Now showing items 20-39 of 113

    • Cybersecurity and You - Ready or Not, Here It Is! 

      Corliss, John (Georgia Institute of Technology, 2016-04-15)
      John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...
    • Cybersecurity Demo Day 2019: Awards 

      Farrell, Michael (Georgia Institute of Technology, 2019-04-16)
      A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning project, MLsploit, is a ...
    • Cybersecurity Demo Day 2019: Welcome and Meet the Judges 

      Farrell, Michael; Patton, Blake; Schanz, John; Telljohann, Rich (Georgia Institute of Technology, 2019-04-16)
      The Cybersecurity Demo Day Finale concludes a six-month program that began with 18 student teams who presented their research during the annual IISP Cybersecurity Summit.
    • Cybersecurity Factory 

      Wang, Frank (Georgia Institute of Technology, 2016-03-04)
      Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security ...
    • Data Portability and Cross-Border Data Flows 

      Swire, Peter (Georgia Institute of Technology, 2020-10-09)
    • Defending against Advanced Return-Oriented Programming Attacks 

      Polychronakis, Michalis (Georgia Institute of Technology, 2016-10-21)
    • Defending Organizations in a Fast-Moving Cyber Arms Race 

      Krug, Rob (Georgia Institute of Technology, 2019-02-08)
      This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
    • Developing Secure Products 

      Man, Emil; Rajasekharan, Karun (Georgia Institute of Technology, 2019-02-01)
      [Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
    • Device Enhanced Authentication: Passwords and Second Factors 

      Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
      Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
    • Differentially private change-point detection 

      Zhang, Wanrong (Georgia Institute of Technology, 2020-03-06)
      The change-point detection problem seeks to identify distributional changes in streams of data. Increasingly, tools for change-point detection are applied in settings where data may be highly sensitive and formal privacy ...
    • The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking 

      Klein, Hans (Georgia Institute of Technology, 2017-10-20)
      2017’s biggest news story has been Russia’s alleged use of social media to try to influence Western elections. Much criticism is directed towards RT.com, the “Russia Today” news network created in 2005 by the Russian ...
    • Efficiently Computing with Private Data 

      Heath, David (Georgia Institute of Technology, 2019-08-30)
      Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such computation cannot be ...
    • Emulytics at Sandia: Emulation-based Modeling and Analysis of Computer Systems 

      Gabert, Kasimir (Georgia Institute of Technology, 2018-09-14)
      Emulation-based models of distributed computing systems are collections of virtual machines, virtual networks, and other emulation components configured to stand in for operational systems when performing experimental ...
    • Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots 

      Vadrevu, Phani (Georgia Institute of Technology, 2017-01-27)
      In this talk, I present ChromePic, a web browser equipped with a novel forensic engine that aims to greatly enhance the browser’s logging capabilities. ChromePic’s main goal is to enable a fine-grained post-mortem ...
    • Energy System Cyber Security: An Overview 

      Meliopoulos, A.P. "Sakis" (Georgia Institute of Technology, 2019-08-23)
      The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take ...
    • Energy System Cybersecurity and Operational Reliability 

      Meliopoulos, A.P. "Sakis" (Georgia Institute of Technology, 2017-11-03)
      The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take ...
    • Enterprise Security at Georgia Tech 

      Koza, Kyle (Georgia Institute of Technology, 2018-03-09)
      This discussion will explore the operational security employed for students, faculty, staff and researchers at Georgia Tech as well as strategies and challenges faced by operational security teams inside large enterprises.
    • The Evolution of Modern Malware: Technology Trends and Motivations 

      Smoak, Christopher (Georgia Institute of Technology, 2016-11-04)
      Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist ...