Search for tag: "information."

Courtney Crooks - Cyberpsychology & Future of Cybersecurity Research

Cyberpsychology is the interdisciplinary study of the psychology of cyberspace and those who use the tools of cyberspace. This field identifies and explores the overlap between online and offline…

From  Katie Gentilello 27 plays 0  

Sizhuang Liang - Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks

Additive Manufacturing (AM), also known as 3D printing, is gaining popularity in industry sectors, such as aerospace, automobile, medicine, and construction. As the market value of the AM industry…

From  Katie Gentilello 20 plays 0  

Aamir Lakhani - Anubis Clock

Bad guys live forever, and they adapt and become legends. The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an…

From  Katie Gentilello 22 plays 0  

Blake Brannon - The Evolving Landscape of Privacy, Technology and Data Governance

Why are all your favorite websites asking you to accept cookies? Why should you use and trust facial recognition software at the airport to help you get through security? How are businesses using…

From  Katie Gentilello 59 plays 0  

Jon Lindsay - Why Artificial Intelligence Increases the Importance of Humans in War (In Ukraine and Everywhere Else)

Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple…

From  Katie Gentilello 31 plays 0  

Jerry Perullo - Cybersecurity Risk Management in Times of Geopolitical Crisis

Organizations across the world are revisiting geography-based cybersecurity and travel restrictions in light of the Russian invasion of Ukraine.During this talk, we will explore the tools, settings,…

From  Katie Gentilello 24 plays 0  

Anita Gohdes - Internet outages and state repression

State-imposed Internet shutdowns, which represent the most extreme form of online censorship, are globally gaining in popularity. Previous research has highlighted the human rights implications of…

From  Katie Gentilello 20 plays 0  

J. Sukarno Mertoguno - Cyber Security and Cyber Physical Systems

Cyber-Physical Systems (CPS) underlies many of the nation's critical infrastructures. As CPS infrastructure becomes exposed to the contested world through networks, CPS security becomes much…

From  Katie Gentilello 27 plays 0  

Philip B. Stark - Evidence-Based Elections

Elections rely on people, hardware, and software, all of which are fallible and subject to manipulation. Voting equipment is built by private vendors using foreign parts. Many states outsource…

From  Katie Gentilello 49 plays 0  

The Cyber Dimension of the Crisis in Ukraine: An Expert Panel Discussion

This panel brings together experts on the cyber dimension of the conflict in Ukraine to explore its geopolitical context and potential trajectories. The Russian military intervention in Ukraine has…

From  Katie Gentilello 34 plays 0  

Brian Kelley - AI-Based Physical Layer Security Processing for 6G Privacy

This research addresses the challenge of privacy in 6G wireless networks using Artificial Intelligence. Privacy and prevention of eavesdropping are significant concerns in 6G networks, warranting…

From  Katie Gentilello 15 plays 0  

Josiah Dykstra - Invisible Security: Protecting Users with No Time to Spare

For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or…

From  Katie Gentilello 52 plays 0  

Nadiya Kostyuk - Deterrence in the Cyber Realm: Public versus Private Cyber Capacity

Can cyber deterrence work? Existing scholarly works argue that deterrence by punishment using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks makes the…

From  Katie Gentilello 23 plays 0  

Jonathan Fuller, Carter Yagemann, Sena Sahin - GT Cybersecurty Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)

Jonathan Fuller, c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration Current techniques to monitor botnets towards disruption or takedown are…

From  Katie Gentilello 24 plays 0  

Chris Rouland - A Random Walk Through 1,000,000 Things

From  Katie Gentilello 9 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello 56 plays 0