Search for tag: "mating"

Rob Krug - Defending Organizations in a Fast-Moving Cyber Arms Race

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…

From  Kathryn Gentilello 4 Days ago 8 views 0  

Karun Rajasekharan and Emil Man - Developing Secure Products

Karun Rajasekharan: Honeywell Building Technologies develops and releases hundreds of products across the globe with over 100 Scrum teams. Product security has been identified as a key product…

From  Kathryn Gentilello A week ago 17 views 0  

Sam King - Stopping Fraudsters by Changing Products

Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but…

From  Kathryn Gentilello 2 Weeks ago 18 views 0  

Cao (Danica) Xiao - Deep Learning for Healthcare: Opportunities, Innovations, and Challenges

The massive generation and collection of digitized health data, e.g. electronic health records (EHRs), along with these notable, longstanding healthcare deficiencies including diagnostic errors and…

From  Kathryn Gentilello 2 Weeks ago 16 views 0  

Nir Valtman - Protect Your Unicorn From Hunters

Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a…

From  Kathryn Gentilello 3 Weeks ago 69 views 0  

Maliheh Shirvanian - Device Enhanced Authentication: Passwords and Second Factors

Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification…

From  Kathryn Gentilello A month ago 32 views 0  

Gabor Lugosi - Combinatorial Testing Problems

In these lectures we discuss some statistical problems with an interesting combinatorial structure behind. We start by reviewing the "hidden clique" problem, a simple prototypical example…

From  Kathryn Gentilello 3 Months ago 16 views 0  

Sara van de Geer - Sharp Oracle Inequalities for Non-Convex Loss

There will be three lectures, which in principle will be independent units. Their common theme is exploiting sparsity in high-dimensional statistics. Sparsity means that the statistical model…

From  Kathryn Gentilello 5 Months ago 84 views 0  

Majid Ahmadi - Tackling Cybersecurity Threats in Smart Grids

Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency…

From  Kathryn Gentilello 9 Months ago 19 views 0  

Yang Ji - RAIN: Refinable Attack Investigation with On-demand Inter-process Information Flow Tracking

As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to…

From  Kathryn Gentilello 9 Months ago 16 views 0