Search for tag: "cybersecurity lecture series"

Courtney Crooks - Cyberpsychology & Future of Cybersecurity Research

Cyberpsychology is the interdisciplinary study of…

From  Katie Gentilello April 21st, 2022 86 plays 0  

Sizhuang Liang - Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks

Additive Manufacturing (AM), also known as 3D…

From  Katie Gentilello April 20th, 2022 22 plays 0  

Aamir Lakhani - Anubis Clock

Bad guys live forever, and they adapt and become…

From  Katie Gentilello April 6th, 2022 22 plays 0  

Anita Gohdes - Internet outages and state repression

State-imposed Internet shutdowns, which represent…

From  Katie Gentilello February 26th, 2022 121 plays 0  

J. Sukarno Mertoguno - Cyber Security and Cyber Physical Systems

Cyber-Physical Systems (CPS) underlies many of…

From  Katie Gentilello February 26th, 2022 49 plays 0  

Philip B. Stark - Evidence-Based Elections

Elections rely on people, hardware, and software,…

From  Katie Gentilello February 11th, 2022 62 plays 0  

The Cyber Dimension of the Crisis in Ukraine: An Expert Panel Discussion

This panel brings together experts on the cyber…

From  Katie Gentilello February 11th, 2022 37 plays 0  

Brian Kelley - AI-Based Physical Layer Security Processing for 6G Privacy

This research addresses the challenge of privacy…

From  Katie Gentilello January 27th, 2022 27 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect…

From  Katie Gentilello October 12th, 2021 64 plays 0  

Zane Ma - Understanding the Trust Relationships of the Web PKI

From  Katie Gentilello September 29th, 2021 26 plays 0  

Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate Enterprise

The recent rise in cybersecurity breaches,…

From  Katie Gentilello September 29th, 2021 11 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure…

From  Katie Gentilello May 7th, 2021 73 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or…

From  Katie Gentilello May 6th, 2021 39 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of…

From  Katie Gentilello April 9th, 2021 34 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of…

From  Katie Gentilello April 1st, 2021 60 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to…

From  Katie Gentilello April 1st, 2021 85 plays 0