Search for tag: "information security"

Margaret Loper - Trusting Smart Cities: Risk Factors and Implications

In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This…

From  Kathryn Gentilello A day ago 4 views 0  

David Heath - Efficiently Computing with Private Data

Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such…

From  Kathryn Gentilello A week ago 15 views 0  

Sakis Meliopoulos - Energy System Cyber Security: An Overview

The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to…

From  Kathryn Gentilello 2 Weeks ago 4 views 0  

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello 4 Months ago 40 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello 4 Months ago 14 views 0  

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello 4 Months ago 27 views 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello 4 Months ago 9 views 0  

Tohid Shekari - LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid

Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…

From  Kathryn Gentilello 4 Months ago 10 views 0  

Evan Downing - MLsploit

Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…

From  Kathryn Gentilello 4 Months ago 7 views 0  

Cybersecurity Demo Day Welcome and Meet the Judges

Welcome by Dr. Michael Farrell Meet the Judges: Blake Patton, Tech Square Ventures John Schanz, TDF Ventures Rich Telljohann, IBM Security

From  Kathryn Gentilello 4 Months ago 9 views 0  

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello 4 Months ago 5 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello 5 Months ago 24 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello 5 Months ago 16 views 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello 5 Months ago 31 views 0  

Shelby Allen - A Tale of Two Tasks: Designing and Validating Secure Software

Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources…

From  Kathryn Gentilello 6 Months ago 23 views 0  

Michael Brown - Improving Security Through Software Debloating

As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such…

From  Kathryn Gentilello 6 Months ago 21 views 0