Marsette Vona, an assistant professor in the College of Computer and Information Science, explains the challenges of controlling a Martian rover.
Computer science sophomore Ali Ukani built a website that catalogs Instagram photos taken on and around Northeastern’s campus.
Themis Papageorge, an associate clinical professor of computer and information science, examines the cybersecurity threat posed by al-Qaida and Anonymous, a global group of hackers.
Associate professors of graphic design and speech language pathology and audiology have teamed up to develop a computer program that helps teenage foreign-language speakers learn English.
As part of a Monday afternoon lecture on cybersecurity, Engin Kirda was installed as the inaugural Sy and Laurie Sternberg Associate Professor for Information Assurance.
Marty Vona, an assistant professor in the College of Computer and Information Science, discusses the technical challenges of Google’s newest venture.
The hacker group Anonymous recently announced through a YouTube video that it plans to “kill” Facebook on Nov. 5 for supposedly abusing the privacy of its users. We asked Engin Kirda, the Sy and Laurie Sternberg Interdisciplinary Endowed Professor for Information Assurance — with joint appointments in Northeastern’s College of Computer and Information Science and Department of Electrical and Computer Engineering — to discuss the potential implications of the hack and the motives behind hacking groups such as Anonymous.
Northeastern computer science major will present his findings on preventing data loss to international conference in Montreal
Director of Northeastern’s Center for Complex Network Research wins recognition from science foundation based in Italy
This student app inventor wants you to start your day informed.
Senior Praful Mathur was one of a handful of U.S. students to attend the World Foresight Forum, a summit on solving 21st century global challenges.
Internet attacks offer intriguing research challenges for new professor, who will look at the user’s role in creating vulnerabilities