{"status":"ok","elements":"
<\/a>\r\n <\/div>\r\n Three researchers from CNS have been named finalists for the Research Impact Award at the Third Annual Cyber Policy Awards\u2122,<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
CNS researchers, together with collaborators from Princeton University, will present new work at the Passive and Active Measurement (PAM) Conference,<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n Congratulations to Wenyi “Morty” Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger, and Aaron Schulman for their 2025 CCS<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n Cyber resiliency analyst Jonathon Guthrie unspools 150 feet of ethernet cable across a lawn on the campus of the University<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n The University of California San Diego\u2019s Center for Networked Systems (CNS) is proud to announce that two undergraduate students have<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n Amy Ousterhout, a computer scientist at the University of California San Diego and a CNS faculty member is part of<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n The 2025 USENIX Security Test of Time Award was given to the research paper “Comprehensive Experimental Analyses of Automotive Attack<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n Researchers at CNS have been actively studying the implications of technology disruptions on healthcare delivery. A recent study published in<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n CNS computer scientist Imani Munyaka is one of three assistant professors in the University of California San Diego\u2019s Jacobs School<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n The CNS faculty, researchers, students, and industry representatives meet for the annual CNS Research Review on May 8-9, 2025, at<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n
<\/a>\r\n <\/div>\r\n CNS Co-Director Stefan Savage gives a keynote talk at the IEEE 46th IEEE Symposiumm on Security and Privacy in San<\/p>\n <\/div>\r\n <\/div>\r\n<\/div>\r\n