary. Given this ever-increasing success, one might be tempted to opine whether any core research challenges remain in the wireless and mobile networking domain.

In this talk, I will present the case that the answer is most certainly “yes” and that the promise of a truly ubiquitous Wireless Internet of Everything, capable of seamlessly interconnecting billions of devices, humans, intelligent systems, information sources, and enabling transformative applications (e.g., remote healthcare monitoring) still faces a plethora of inter-related challenges. These include, for example, exponential growth in mobile traffic, dynamic spectrum allocation, real-time management of network resources, design of intelligent radio technology, energy-efficient protocol designs, and network security/trust/privacy. I will highlight our most recent work on the topic of opportunistic wireless spectrum access, which focused on practical and implementable radio spectrum management frameworks and related spectrum sensing and sharing protocols, using today’s front-end communication technology. I will also discuss my vision for developing a sustainable and nationally recognized wireless networking research program, which includes emerging areas such as networked cyber-physical systems and mobile IoT.

Dr. Dmitri Perkins is currently a Program Director at the U.S. National Science Foundation (NSF), where he leads the Industry-University Cooperative Research Centers (IUCRC) Program for the Directorate of Computer & Information Science & Engineering (CISE). In this role, Dr. Perkins provides oversight of 25 multi-university industry-focused research centers, spanning all areas of CISE research and comprising over 75 U.S. academic institutions, 5 international sites, and 225+ industry partners. Prior to joining the NSF in 2015, Dr. Perkins was the Hardy Edmiston Endowed Professor of Computer Science and Engineering at the University of Louisiana at Lafayette, where he was the founding Director of the Wireless Systems and Performance Engineering Research (WiSPER) Laboratory. His core research interests include wireless and mobile communications, networking, and computing, with an emphasis on cognitive and adaptive protocols, formal design of experiments, performance engineering, dynamic resource and spectrum management, and security challenges. His research work spans multiple networking paradigms, including sensor/actuator networks, wireless broadband networks, multi-hop wireless networks, cognitive radio networks, and large-scale heterogeneous wireless systems. Dr. Perkins has published over 45 peer-reviewed journal articles and conference papers and is also the co-author of the book, Cognitive Radio Networks: From Theory to Practice. He received the NSF CAREER award in 2005 and was the recipient of the Outstanding Professor Award within the College of Sciences at the University of Louisiana in 2012. In 2013 and 2014, he was an ONR visiting research fellow at the Naval Research Laboratory (NRL), conducting research on dynamic spectrum awareness in heterogeneous wireless networks. Dr. Perkins has held leadership roles at the university and national levels. He was elected to serve as the Chair of the University Graduate Council and served a two-year term as Associate Dean of the Ray P. Authement College of Sciences at the University of Louisiana in 2012-2013. He has served on the technical program committee of numerous IEEE and ACM international conferences and served on advisory committees for Computer and Networks Systems (CNS) Division of the NSF. He is currently an associate editor of IEEE Transactions on Mobile Computing. Dr. Perkins received the Ph.D. degree in computer science and engineering from Michigan State University in 2002 and the B.S. degree in computer science from Tuskegee University in 1995.

talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18


Exploiting IoT Vulnerabilities

Dr. Yatish Joshi, Senior Engineer, Cisco Systems

11:45am-1:00pm Monday, 18 February 2019, ITE 325-B

The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance. In most cases, setup simply requires using a web or phone app to configure Wi-Fi credentials. Digital home assistants, security cameras, smart locks, home appliances, smart switches, toys, vacuum cleaners, thermostats, leakage sensors etc are examples of IoT devices that are widely used and deployed in home and enterprise environments.

The threat landscape is constantly evolving and threat actors are always on the prowl for new vulnerabilities they can exploit. With traditional attack methods yielding fewer exploits   due to the increased focus on security testing, frequent patches, increased user awareness, Threat actors have turned their attention on IoT devices and are exploiting inherent vulnerabilities in these devices. The vulnerabilities, always ON nature, and autonomous mode of operation allow attackers to spy on users, spoof data, or leverage them as botnet infrastructure to launch devastating attacks on third parties. Mirai, a well known IoT malware utilized hundreds and thousands of enslaved IoT devices to launch DDoS attacks on Dyn affecting access to Netflix, Twitter, Github and many other websites. With the release of the Mirai source code numerous variants of the malware are infecting IoT devices across the world and using them to carry out attacks.

