The School of Cybersecurity and Privacy, one of five schools in the top ten ranked College of Computing, was formed in September 2020. It builds on the strong foundation and continued success of the cybersecurity research, education, and service efforts at Georgia Tech that began more than twenty years ago.
SCP works to create security for everyone and everything, every day.
We ...
value multidisciplinary work,
draw inspiration from applications, and
believe security is fundamental to computing.
SCP works to create security for everyone and everything, every day.
We ...
value multidisciplinary work,
draw inspiration from applications, and
believe security is fundamental to computing.
Title
ID
Scheduling
Media Type
Media Owner
-
As of August 6th, 2024, here is the latest from our Travel, AP, and Procurement departments at Georgia Tech. Our
Wellness Check with Travel, AP, and Procurement
-
Mary Ellen Callahan serves as Assistant Secretary for the Department of Homeland Security’s (DHS) Countering Weapons of Mass Destruction (CWMD) Office. CWMD leads…
Keynote Speech by Assistant Secretary for DHS…
-
Abstract: Internet security and performance problems often brew invisibly. Protecting and improving the Internet’s operations requires real-time visibility into…
Liz Izhikevich - Global Visibility into the…
-
Abstract: Robots must behave safely and reliably if we are to confidently deploy them in the real world around humans. To complete tasks, robots must manage a complex,…
Glen Chou - Toward End-to-end Reliable Robot…
-
Abstract: Machine learning security is an emerging area with many open questions lacking systematic analysis. In this talk, I will present three new algorithmic tools to…
Teodora Baluta - New Algorithmic Tools for…
-
Abstract: Cyber-physical systems (CPSs), engineered systems which include sensing, processing, control, and communication in physical spaces, are ubiquitous in modern…
Paul Griffioen - Data Driven Approaches for Safe…
-
The task of system design is shared by all engineering disciplines, each coming with its own techniques. In spite of their differences in tools, there is…
Inigo Incer - Formal and Efficient Analysis and…
-
Platforms, devices, and algorithms are increasingly weaponized to control and harass the most vulnerable among us. Some of these harms occur at the individual and…
Emily Tseng - Digital Safety and Security for…
-
People today face threats to their digital safety that most computing systems were never designed to protect them from: those closest to them. Abusive adversaries take…
Rosanna Bellini - Decoding Abusive Adversaries…
Search for ""