• Adversarial Attack on Graph-Structured Data 

      Dai, Hanjun (Georgia Institute of Technology, 2019-03-15)
      Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...
    • Cyber Science: The Third Frontier 

      Johnson-Bey, Charles (Georgia Institute of Technology, 2019-10-11)
      Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense ...
    • The Implications of Privacy-Aware Choice 

      Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
      Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
    • Open Source Intelligence Applications in Cybersecurity 

      Shields, Thomas (Georgia Institute of Technology, 2018-09-28)
      Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
    • SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds 

      Wang, Frank (Georgia Institute of Technology, 2016-09-30)
      Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...