Northeastern researchers connect diseases based on their molecular similarities

North­eastern Uni­ver­sity net­work sci­en­tists have found a way to con­nect dis­eases based on their shared mol­e­c­ular inter­ac­tions, a remark­able step in under­standing human diseases.

Looking ahead: Cybersecurity in 2015

U.S. busi­nesses suf­fered a score of data breaches in 2014. Here, William Robertson, an assis­tant pro­fessor and web secu­rity expert, explains what we can expect from cyber­se­cu­rity in the new year.

Researchers aim to thwart targeted cyberattacks

North­eastern cyber­se­cu­rity expert Engin Kirda and his col­leagues have pro­duced ground­breaking research that sheds light on tar­geted attacks, which rep­re­sent the growing majority of cyberes­pi­onage world­wide taking place today.

New master’s program to prepare future security professionals

North­eastern will launch a first-​​of-​​its-​​kind, inter­dis­ci­pli­nary grad­uate pro­gram this fall to train the next gen­er­a­tion of secu­rity pro­fes­sionals to face the new and evolving chal­lenges of the 21st century.

3Qs: Big Data project reaches for the ‘cloud’

North­eastern is a key partner in the Mass­a­chu­setts Open Cloud Project, a university-​​industry col­lab­o­ra­tion designed to create a new public cloud com­puting infra­struc­ture to spur Big Data innovation.

Take 5: How to protect your passwords

Not using the same pass­word for every­thing is among sev­eral tips North­eastern cyber­se­cu­rity expert Wil Robertson sug­gests to help Internet users guard their per­sonal infor­ma­tion online.

The evolution of language, from Shakespeare to present day

Assis­tant pro­fessor David Smith is lever­aging dig­ital human­i­ties tech­niques to ana­lyze syn­tactic changes throughout his­tory in an effort to under­stand how lan­guages evolve.

Data mining in a complex world

The real world is an enor­mously com­plex net­work in which every­thing is inter­con­nected. Assis­tant pro­fessor of com­puter and infor­ma­tion sci­ence Yizhou Sun develops data-​​mining algo­rithms that take advan­tage of that complexity.

Sinister code-​​breakers, beware

The research of Daniel Wichs, a new assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, focuses on how cryp­tog­raphy can con­tinue pro­tecting per­sonal data in an evolving dig­ital age.

3Qs: Analyzing the cybersecurity threat posed by hackers

Themis Papa­george, an asso­ciate clin­ical pro­fessor of com­puter and infor­ma­tion sci­ence, exam­ines the cyber­se­cu­rity threat posed by al-​​Qaida and Anony­mous, a global group of hackers.

3Qs: Is a potential Facebook hack on the horizon?

The hacker group Anony­mous recently announced through a YouTube video that it plans to “kill” Face­book on Nov. 5 for sup­pos­edly abusing the pri­vacy of its users. We asked Engin Kirda, the Sy and Laurie Stern­berg Inter­dis­ci­pli­nary Endowed Pro­fessor for Infor­ma­tion Assur­ance — with joint appoint­ments in Northeastern’s Col­lege of Com­puter and Infor­ma­tion Sci­ence and Depart­ment of Elec­trical and Com­puter Engi­neering — to dis­cuss the poten­tial impli­ca­tions of the hack and the motives behind hacking groups such as Anonymous.

Nurturing a seed of discovery

Net­work sci­en­tists at North­eastern col­lab­o­rate on first large-​​scale map of a plant’s pro­tein net­work, which could one day help treat human disease.