Mike O'Leary
Towson University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mike O'Leary.
technical symposium on computer science education | 2006
Mike O'Leary
We describe a laboratory based capstone course in computer security for undergraduates. The course is based on a sequence of hands-on laboratory exercises for four teams of students. It emphasizes defensive tools and techniques at the expense of attacks; it also takes a network centered view where student teams set up and configure entire networks. In this paper, we describe the course, how it fits into the curriculum, and the laboratory facilities we have developed. We then present the details of some of our lab exercises, and discuss the lessons that we have learned.
technical symposium on computer science education | 2003
Shiva Azadegan; M. Lavine; Mike O'Leary; Alexander L. Wijesinha; Marius Zimand
To better prepare our graduates to face the challenges in computer and information security, in Fall 2002, Towson University launched an undergraduate track in computer security for the computer science majors. This paper describes the motivation behind this track and discusses its structure and requirements.
Mathematische Annalen | 2001
Judith R. Miller; Mike O'Leary; Maria E. Schonbek
Abstract. We show that there are no singular pseudo-self-similar solutions of the Navier-Stokes system with finite energy.
Communications in Partial Differential Equations | 2003
Mike O'Leary
Abstract We show that a weak solution of the Navier-Stokes system is locally bounded if there is some ε>0so that either or
international conference and exhibition on computing for geospatial research application | 2010
Mike O'Leary
The geographic profiling problem is to create an operationally useful estimate of the location of the home base of a serial criminal from the known locations of the offense sites. We have developed and released new software based on Bayesian methods that attempts to solve this problem. In this paper, we discuss some of the geographic and computational challenges in implementing this new method.
Security education and critical infrastructures | 2003
Shiva Azadegan; M. Lavine; Mike O'Leary; Alexander L. Wijesinha; Marius Zimand
To better prepare our graduates to face the challenges in computer and information security, in Fall 2002, the authors launched an undergraduate track in computer security for the computer science majors at Towson University. This paper describes the motivation for this track and discusses its structure and requirements.
software engineering, artificial intelligence, networking and parallel/distributed computing | 2006
Mike O'Leary; Shiva Azadegan; Jay Lakhani
Honeynets, which are designed to be digital decoys, have proven to be valuable research and teaching tool in the area of computer security and information assurance. In this paper, we discuss the development and implementation of a honeynet laboratory at Towson University. We present some background information, detail the development and implementation of the laboratory and share our challenges, experiences and learning
intelligence and security informatics | 2016
Shiva Azadegan; Mike O'Leary
In fall 2002, Towson University launched an undergraduate computer security track within its computer science program. This program was the first undergraduate program in the state of Maryland with a strong and technical computer security focus and among the first in the country addressing the shortage of skilled cybersecurity professionals. Since its inception, this program has gone through several assessment cycles and curricular revisions to stay current with the demands of ever-evolving cybersecurity discipline. These revisions allowed the program to meet the rigorous requirements of the NSA Cyber Operations program, and in 2014, Towson University was designated as one of fourteen National Centers of Academic Excellence in Cyber Operations. This paper describes the current curriculum for the track and discusses lessons learned and challenges faced during the past fourteen years. We believe our undergraduate cyber operations program, developed, evolved and tested at a large public institution with students with widely-differing academic and socio-economic backgrounds provides a valuable model for adopting and adapting at other institutions interested in starting such programs.
software engineering artificial intelligence networking and parallel distributed computing | 2005
Mike O'Leary; Shiva Azadegan
We describe a model for an interdisciplinary course in scientific modeling and simulation. We discuss the course structure and content, as well as the results of our evaluation process.
Journal of Investigative Psychology and Offender Profiling | 2009
Mike O'Leary