Search for tag: "information"
Courtney Crooks - Cyberpsychology & Future of Cybersecurity ResearchCyberpsychology is the interdisciplinary study of the psychology of cyberspace and those who use the tools of cyberspace. This field identifies and explores the overlap between online and offline…
From Katie Gentilello
85 plays
0
|
|
Sizhuang Liang - Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel AttacksAdditive Manufacturing (AM), also known as 3D printing, is gaining popularity in industry sectors, such as aerospace, automobile, medicine, and construction. As the market value of the AM industry…
From Katie Gentilello
22 plays
0
|
|
Aamir Lakhani - Anubis ClockBad guys live forever, and they adapt and become legends. The threat landscape has completely changed. In the last twelve months we have seen supply chain attacks, an increase in ransomware (with an…
From Katie Gentilello
22 plays
0
|
|
Blake Brannon - The Evolving Landscape of Privacy, Technology and Data GovernanceWhy are all your favorite websites asking you to accept cookies? Why should you use and trust facial recognition software at the airport to help you get through security? How are businesses using…
From Katie Gentilello
76 plays
0
|
|
Jon Lindsay - Why Artificial Intelligence Increases the Importance of Humans in War (In Ukraine and Everywhere Else)Recent scholarship on artificial intelligence (AI) and international security focuses on the political and ethical consequences of replacing human warriors with machines. Yet AI is not a simple…
From Katie Gentilello
94 plays
0
|
|
Jerry Perullo - Cybersecurity Risk Management in Times of Geopolitical CrisisOrganizations across the world are revisiting geography-based cybersecurity and travel restrictions in light of the Russian invasion of Ukraine.During this talk, we will explore the tools, settings,…
From Katie Gentilello
59 plays
0
|
|
Anita Gohdes - Internet outages and state repressionState-imposed Internet shutdowns, which represent the most extreme form of online censorship, are globally gaining in popularity. Previous research has highlighted the human rights implications of…
From Katie Gentilello
121 plays
0
|
|
J. Sukarno Mertoguno - Cyber Security and Cyber Physical SystemsCyber-Physical Systems (CPS) underlies many of the nation's critical infrastructures. As CPS infrastructure becomes exposed to the contested world through networks, CPS security becomes much…
From Katie Gentilello
48 plays
0
|
|
Philip B. Stark - Evidence-Based ElectionsElections rely on people, hardware, and software, all of which are fallible and subject to manipulation. Voting equipment is built by private vendors using foreign parts. Many states outsource…
From Katie Gentilello
60 plays
0
|
|
The Cyber Dimension of the Crisis in Ukraine: An Expert Panel DiscussionThis panel brings together experts on the cyber dimension of the conflict in Ukraine to explore its geopolitical context and potential trajectories. The Russian military intervention in Ukraine has…
From Katie Gentilello
37 plays
0
|
|
Brian Kelley - AI-Based Physical Layer Security Processing for 6G PrivacyThis research addresses the challenge of privacy in 6G wireless networks using Artificial Intelligence. Privacy and prevention of eavesdropping are significant concerns in 6G networks, warranting…
From Katie Gentilello
26 plays
0
|
|
Josiah Dykstra - Invisible Security: Protecting Users with No Time to SpareFor over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or…
From Katie Gentilello
52 plays
0
|
|
Nadiya Kostyuk - Deterrence in the Cyber Realm: Public versus Private Cyber CapacityCan cyber deterrence work? Existing scholarly works argue that deterrence by punishment using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks makes the…
From Katie Gentilello
24 plays
0
|
|
Jonathan Fuller, Carter Yagemann, Sena Sahin - GT Cybersecurty Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)Jonathan Fuller, c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration Current techniques to monitor botnets towards disruption or takedown are…
From Katie Gentilello
36 plays
0
|
|
Joseph Jaeger - Bridging the Theory and Practice of CryptographyCryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…
From Katie Gentilello
63 plays
0
|