These attacks are made possible because the devices are manufactured without security in mind!. In this talk I will demonstrate how one can hack a widely available off-the-shelf IP Camera and router by exploiting the vulnerabilities present in these devices to get on the network, steal personal data, spy on a user, disrupt operation etc. We will also look at what can be done to mitigate the dangers posed by IOT devices.

So attend hack & defend!

Dr. Yatish Joshi is a software engineer in the Firepower division at Cisco Systems where he works on developing new features for Cisco’s security offerings. Yatish has a PhD in Computer Engineering from UMBC. Prior to Cisco Yatish worked as a lecturer at UMBC, and was a senior software engineer developing TV software at Samsung Electronics. When not working, he enjoys reading spy thrillers and fantasy novels.

talk: OMI, Invisible Technology that will Revolutionize Supercomputing and AI; 3pm Thr Feb 14, ITE325


Distinguished Lecture Series

OMI: The Invisible Technology that will Revolutionize Supercomputing and AI

Prof. Harm Peter Hofstee
Delft University of Technology
Distinguished Research Staff, IBM Austin Research Laboratory

3:00pm Thursday 14 February, 2019, ITE325, UMBC

In this talk, we present some major trends in compute, memory/storage, and networking, and for each we will discuss how OpenCAPI Memory Interface (OMI) and related interface technologies are set to transform how we build, program, and think about our computer systems. For the first of these trends, it allows us to compensate for the reduced growth in processor performance (per dollar) and performance per Watt. Accelerators are sharing memory and other resources over NVLink or OpenCAPI with conventional IBM POWER cores and are driving performance in the world’s largest supercomputers and IBM’s systems are targeting AI and other workloads. The second addresses the reduced improvement in memory cost and capacity. OMI allows us to use technologies other than DRAM as memory, and because many of these technologies are nonvolatile, the line between memory and storage is becoming blurred. The third, OpenCAPI-based networking leverages the rapid improvements in cost per Gb/s and allows us to contemplate systems that extend memory beyond the node using commodity infrastructure.

Harm Peter Hofstee is a Dutch physicist and computer scientist who currently is a distinguished research staff member at the IBM Austin Research Laboratory, USA, and a part-time Professor in Big Data Systems at Delft University of Technology, Netherlands. Hofstee is best known for his contributions to Heterogeneous computing as the chief architect of the Synergistic Processor Elements in the Cell Broadband Engine processor used in the Sony PlayStation 3, and the first supercomputer to reach sustained Petaflop operation. His early research work on coherently attached reconfigurable acceleration on POWER7 paved the way for the new coherent attach processor interface on POWER8. Hofstee is an IBM Master Inventor with more than 100 issued patents and a member of the IBM Academy of Technology. Hofstee was born in Groningen and obtained his master’s degree in theoretical physics of the University of Groningen in 1988. He continued to study at the California Institute of Technology where he wrote a master’s thesis Constructing Some Distributed Programs in 1991 and obtained a Ph.D. with a thesis titled Synchronizing Processes in 1995. He joined Caltech as a lecturer for two years and moved to IBM in the Austin, Texas, Research Laboratory, where he had staff member, senior technical staff member and distinguished engineer positions.

Maryland Data Science Conference, Fri. 1/25, UMBC (new date)


MD Data Science Conference
Friday, 25 January, PAH Concert Hall, UMBC

Miner & Kasch, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day Data Science Conference at UMBC on Friday, January 25 in the Linehan Concert Hall of the UMBC Performing Arts & Humanities Building. A limited number of free tickets are available for current UMBC students. To attend, you need to register here.

The event was originally scheduled for January 14, but had to be rescheduled due to inclement weather. If you had registered and obtained a ticket earlier, you will need to re-register.

