Meetings and Events
Schools and Outreach
2018 meeting of the Indiana Section of the
Mathematical Association of America
October 13, 2018
Poster for this event:
schedule of meeting:
(As of 8 August)
List of Abstracts: (As of 13 August)
for Saturday Lunch are available during on-line
registration, which is open through TBA. (See the Announcement
page for information on by-mail pre-registration.)
Subject to our cancellation policy, some lunch
tickets may become available at the registration
desk Saturday morning.
Lunch Menu: TBA
for Papers: Coming soon.
(via EventBrite.com): Coming soon. Early Registration
due date is TBA. (Late registration also
available on-site at the check-in table.)
Dr. Emilie Purvine
Pacific Northwest National Laboratory
"How can mathematicians help advance cyber security?"
Abstract: The world is getting more interconnected every day. New devices are providing near-constant connectivity for all aspects of our lives. There are devices that we put in our homes like smart thermostats, and ones that we wear on our bodies like fitness trackers or smart watches. There are even wireless enabled medical devices that can be implanted inside our bodies. Our cars and phones also keep us on the grid when we're on the go. It is increasingly difficult to become disconnected in today's society. Together this means that there are even more opportunities to be hacked, and with much higher consequences. Cyber security experts, those with backgrounds in areas like computer science and ethical hacking, are constantly working to monitor and secure these systems and networks. There are vast databases of known attack signatures that can be checked against current behaviors to identify potentially malicious activity. But adversaries are constantly changing their tactics, techniques, and procedures to evade these signature-based detection strategies. This is where mathematicians are helping to advance the field. Cyber systems, when abstracted, look a lot like a mathematical object called a graph. Studying the statistical and topological properties of this graph can help us to quantify when large unexpected changes are being made to the system. Additionally, by understanding which graph properties contribute to weaknesses in current systems we can design stronger ones for the future. In this talk Dr. Purvine will survey the relevant cyber landscape, introduce mathematical models of cyber networks using discrete mathematics, graph theory, and topology, and provide some answers the question asked in the title: "how can mathematicians help advance cyber security?"
"Applications of topology for information fusion"
Emilie Purvine is a mathematician and data scientist at Pacific Northwest National Laboratory
(PNNL) in Seattle, WA, where she has worked since 2011. Since 2012 she has been leading research and development projects to investigate the use of tools from discrete mathematics and topology to monitor large cyber networks. She continues to lead a team of researchers in the development of novel methods for network flow analysis, which are being implemented within real operational systems. In addition to her work on cyber security Emilie is focused broadly on the use of discrete mathematics and topology to understand real world systems. She has an ongoing focus on the power grid, information systems, sensor data integration, biological networks, and communication networks. Prior to her current position at PNNL she was a post-doctoral research associate at PNNL from 2011-2012. She earned a Ph.D. in pure mathematics from Rutgers University in 2011 and a B.S. also in mathematics from University of Wisconsin - Madison in 2006.
Dr. Jacqueline Jensen-Vallin
Lamar University and Editor of MAA Focus
Let’s Get Knotty
Abstract: My early interest in numbers and patterns lead me down a (nonlinear) path to mathematics, which has led me to the twisty world of knots. Mathematically, knots are non-intersecting closed curves in space. We will use sequences and patterns to explore this world and play with a classic question in knot theory - given a knot diagram, how do I identify the knot? There will be plenty of examples, conjectures, and fun!
Indiana Project NExT
Email the Public Information
MAA online Disclaimer