Search for tag: "cybersecurity lecture series"

Courtney Crooks - Cyberpsychology & Future of Cybersecurity Research

Cyberpsychology is the interdisciplinary study of…

From  Katie Gentilello 86 plays 0  

Sizhuang Liang - Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks

Additive Manufacturing (AM), also known as 3D…

From  Katie Gentilello 22 plays 0  

Aamir Lakhani - Anubis Clock

Bad guys live forever, and they adapt and become…

From  Katie Gentilello 22 plays 0  

Anita Gohdes - Internet outages and state repression

State-imposed Internet shutdowns, which represent…

From  Katie Gentilello 121 plays 0  

J. Sukarno Mertoguno - Cyber Security and Cyber Physical Systems

Cyber-Physical Systems (CPS) underlies many of…

From  Katie Gentilello 49 plays 0  

Philip B. Stark - Evidence-Based Elections

Elections rely on people, hardware, and software,…

From  Katie Gentilello 62 plays 0  

The Cyber Dimension of the Crisis in Ukraine: An Expert Panel Discussion

This panel brings together experts on the cyber…

From  Katie Gentilello 37 plays 0  

Brian Kelley - AI-Based Physical Layer Security Processing for 6G Privacy

This research addresses the challenge of privacy…

From  Katie Gentilello 27 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect…

From  Katie Gentilello 64 plays 0  

Zane Ma - Understanding the Trust Relationships of the Web PKI

From  Katie Gentilello 26 plays 0  

Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate Enterprise

The recent rise in cybersecurity breaches,…

From  Katie Gentilello 11 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure…

From  Katie Gentilello 73 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or…

From  Katie Gentilello 38 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of…

From  Katie Gentilello 34 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of…

From  Katie Gentilello 59 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to…

From  Katie Gentilello 83 plays 0