The event brings together local companies and professionals to share what new and exciting things they are doing with their data. It will be attended by business managers, startup founders, software engineers, data scientists, students, and other curious people that want to learn more about the cutting edge of data science, machine learning, and AI. See the conference website for topics and speakers.

Countering Russian disinformation the Baltic nations’ way


 

Countering Russian disinformation the Baltic nations’ way

Terry Thompson, University of Maryland, Baltimore County

As the new Congress begins, it will soon discuss the comprehensive reports to the U.S. Senate on the disinformation campaign of half-truths, outright fabrications and misleading posts made by agents of the Russian government on social media in the run-up to the 2016 presidential election.

After years of anemic responses to Russian influence efforts, official U.S. government policy now includes taking action to combat disinformation campaigns sponsored by Russia or other countries. In May 2018, the Senate Intelligence Committee endorsed the concept of treating attacks on the nation’s election infrastructure as hostile acts to which the U.S. “will respond accordingly.” In June, the Pentagon unleashed U.S. Cyber Command to respond to cyberattacks more aggressively, and the National Cyber Strategy published in September 2018 clarified that “all instruments of national power are available to prevent, respond to, and deter malicious cyber activity against the United States.”

There are already indications that Cyber Command conducted operations against Russian disinformation on social media, including warning specific Russians not to interfere with the 2018 elections. However, low-level cyberwarfare is not necessarily the best way. European countries, especially the Baltic states of Estonia, Latvia and Lithuania, have confronted Russian disinformation campaigns for decades. Their experience may offer useful lessons as the U.S. joins the battle.

The Baltic Sea region of northern Europe. Estonia, Latvia and Lithuania are in light green in the center, west of Russia in blue. Stefan Ertmann/ Wikimedia Commons, CC BY-SA

The Baltic experience

Beginning in 1940 and continuing until they declared independence in the early 1990s, the Baltic countries were subjected to systematic Russian gaslighting designed to make people doubt their national history, culture and economic development.

The Soviets rewrote history books to falsely emphasize Russian protection of the Baltic people from invading hordes in the Middle Ages, and to convey the impression that the cultural evolution of the three countries was enabled by their allegiance and close ties to Russia. Even their national anthems were rewritten to pay homage to Soviet influence.

Soviet leaders devalued Baltic currencies and manipulated economic data to falsely suggest that Soviet occupation was boosting the Baltic economies. Further, Soviet authorities settled ethnic Russians in the Baltic countries, and made Russian the primary language used in schools.

Since the fall of the Soviet Union and the independence of the Baltic countries, the Russian Federation has continued to deliver disinformation to the region, making extensive use of Russian-language social media. Some themes characterize the Baltic people as ungrateful for Soviet investment and aid after World War II. Another common message criticizes Baltic historians for “falsification of history” when really they are describing the real nature of the Soviet occupation.

A massive Russian attack

After independence, and as the internet grew, Estonia led the way in applying technology to accelerate economic development. The country created systems for a wide range of government and commercial services, including voting, banking and filing tax returns electronically. Today, Estonia’s innovative e-residency system is being adopted in many other countries.

These advances made the Baltics a prime target for cyberattacks. In the spring of 2007, the Russians struck. When Estonia moved a monument memorializing Soviet soldiers from downtown Tallinn, the country’s capital, to a military cemetery a couple of miles away, it provoked the ire of ethnic Russians living in Estonia as well as the Russian government.

The relocation of the Bronze Soldier of Tallinn sparked a Russian cyberattack on Estonia in 2007.
Keith Ruffles/Wikimedia Commons, CC BY

For three weeks, Estonian government, financial and media computer systems were bombarded with enormous amounts of internet traffic in a “distributed denial of service” attack. In these situations, an attacker sends overwhelming amounts of data to the targeted internet servers, clogging them up with traffic and either slowing them down or knocking them offline entirely. Despite concerns about the first “cyber war,” however, these attacks resulted in little damage. Although Estonia was cut off from the global internet temporarily, the country’s economy suffered no lasting harm.

