|
A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…
|
|
Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…
name
Carter Yagemann Date
April 16th, 2019
|
|
Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…
name
Tohid Shekari Date
April 16th, 2019
|
|
Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…
name
Evan Downing Date
April 16th, 2019
|
|
Welcome by Dr. Michael Farrell Meet the Judges: Blake Patton, Tech Square Ventures John Schanz, TDF Ventures Rich Telljohann, IBM Security
name
Michael Farrell, Blake Patton, John Schanz, Rich Telljohann Date
April 16th, 2019
|
|
Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency…
name
Majid Ahmadi Date
April 12th, 2018
|
|
Congratulations to the 2017-2018 Winners!Grand Prize - Create-X Startup LAUNCH incubator seat:"OSS Police" Ashish Bijlani & Ruian Duan School of Computer Science1st Place -…
name
Christopher Klaus, Blake Patton, Kevin Skapentiz Date
April 12th, 2018
|
|
More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard…
name
Erkam Uzun Date
April 12th, 2018
|
|
As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to…
name
Yang Ji Date
April 12th, 2018
|
|
In order to reduce time to market, mobile app developers often focus their efforts on creating new, unique features or workflows, and rely on third-party Open Source Software (OSS) for common…
name
Ashish Bijlani, Ruian Duan Date
April 12th, 2018
|
|
Phishing is the first step for many high-profile breaches, such as the Democratic National Convention hack of 2016. The current "solution" to phishing is basically user training; educate…
name
Tony Zhaocheng Tan, Anisha Bandhari Date
April 12th, 2018
|
|
Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security…
name
Wenke Lee Date
April 12th, 2018
|