{"587113":{"#nid":"587113","#data":{"type":"event","title":"Demo Day Finale","body":[{"value":"\u003Ch3\u003EIndustry wants new solutions and Georgia Tech has them\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EInformation security students at Georgia Tech compete before venture capitalists and industry leaders at the Institute for Information Security \u0026amp; Privacy\u0026#39;s \u0026quot;\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/demo-day\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EDemo Day Finale\u003C\/strong\u003E\u003C\/a\u003E.\u0026quot;\u0026nbsp; Five student teams will present TED-style talks about their research before an elite panel of business leaders, who then advise students about future considerations for commercialization. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize.\u003C\/p\u003E\r\n\r\n\u003Ch4\u003E\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/s17-demo-day-finale\u0022\u003ERSVP to Attend\u003C\/a\u003E\u003C\/h4\u003E\r\n\r\n\u003Cp\u003EInitial cybersecurity research concepts were presented at the Fall Demo Day, held Sept. 28, 2016 at the Georgia Tech Cyber Security Summit and were selected by audience vote to continue to the Finale.\u003C\/p\u003E\r\n\r\n\u003Ch4\u003E\u0026nbsp;\u003C\/h4\u003E\r\n\r\n\u003Ch4\u003EFinalists are\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ERob Callan\u003C\/strong\u003E and \u003Cstrong\u003EFarnaz Behrang\u003C\/strong\u003E, School of Electrical \u0026amp; Computer Engineering\u003Cbr \/\u003E\r\n\u0026quot;Malware Detection Using Unintentional Electromagnetic Emanations\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdvisor(s): Alenka Zajic and Alessandro Orso\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EDavid Formby\u003C\/strong\u003E, School of Electrical \u0026amp; Computer Engineering\u003Cbr \/\u003E\r\n\u0026quot;Under Control: Techniques for Securing Industrial Control Systems\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdvisor: Raheem Beyah\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EMarie Le Pichon\u003C\/strong\u003E, School of Computer Science\u003Cbr \/\u003E\r\n\u0026quot;Requirements Identification for IRB Protocols: The Challenges of Ubiquitous Computing and the Emergent Properties of Big Data\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdvisor: Annie Anton\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAlireza Nazari\u003C\/strong\u003E and \u003Cstrong\u003ENader Sehatbakhsh\u003C\/strong\u003E, School of Computer Science\u003Cbr \/\u003E\r\n\u0026quot;Spectral Profiling \u0026amp; Monitoring: An Observer-effect-free Method for Profiling and Dynamic Malware Detection\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdvisors: Milos Prvulovic and Alenka Zajic\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETianxin Tang\u003C\/strong\u003E, School of Computer Science\u003Cbr \/\u003E\r\n\u0026quot;Keyless Fuzzy Search for Data-based Access Control\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAdvisor: Alexandra Boldyreva\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EStudents compete before venture capitalists and industry leaders, where early stage cybersecurity research projects can win cash prizes and valuable tech-transfer advice.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Five student finalist teams present cybersecurity concepts for possible commercialization at the Spring \u002717 Demo Day Finale."}],"uid":"27490","created_gmt":"2017-02-08 02:53:48","changed_gmt":"2017-04-13 21:12:56","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-04-13T17:00:00-04:00","event_time_end":"2017-04-13T19:00:00-04:00","event_time_end_last":"2017-04-13T19:00:00-04:00","gmt_time_start":"2017-04-13 21:00:00","gmt_time_end":"2017-04-13 23:00:00","gmt_time_end_last":"2017-04-13 23:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"588426":{"id":"588426","type":"image","title":"Spring \u002717 IISP Demo Day Finale","body":null,"created":"1488923516","gmt_created":"2017-03-07 21:51:56","changed":"1488923561","gmt_changed":"2017-03-07 21:52:41","alt":"","file":{"fid":"224235","name":"Dollar_bill_light_bulb_04-01.png","image_path":"\/sites\/default\/files\/images\/Dollar_bill_light_bulb_04-01.png","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Dollar_bill_light_bulb_04-01.png","mime":"image\/png","size":1013233,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Dollar_bill_light_bulb_04-01.png?itok=sQyYFcgd"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["588426","451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"151041","name":"College of Computing Alumni"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"168287","name":"cybsersecurity"},{"id":"3652","name":"Demo Day"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:Panetta, Lindsey \u0026lt;Lindsey.Panetta@gtri.gatech.edu\u0026gt;?subject=inquiry%20about%20S\u002717%20Demo%20Day%20Finale\u0022\u003ELindsey.Panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}