These attacks could have severely damaged the country’s financial system or power grid. But Estonia was prepared. The country’s history with Russian disinformation had led Estonia to expect Russian attacks on computer and information systems. In anticipation, the government spearheaded partnerships with banks, internet service providers and other organizations to coordinate responses to cyberattacks. In 2006, Estonia was one of the first countries to create a Computer Emergency Response Team to manage security incidents.

The Baltic response

After the 2007 attack, the Baltic countries upped their game even more. For example, Estonia created the Cyber Defense League, an army of volunteer specialists in information technology. These experts focus on sharing threat information, preparing society for responding to cyber incidents and participating in international cyber defense activities.

Internationally, Estonia gained approval in 2008 to establish NATO’s Cooperative Cyber Defense Center of Excellence in Tallinn. Its comprehensive research into global cyber activities helps identify best practices in cyber defense and training for NATO members.

In 2014, Riga, the capital of neighboring Latvia, became home to another NATO organization combating Russian influence, the Strategic Communications Center of Excellence. It publishes reports on Russian disinformation activities, such as the May 2018 study of the “Virtual Russian World in the Baltics.” That report analyzes Russian social media activities targeting Baltic nations with a “toxic mix of disinformation and propaganda.” It also provides insight into identifying and detecting Russian disinformation campaigns.

Baltic elves” – volunteers who monitor the internet for Russian disinformation – became active in 2015 after the Maidan Square events in the Ukraine. And the Baltic nations have fined or suspended media channels that display bias.

The Baltic countries also rely on a European Union agency formed in 2015 to combat Russian disinformation campaigns directed against the EU. The agency identifies disinformation efforts and publicizes accurate information that the Russians are seeking to undermine. A new effort will issue rapid alerts to the public when potential disinformation is directed against the 2019 European Parliament elections.

Will the ‘Baltic model’ work in the US?

Because of their political acknowledgment of threats and actions taken by their governments to fight disinformation, a 2018 study rated Estonia, Latvia and Lithuania the three European Union members best at responding to Russian disinformation.

A look inside Russia’s propaganda machine.

Some former U.S. officials have suggested adopting similar practices, including publicizing disinformation efforts and evidence tying them to Russia. The Senate Intelligence Committee has called for that too, as has the Atlantic Council, an independent think tank that focuses on international affairs.

The U.S. could also mobilize volunteers to boost citizens’ and businesses’ cyberdefenses and teach people to identify and combat disinformation.

Disinformation is a key part of Russia’s overall effort to undermine Western governments. As a result, the battle is ever-changing, with Russians constantly trying new angles of attack and target countries like the Baltic nations identifying and thwarting those efforts. The most effective responses will involve coordination between governments, commercial technology companies and the news industry and social media platforms to identify and address disinformation.

A similar approach may work in the U.S., though it would require far more collaboration than has existed so far. But backed by the new government motivation to strike back when provoked, the methods used in the Baltic states and across Europe could provide a powerful new deterrent against Russian influence in the West.The ConversationTerry Thompson, Adjunct Instructor in Cybersecurity, University of Maryland, Baltimore County

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tim Finin named ACM fellow for contributions to knowledge sharing


Prof. Tim Finin named ACM Fellow for contributions to knowledge sharing

UMBC’s Tim Finin, professor of computer science and electrical engineering (CSEE), has been named a fellow of the Association for Computing Machinery (ACM), a distinctive honor granted to less than one percent of all ACM members. ACM fellows are selected based on their work to advance computing over the course of a career, in areas such as mobile networks, computer architecture, robotics, and security.  Finin was cited for his  “contributions to the theory and practice of knowledge sharing in distributed systems and the World Wide Web.”

“It’s a great honor to be selected as an ACM fellow, since it is based on the recommendations of one’s peers and recognizes contributions to the field of computing,” says Finin. “I am especially honored since ACM fellows include so many pioneers of the field whose work and contributions I have studied and used over the past 40 years.”

“Dr. Finin has been a leader in our department ever since he came in as the chair in 1991,” says Anupam Joshi, professor and chair of CSEE. “He is one of our most accomplished researchers, and in addition to this fellowship, has been recognized both internally (as a Presidential Research Professor) and externally with numerous awards.”

