Search for tag: "information science"

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello 2 Days ago 2 views 0  

2019 SBDH All Hands Meeting - Panel 3: Industry Panel

Beverly Wright, PhD. Chief Analytics Officer, RelationalAI. Venkat Kambalapally. Staff Vice President, Technology, Anthem, Inc. Robert Joseph, PhD. Director of Industrial Strategy, Stanley Black…

From  Kathryn Gentilello A week ago 2 views 0  

2019 SBDH All Hands Meeting - Cyber-Infrastructure and Social-Cybersecurity Working Groups

Cyber-Infrastructure Working Group: Niall Gaffney, PhD. Director of Data Intensive Computing, Office of Advanced Cyberinfrastructure / CISE. Texas Advanced Computing Center. Social-Cybersecurity…

From  Kathryn Gentilello A week ago 3 views 0  

2019 SBDH All Hands Meeting - Panel 2: Visionary Projects

Gari Clifford, PhD. Spoke PI, Large Scale Medical Informatics for Patient Care Coordination and Engagement. Emory University. Santiago Grijalva, PhD. Spoke Co-PI, Smart Grids Big Data. Georgia Tech.…

From  Kathryn Gentilello A week ago 3 views 0  

2019 SBDH All Hands Meeting - Panel 1: South Hub Priority Areas

Jay Aikat, PhD. Co-PI, South Big Data Regional Innovation Hub – University of North Carolina-Chapel Hill. David McDowell, PhD. Priority Area Representative Georgia Tech. Heather Bradley, PhD.…

From  Kathryn Gentilello A week ago 2 views 0  

Chaouki T. Abdallah, Srinivas Aluru, Stan Ahalt, Renata Rawlings-Goss - Welcome Remarks and South Hub Impacts and Opportunities

The SBDH All Hands meetings are organized to bring together the SBDH community in order to foster new and support existing data science collaborations, share best practices and resources for data and…

From  Kathryn Gentilello A week ago 4 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello A week ago 7 views 0  

John Baez - Mathematical Mysteries of the Periodic Table

Why do atoms behave the way they do? Why do electrons form “shells,” as seen in the periodic table? Why does the first shell hold 2 electrons, the second 8, and the third 18: twice the…

From  Kathryn Gentilello A week ago 3 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello 3 Weeks ago 9 views 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello 3 Weeks ago 12 views 0  

Shelby Allen - A Tale of Two Tasks: Designing and Validating Secure Software

Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources…

From  Kathryn Gentilello A month ago 17 views 0  

Michael A. Filler - Celebrating Silicon: Its Success, Hidden History, and Next Act

The history of silicon is usually told as a history of electronic materials and devices. However, it is better told as a history of manufacturing innovation. This talk will take a journey through the…

From  Kathryn Gentilello A month ago 9 views 0  

Michael Brown - Improving Security Through Software Debloating

As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such…

From  Kathryn Gentilello A month ago 19 views 0  

Matice Wright - From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer

Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the…

From  Kathryn Gentilello A month ago 74 views 0  

Rob Krug - Defending Organizations in a Fast-Moving Cyber Arms Race

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…

From  Kathryn Gentilello 2 Months ago 27 views 0