Search for tag: "cybersecurity lecture series"
Courtney Crooks - Cyberpsychology & Future of Cybersecurity ResearchCyberpsychology is the interdisciplinary study of the psychology of cyberspace and those who use the tools of cyberspace. This field identifies and explores the overlap between online and offline…
From Katie Gentilello
85 plays
0
|
|
Sizhuang Liang - Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel AttacksAdditive Manufacturing (AM), also known as 3D printing, is gaining popularity in industry sectors, such as aerospace, automobile, medicine, and construction. As the market value of the AM industry…
From Katie Gentilello
22 plays
0
|
|
Aamir Lakhani - Anubis ClockBad guys live forever, and they adapt and become legends. The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an…
From Katie Gentilello
22 plays
0
|
|
Anita Gohdes - Internet outages and state repressionState-imposed Internet shutdowns, which represent the most extreme form of online censorship, are globally gaining in popularity. Previous research has highlighted the human rights implications of…
From Katie Gentilello
121 plays
0
|
|
J. Sukarno Mertoguno - Cyber Security and Cyber Physical SystemsCyber-Physical Systems (CPS) underlies many of the nation's critical infrastructures. As CPS infrastructure becomes exposed to the contested world through networks, CPS security becomes much…
From Katie Gentilello
48 plays
0
|
|
Philip B. Stark - Evidence-Based ElectionsElections rely on people, hardware, and software, all of which are fallible and subject to manipulation. Voting equipment is built by private vendors using foreign parts. Many states outsource…
From Katie Gentilello
60 plays
0
|
|
The Cyber Dimension of the Crisis in Ukraine: An Expert Panel DiscussionThis panel brings together experts on the cyber dimension of the conflict in Ukraine to explore its geopolitical context and potential trajectories. The Russian military intervention in Ukraine has…
From Katie Gentilello
37 plays
0
|
|
Brian Kelley - AI-Based Physical Layer Security Processing for 6G PrivacyThis research addresses the challenge of privacy in 6G wireless networks using Artificial Intelligence. Privacy and prevention of eavesdropping are significant concerns in 6G networks, warranting…
From Katie Gentilello
26 plays
0
|
|
Joseph Jaeger - Bridging the Theory and Practice of CryptographyCryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…
From Katie Gentilello
63 plays
0
|
|
Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate EnterpriseThe recent rise in cybersecurity breaches, geopolitical cyber events, and resulting legal developments have placed the spotlight on the cybersecurity professional and their role in the corporate…
From Katie Gentilello
10 plays
0
|
|
Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded SystemsEmbedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…
From Katie Gentilello
73 plays
0
|
|
Kennon Bittick - Function Equivalence with Symbolic ExecutionSummarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…
From Katie Gentilello
38 plays
0
|
|
Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice ChannelVoice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…
From Katie Gentilello
33 plays
0
|
|
Tianxin Tang - Provably-Secure Approximate k-NN Search ProtocolThis talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…
From Katie Gentilello
58 plays
0
|
|
Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming EngineCybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…
From Katie Gentilello
83 plays
0
|