Joshi continues, “Tim is a great teacher, and he has mentored a number of our mid-career and senior faculty, including me!”

Throughout his career, Finin has been involved with various aspects of ACM. As a graduate student at the University of Illinois Urbana-Champaign, Finin became a member of ACM’s special interest group on artificial intelligence (SIGART), which is one of his primary areas of focus. In the years since then, he has collaborated with numerous many UMBC faculty, students, and alumni, in addition to colleagues in industry and at other institutions, to move this work forward.

In the 1990s, and with support from the Defense Advanced Research Projects Agency (DARPA), Finin worked with UMBC faculty to develop new software standards to support the then-new concept of intelligent multiagent systems. The software, called the Knowledge Query and Manipulation Language, was used to develop intelligent applications and as the basis for faculty research and many Ph.D. dissertations.

The ACM’s Conference for Information and Knowledge Management awarded Finin and his collaborators with the 2018 Test of Time Award for a 1994 paper about this research that has continued to have an important impact on the research community.

Finin and a group of collaborators also worked on projects related building the semantic web. “The idea was to enhance the new web technologies with a way to enclose structured data that machines could use into ordinary web pages,” he explained. He adds that this allowed computers to understand the information on the web page without having to understand natural language.

Starting in the 2000s, Finin and his collaborators focused much of their work on blogs and then social media, including Facebook and Twitter. They explored how to analyze the data collected on these sites, and also how to protect and improve security and privacy features.

“I’ve only been able to do this because of the environment at UMBC,” Finin says, reflecting on the encouragement he has received to pursue new collaborations and areas of research.

“Based on my experience,” he shares, “I hope to mentor more faculty in the middle of their careers,” to help them access opportunities through organizations like ACM.

Finin currently oversees and mentors UMBC’s student chapter of ACM, which includes both undergraduate and graduate students. The student organization sponsors weekly talks and other events for people in the UMBC community who are interested in computing and related topics.

Finin joins Roy Rada, professor emeritus of information systems, who is also an ACM fellow.

Adapted from a UMBC News article written by Megan Hanks

 

Maryland Data Science Conference, 1/14 CANCELED DUE TO WEATHER


 

MD Data Science Conference
Monday, 14 January, UMBC
Canceled due to Weather

Miner & Kasch has decided to cancel the conference tomorrow due to the snow storm and reschedule it.

“While around UMBC the snow seems to be letting up, we have several speakers and attendees from other areas that have raised concerns about being able to attend. We want to be able to have the event at a time when we can have everyone that wanted to participate be able to attend. We will start working on a backup date immediately and send a notice to all of you as soon as we hear more. For now, we will refund all the tickets and have you re-register for the new date once we have the new details.”

Miner & Kasch, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day Data Science Conference at UMBC on Monday, January 14 in the Performing Arts & Humanities Building. Tickets are free for current UMBC students.

The event brings together local companies and professionals to share what new and exciting things they are doing with their data. It will be attended by business managers, startup founders, software engineers, data scientists, students, and other curious people that want to learn more about the cutting edge of data science, machine learning, and AI.

See the conference website for topics and speakers and to register.

UMBC Hour of Code events, 10am-1pm Dec 5 & 6, ENGR Atrium


 

UMBC Hour of Code events

 

This week on Wednesday and Thursday from 10:00am – 1:00pm, the UMBC Computer Science Education Club will host Hour of Code events in the Engineering Building Atrium. Hour of Code is an annual campaign that is part of Computer Science Education Week with the goal of expanding access to computer science in schools and increasing the participation of women and underrepresented minorities.

On Wednesday, December 5th, the focus will be on on computer science outreach within the UMBC community. There will be an Arduino workshop from IEEE from 11:30am – 12:45pm (bring your laptop if interested), interactive games teaching introductory programming concepts, and Makey Makeys.

On Thursday, December 6th,  students from Lakeland Elementary School will visit the UMBC campus and learn about programming. The CS Ed club are still accepting volunteers to help students during the activity, and/or attend lunch with the students. You can sign-up here. Computer Science Education Club would appreciate any time you can dedicate to this event.

