Events
Oct 28 2024 12:00-1:00pm. WWH 335 Dr. Chenglong Fu Software and Information Systems Abstract: Modern critical industrial infrastructures increasingly rely on Cyber-Physical Systems (CPS), which enable advanced features like remote and automated control. However, the integration of CPS introduces significant risks, as these systems are potential targets for cyber-attacks that could result in catastrophic consequences. […]
Professor Depeng Xu, UNC Charlotte Oct 21, 2024. 12-1pm. WWH 335 Artificial Intelligence (AI) and Machine Learning (ML) have developed rapidly and been adopted in a variety of applications. Despite the popularity and efficiency of these models, society is concerned about the trustworthiness of machine learning models. (1) The intensive training process on large-scale data raises […]
Professor Depeng Xu, UNC Charlotte September 30, 2024. 12-1pm. WWH 335 Abstract:Anomaly detection has a wide range of real-world applications, such as bank fraud detection and cyber intrusion detection. In the past decade, a variety of anomaly detection models have been developed, which lead to big progress towards accurately detecting various anomalies. Despite the successes, […]
10:30-11:30 April 25 2024 WWH 335. Vulnerability discovery models (VDM) have been proposed as an application of software reliability growth models (SRGM) to software security-related defects. VDM model the number of vulnerabilities discovered as a function of testing time, enabling quantitative measures of security. Despite their obvious utility, past VDM have been limited to parametric […]
2-3pm. April 22, 2024 WWH 236. Performance of biometric recognition technology is a key aspect to mitigate security risks while not sacrificing the user’s experience. While algorithm testing has demonstrated the great strides in biometric performance, certification of biometric performance based on full system evaluation including the user interface and presentation attack detection is also needed. Furthermore, […]
11:00 April 22 2024, WWH 335 Security and privacy are critical for building reliable and trustworthy smart environments. This talk discusses my recent work in building secure smart spaces with a focus on privacy. Specifically, small, low-cost, wireless cameras are becoming increasingly commonplace making surreptitious observation of people more difficult to detect. Previous work in detecting […]
April 12 11:30-12:30 WWH 335. Software-defined infrastructures (Cloud, Edge, and IoT) have opened new opportunities to enhance flexibility and reduce computer network management burdens. This talk covers some of my research group’s investigations on the design, prototyping, and performance analysis of software-defined service management architectures built to achieve programmability of edge computing mechanisms for several […]
April 3. 2024 3:00-4:00 pm. WWH 335. Dr. Wisniewski’s research expertise is situated at the juxtaposition of Human-Computer Interaction (HCI), Social Computing, Privacy, and Online Safety. She views privacy as a social mechanism that helps people regulate their interpersonal boundaries with others in a way that facilitates more meaningful connections and safer online interactions with […]
March 27 10:30-11:30 WWH 335. While we all share the excitements of great IoT visions and impressive IoT scenarios and possibilities, we do not yet have a clear pathway to realizing this vision systematically and on a broad and large scale. In fact, it can be argued that the focus on vision and abstracting away […]
Nov 30, 2023, 11:30-12:30 WWH 335 Many production software systems are available only in binary form. This is due to severalreasons including intellectual property and proprietary issues, outdated and decaying buildprocesses and environments, and third-party libraries and tools that are no longer available orbackwards compatible. Security vulnerability analysis of such software is still a necessary […]
Nov 9th 11:30-12:30 WWH 335 Global politics shift, and cyber attackers evolve, pushing the DFIR industry to its limits. We’ll examine the impact of geopolitical changes on cyber threats and the urgent need for the continued evolution of DFIR tools and investigative techniques. This talk will present the influence of global dynamics on attack strategies, […]
Oct 26th 11:30-12:30 WWH 335 As adoption of mobile phones has skyrocketed, so have scams involving them. The text method is called “SMiShing,” (aka “SMShing”, or “smishing”) in which a fraudster sends a phishing link via Short Message Service (SMS) text to a phone. However, no data exists onwho is most vulnerable to SMiShing. Prior […]
Oct 5th 11:30-12:30 WWH 335 Actionable cyber threat intelligence is vital for effective defense. In practice, indicators of compromises (IP addresses or domains) are used to alert potential malicious activities. However, such alerts lack important context for defenders to take effective actions. For example, given an alert concerning an IP address, a defender wants to […]
Thursday Sep 21 11:30-12:30 WWH 335 DDoSim, a simulation testbed for mimicking real-world, large-scale botnet DDoS attacks, is presented. DDoSim offers various capabilities, including running user-specified software, testing botnet recruitment exploits, and measuring the severity of resulting DDoS attacks. DDoSim leverages the integration of Docker and NS-3 to load Docker containers with actual binaries and […]
Event Date:April 11, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335
Event Date:March 28, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335
Event Date:March 17, 2023 – 11:00 AM to 12:00 PM Location:Woodward Hall 335
Event Date:March 14, 2023 (All day)