|
Cyberpsychology is the interdisciplinary study of the psychology of cyberspace and those who use the tools of cyberspace. This field identifies and explores the overlap between online and offline…
name
Courtney Crooks Date
April 15th, 2022
|
|
Additive Manufacturing (AM), also known as 3D printing, is gaining popularity in industry sectors, such as aerospace, automobile, medicine, and construction. As the market value of the AM industry…
name
Sizhuang Liang Date
April 8th, 2022
|
|
Bad guys live forever, and they adapt and become legends. The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an…
name
Aamir Lakhani Date
April 1st, 2022
|
|
State-imposed Internet shutdowns, which represent the most extreme form of online censorship, are globally gaining in popularity. Previous research has highlighted the human rights implications of…
name
Anita Gohdes Date
February 18th, 2022
|
|
Cyber-Physical Systems (CPS) underlies many of the nation's critical infrastructures. As CPS infrastructure becomes exposed to the contested world through networks, CPS security becomes much…
name
J. Sukarno Mertoguno Date
February 11th, 2022
|
|
Elections rely on people, hardware, and software, all of which are fallible and subject to manipulation. Voting equipment is built by private vendors using foreign parts. Many states outsource…
name
Philip B. Stark Date
February 4th, 2022
|
|
This panel brings together experts on the cyber dimension of the conflict in Ukraine to explore its geopolitical context and potential trajectories. The Russian military intervention in Ukraine has…
name
Aaron Brantly, Nadiya Kostyuk, Jon Lindsay, Lennart Maschmeyer, Glib Pakharenko Date
January 28th, 2022
|
|
This research addresses the challenge of privacy in 6G wireless networks using Artificial Intelligence. Privacy and prevention of eavesdropping are significant concerns in 6G networks, warranting…
name
Brian Kelley Date
January 21st, 2022
|
|
Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…
name
Joseph Jaeger Date
October 8th, 2021
|
|
name
Zane Ma Date
September 24th, 2021
|
|
The recent rise in cybersecurity breaches, geopolitical cyber events, and resulting legal developments have placed the spotlight on the cybersecurity professional and their role in the corporate…
name
Todd McClelland Date
September 17th, 2021
|
|
Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…
name
Kevin Hutto Date
April 23rd, 2021
|
|
Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…
name
Kennon Bittick Date
April 16th, 2021
|
|
Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…
name
Elie Khoury Date
April 2nd, 2021
|
|
This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…
name
Tianxin Tang Date
March 26th, 2021
|
|
Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…
name
Ambrose Kam Date
March 19th, 2021
|