Email  with any questions. For more information about Hour of Code, visit https://code.org/about.

talk: The Web PKI in Theory and Malpractice, Prof. Bruce Maggs, 11am Fri 12/7, ITE325


 

Distinguished Departmental Seminar

The Web PKI in Theory and Malpractice

Dr. Bruce Maggs, Duke University

11:00am Friday, 7 December 2018, ITE325b

 

The Public Key Infrastructure (PKI) for the web was designed to help thwart “phishing” attacks by providing a mechanism for browsers to authenticate web sites, and also to help prevent the disclosure of confidential information by enabling encrypted communications. For users to reap these benefits, however, the parties that implement and operate the PKI, including certificate authorities, web-site operators, and browser vendors, must each perform their roles properly.

This talk focuses on one aspect of the PKI: certificate revocation. The security of a web site hinges on the ability of the site operator to keeps its private keys private. While most operators guard their keys carefully, on occasion software vulnerabilities such as the notorious Heartbleed Bug have put millions of keys at risk. If a web-site operator fears that its private key has been compromised, it should ask its certificate authority to revoke the corresponding certificate. Browsers, however, often do not fully check whether the certificates they receive have been revoked, and mobile browsers never check. There are a variety of reasons for not checking, but the most important are the amount of bandwidth required to download certificate revocation lists in advance, the latency of checking certificates on the fly, and the slow progress of upgrading every web server to support the newer certificate status stapling approach.

This talk presents a new and much more efficient system, CRLite, for pushing the revocation status of every certificate to every browser. CRLite leverages a recent development: although lists of revoked certificates were previously available, Google’s Certificate Transparency project now also provides a log of all unrevoked certificates as well. With both lists in hand, a compact data structure called a filter cascade can be used to represent the status of every certificate with no false positives and no false negatives. CRLite requires a browser to download a 1.2MB filter cascade initially, and then a 40KB update (on average) every day. Our results demonstrate that complete revocation checking is within reach for all clients.

Bruce Maggs received the S.B., S.M., and Ph.D. degrees in computer science from the Massachusetts Institute of Technology in 1985, 1986, and 1989, respectively. His advisor was Charles Leiserson. After spending one year as a Postdoctoral Associate at MIT, he worked as a Research Scientist at NEC Research Institute in Princeton from 1990 to 1993. In 1994, he moved to Carnegie Mellon, where he stayed until joining Duke University in 2009. While on a two-year leave-of-absence from Carnegie Mellon, Maggs helped to launch Akamai Technologies, serving as its first Vice President for Research and Development. He retains a part-time role at Akamai as Vice President for Research. In 2017 he won the Best Dataset Award at the Passive and Active Measurement Conference, The Best Paper Award at CoNEXT, a Distinguished Paper Award at USENIX Security, and the 2017 IEEE Cybersecurity Innovation Award for work that appeared at IEEE Security and Privacy. In 2018 he was part of a large team that received the inaugural SIGCOMM Networking Systems Award for the Akamai CDN.

Supported by UMBC’s Eminent Scholar Mentoring program.

Job Positions: Computer Science Lecturer, Professor of the Practice and Visiting Assistant Professor


CSEE faculty and students

Computer Science Lecturer, Professor of the Practice and Visiting Assistant Professor

Department of Computer Science and Electrical Engineering
University of Maryland, Baltimore County (UMBC)

The Department of Computer Science and Electrical Engineering (CSEE) at the University of Maryland Baltimore County (UMBC) invites applications for multiple non-tenure track positions at the ranks of Lecturer, Professor of the Practice and Visiting Assistant Professor. The positions begin Spring or Fall 2019 (January or August). Some of these positions will have teaching and/or administrative responsibilities in the computer science program to be offered at The Universities at Shady Grove, in Montgomery County, Maryland.

