Search for tag: "live demo"

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello 2 Months ago 11 views 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello 2 Months ago 4 views 0  

Tohid Shekari - LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid

Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…

From  Kathryn Gentilello 2 Months ago 6 views 0  

Evan Downing - MLsploit

Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…

From  Kathryn Gentilello 2 Months ago 3 views 0  

Cybersecurity Demo Day Welcome and Meet the Judges

Welcome by Dr. Michael Farrell Meet the Judges: Blake Patton, Tech Square Ventures John Schanz, TDF Ventures Rich Telljohann, IBM Security

From  Kathryn Gentilello 2 Months ago 4 views 0  

Majid Ahmadi - Tackling Cybersecurity Threats in Smart Grids

Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency…

From  Kathryn Gentilello A year ago 32 views 0  

Cybersecurity Demo Day 2018 Awards - Christopher Klaus, Blake Patton, Kevin Skapentiz

Congratulations to the 2017-2018 Winners!Grand Prize - Create-X Startup LAUNCH incubator seat:"OSS Police" Ashish Bijlani & Ruian Duan School of Computer Science1st Place -…

From  Kathryn Gentilello A year ago 10 views 0  

Erkam Uzun - rtCaptcha

More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard…

From  Kathryn Gentilello A year ago 7 views 0  

Yang Ji - RAIN: Refinable Attack Investigation with On-demand Inter-process Information Flow Tracking

As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to…

From  Kathryn Gentilello A year ago 19 views 0  

Ashish Bijlani, Ruian Duan - OSS Police

In order to reduce time to market, mobile app developers often focus their efforts on creating new, unique features or workflows, and rely on third-party Open Source Software (OSS) for common…

From  Kathryn Gentilello A year ago 37 views 0  

Tony Zhaocheng Tan, Anisha Bandhari - Phish or Fish

Phishing is the first step for many high-profile breaches, such as the Democratic National Convention hack of 2016. The current "solution" to phishing is basically user training; educate…

From  Kathryn Gentilello A year ago 13 views 0  

Cybersecurity Demo Day 2018 Introduction - Wenke Lee

Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security…

From  Kathryn Gentilello A year ago 46 views 0  


Session J: Global Learning Center Room 222

natural sciencesconcepts in physicsside wallschemical elementssolutionsindustrial processesgeometric shapesscatteringheat transferparameterscharacterizationcontinuum mechanicssystems theorymetallurgythermodynamicsoptical devicesmicronsystemsworld cuisinedrug discoveryphysical chemistryarchitectural elementsmaterials sciencenuclear physicspharmacologystructural engineeringrisk analysiswallsnanotechnologyspin speedminutecondensed matter physicsgeography terminologypolymersuniversityhumidityelementary geometryphases of mattercooking techniquesand air conditioningsciencelarge increasesociology of culturevisionmeteorologyforceresearch methodstranspirationphilosophical terminologyfrequencydesignsoil contaminationmeasurementhomestandardstransition metalselasticity (physics)surfacesfluid dynamicspsychologymatterphotosensitivechemical propertiesresearchbiology and pharmacology of chemical elementsmembraneaircraft wing designfood and drinkhydrogen compoundspressureratiosstatistical inferencesensorsdrug delivery devicestopologybuilding materialschemical processeshydrologysynthetic fiberseducational stagesheatingscience experimentslengthmineralogycolormicroscopesmeasuring instrumentsbrushcoatingscontrol theorycomplicationtemperaturenatural philosophyquestiongarden featurestypes of university or collegestructurepressure sensoroxygen compoundsphase transitionsnutritionneedleglassconstructionpainting techniquesclassical mechanicsfood ingredientsforensic equipmentsemiconductor device fabricationengineering ratiosdevelopmental psychologyyouthgeometrysolventsprintingunderwater diving physicsclean energydairy productsprocessthin film depositionmetalseducationdesign of experimentscrystallographymetrologyweb colorsfeatureparticle physicsapplicationpotentialatmospheric thermodynamicsventilatingpollutantsintellectual property lawlaundryalgebrastudentsviscositystructural systemoptical spectrumliquidsfluid mechanicselectromagnetismoxidestwelve micronproperty lawphotonicsacousticssi derived unitsdiffractionnitridesmassacademic administrationlinear operators in calculusbiotechnologyelementary mathematics
From  Leslie O'Neill A year ago 26 views 0  


Special Presentation: international REU program at the National Institute for Materials Science Tsukuba, Japan

From  Leslie O'Neill A year ago 2 views 0