Cloud Forensics Logging

Slides:



Advertisements
Similar presentations
1 Proposed Curriculum Changes in the Civil Engineering Program Curt B. Haselton, PhD, PE Chair and Associate Professor Department of Civil Engineering.
Advertisements

Transitioning to Semesters CSE MS Program Prof. Gagan Agrawal Grad Studies Chair.
Laura Miller Clearville, PA Everett High School Graduating June 1999.
My BITE Fellowship Edward Challis. This is a picture of me:
Novica Nosović Faculty of Electrical Engineering University of Sarajevo, Bosnia and Herzegovina Harmonizing CS curricula at the University of Sarajevo.
Department of Mechanical Engineering University of Delaware Michael H Santare, PhD Mechanical Engineering.
Engineering Programs at GMU (Lecture #4) ENGR 107 – Intro to Engineering The slides included herein were taken from the materials accompanying Engineering.
Brown’s Digital Repository An overview of services.
SCS Undergraduate Program Fall Fall 2007 BS in Computer Science  360 units  12 CS courses  4 Math courses  1 Probabilities course  4 Science.
Graduate Orientation FACULTY GRADUATE PROGRAMS ADVISING.
ECE Graduate Program Guidelines Brian Johnson Professor and Chair Dept. of Electrical and Computer Engineering.
Geoscience Careers in Academia Dr. Kate Bulinski Associate Professor of Geosciences Bellarmine University School of Environmental Studies Louisville, Kentucky.
CSE PhD Program Prof. Gagan Agrawal Grad Studies Chair.
My Retirement Events By: Abdullah Aljohani. Before Retirement.
Computer Science Graduate Studies in U of Memphis.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Tempus CD-JEP Meeting, Belgrade, SCG, Apr , Curriculum Development: IT Curriculum for graduate studies at Faculty of Mechanical Engineering,
Presenting… Kelly Poole’s Academic Goals. Short Term Goals To finish college with a 3.5 GPA To finish college with a 3.5 GPA To graduate from either the.
computer
Speaker: Zhiding Yu Department of Electrical and Computer Engineering Carnegie Mellon University 1 Valse 2015 如何做研究之读博经验纵横谈.
Career Search Project BY: Jason He Jiexuan. Computer Programmer Average salary for $80,280 per year. Starting salary for about $40,000 per year.
School of Engineering. Y.U. School of Engineering Founded in Departments Computer Engineering (2001) Industrial Engineering (2001) Electronics.
CSEE Student Research Conference Prof. R. Scott Cost IAB Presentation May 10, 2002.
Discussion Topic 1 On your pre-assessments, many of you indicated that you may be teaching in another state- after earning Texas certification at UD. A.
School of Natural Sciences & Mathematics A Faculty Member’s Perspective.
2 First academic year students 600 first-year students in the last academic year 200 graduated in the last year 1600 graduated since 1996.
Economics Mrs. Fikes. What is your version of the “American Dream”?
Option III Software Engineering Program Vijay K. Garg.
Team Doritos El Loco Taco Austin Almond Ryan Ramnarine Jesse Everett.
Stanford University – VW AutoUni: ME 310 Collaboration Philipp L. Skogstad for Larry Leifer, Ph.D.
C. E. Brodley Building a Research Career Carla E. Brodley Department of Computer Science Tufts University April 2005.
Koji OKAMURA Cybersecurity Center, Kyushu University Advanced Cybersecurity Education Course Program using Cyber Range.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
From: Bethlehem, PA.  I graduated from Freedom High School in Bethlehem, PA  I am a pre-engineering major at The Pennsylvania State University.
Graduate Recruiting CISE Department Spring 1999 Douglas Dankel II
ECE 1100: Introduction to Electrical and Computer Engineering
Bologna FESB (FESB) UNIVERSITY OF SPLIT
My PhD Journey Manal Atesh.
Electrical and Computer Engineering Degree Plans
Funkbois JB Morris, Michael Ho and Spencer Huddleston
  Suzy Wampler Student Affairs Officer University of Kentucky College of Engineering Department of Civil Engineering 161 Oliver H. Raymond Building Lexington,
ECE 582: Electrical and Computer Engineering Design I
Quantum Computing: an introduction
VLSI Group : From Circuits to Systems
Institute for Cyber Security: Research Vision
GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES ORIENTATION FALL 2017
Cyber Education & Research
ВОМР Подмярка 19.2 Възможности за финансиране
Споразумение за партньорство
Research and Graduate Education in the College of Education
Introduction to Information Assurance
The Graduate College Travel Summary Presentation
Student Success Vision
Network Traffic and Cybersecurity
CSE Dept. Semester Result Analysis
Chapter 1- 2 Mastering Engineering Intro:
Comprehensive Analysis of the Impact of Change of Major in CECS on Graduation Rates Maryam Tabibzadeh, PhD Department of Manufacturing Systems Engineering.
My Plan for Success Student Name.
World-Leading Research with Real-World Impact!
Council of Graduate Students
Կարգավորում Insertion Sort, Merge Sort
Potential Influence of Prior Experience in an Undergraduate-Graduate Level HPC Course Chris Fietkiewicz, Ph.D. Department of Electrical Engineering and.
Media Coordinator Love Memorial Elementary School Lincolnton NC
Why Study MCA. What is MCA? Master of Computer Applications (MCA) is a three-year (six semesters) professional Master's Degree Course in India. The course.
Welcome To Technology Education
Welcome to Manufacturing Processes Online Class!
What is 15 to Finish? STUDENT SUCCESS
Botnet of Things: Cybersecurity
Information Technology Offerings: Presented at Security.ac.nz
Economics Ms. Gunter.
Presentation transcript:

Cloud Forensics Logging Kyle Everett

About me Graduated with my Computer Engineering degree last year at UTSA Currently in my second semester in the Master's Program  Transitioning into a PhD student in Fall 2019 Department of ECE (Electrical and Computer Engineering) 

Current Research 

Current Research Recreation of Deep log paper Collecting logging data Setting up different attack scenarios Creating a more comprehensive test dataset  Improving Deep log's learning algorithm  Recreation of Deep Log Paper (recreating the results from this paper to enhance ) Setting up different attack scenarios (Malware injection, Man in the Middle, authentication attacks, DDoS, Movement through a system)

Status of Research Publish this fall 2019 Plan to finish this summer