For the position of Lecturer, the preferred qualification is a master’s degree in computer science or a closely related discipline. Applicants for the Professor of the Practice or Visiting Assistant Professor positions should have completed or be about to complete a doctoral degree in computer science or closely related discipline. Ideal candidates will have evidence of strong organizational skills. Experience in academia, industry and government will be considered in the evaluation of the candidate. Candidates who have had a non-academic career with a demonstrated commitment to teaching are encouraged to apply.

The Lecturer and Professor of the Practice (PoP) positions are renewable. Lecturers and PoPs teach a wide range of courses, primarily at the undergraduate level. They advise students, mentor teaching assistants, and help shape departmental practices and policies. Lecturers and PoPs are expected to continue their professional growth. Lecturers have the opportunity to be promoted through the ranks of Senior Lecturer and Principal Lecturer. PoPs are expected to provide leadership in the administration of the department.

The position of Visiting Assistant Professor is a short-term appointment that is appropriate for new and recent PhDs who would like to bolster their teaching and research profiles before applying to a permanent position.

The CSEE department is large and growing, with a diverse community of approximately 2,000 undergraduate majors in computer science and computer engineering.  Professors of the Practice, along with Lecturers and a cadre of tenure-track faculty, are the driving force behind the department’s broad effort to ensure a quality education for our undergraduates: working to improve computing education, curriculum, diversity, and student support. CSEE faculty collaborate with the Center for Women in Technology to increase the diversity of those who create technology, with programs designed for women in computing and engineering, transfer students from underrepresented groups, and diverse students interested in cybersecurity.  In addition to our undergraduate programs, the department has graduate programs in computer science, computer engineering, electrical engineering, cybersecurity and data science. Our faculty enjoy collaboration within the department, across departments, and with partners outside the university.

UMBC is a dynamic public research university integrating teaching, research and service. As an Honors University, the campus offers academically talented students a strong undergraduate liberal arts foundation that prepares them for graduate and professional study, entry into the workforce, and community service and leadership. We are dedicated to cultural and ethnic diversity, social responsibility, and lifelong learning. The 2018 US News and World Report Best Colleges report placed UMBC seventh in the Most Innovative National Universities category and 13th in Best Undergraduate Teaching, National Universities category.  The Chronicle of Higher Education named UMBC as a Great College to Work For, a recognition given to only 86 universities. Our strategic location in the Baltimore-Washington corridor puts us close to many important federal laboratories and agencies and high-tech companies, facilitating interactions, and collaboration.

UMBC’s campus is located on 500 acres just off I-95 between Baltimore and Washington DC, and less than 10 minutes from the BWI airport and Amtrak station. The campus includes the bwtech@UMBC research and technology park, which has special programs for startups focused on cybersecurity, clean energy, life sciences, and training. We are surrounded by one of the greatest concentrations of commercial, cultural and scientific activity in the nation. Located at the head of the Chesapeake Bay, Baltimore has all the advantages of modern, urban living, including professional sports, major art galleries, theaters and a symphony orchestra. The city’s famous Inner Harbor area is an exciting center for entertainment and commerce. The nation’s capital, Washington, DC, is a great tourist attraction with its historical monuments and museums. Just ten minutes from downtown Baltimore and 30 minutes from the D.C. Beltway, UMBC offers easy access to the region’s resources by car or public transportation. UMBC is one of nine institutions represented at The Universities at Shady Grove, a consortium of universities within the University System of Maryland, located in Rockville, MD.

Applications are accepted on Interfolio http://apply.interfolio.com/57568. The initial application consists of the candidate’s curriculum vitae or resume and a brief statement describing the candidate’s teaching experience. Promising candidates will be asked to supply three letters of recommendation and a statement describing how the candidate will contribute to UMBC’s commitment to inclusive excellence. For best consideration, submit all application materials by January 18, 2019.  Applications will be accepted until the positions are filled.  Questions regarding the positions or the application process may be directed to the chair of the search committee at .

UMBC is an Equal Opportunity/Affirmative Action Employer and is a recent recipient of a National Science Foundation ADVANCE award to promote hiring and advancement of women in science and engineering. We welcome applications from women, minorities, veterans and individuals with disabilities.

1 2 3 130