Page 2 of 2511 to 20 of 241 Past Events
2023
December
-
Modelling Extortion Attacks in Cryptocurrencies: Insights into Ethereum Validator Vulnerabilities
-Dive into an academic exploration of how ransomware gangs might target cryptocurrencies, with Dr. Darren Hurley-Smith unveiling a unique extortion attack model concerning Ethereum Validators. This seminar encapsulates a research-driven take on a recent Conversation article, supplemented with mitigation strategies.
-
Data and AI: What it means for education, research and society
-Join us for a fascinating online discussion on data and artificial intelligence.
November
-
Critical Infrastructure Protection: Current Challenges and Solutions
-Join us for an informative seminar with Prof. Leandros Maglaras, one of the world's top cybersecurity experts, as he delves into the evolving challenges and solutions surrounding the protection of our critical digital infrastructures.
-
Expressive Automated Planning via Satisfiability Modulo Theories
-Planning is a fundamental activity, impacting our daily lives in many and varied ways. The planning task consists of selecting a sequence of actions to achieve a specified goal from specified starting conditions. This type of problem arises frequently in many contexts. Consider, for example, holiday planning. Various interleaved elements...
-
Wearable Activity Trackers and Privacy: Assessment of the Risks, Threats, and Countermeasures
-Join us for an enlightening session with Dr. NoƩ Zufferey, postdoctoral fellow at the University of Lausanne as he delves into the privacy threats related to the use of wearable activity trackers.
-
Uncovering Implicit Inferences for Improved Relational Argument Mining
-Argument mining seeks to extract arguments and their structure from unstructured texts. Identifying relations between arguments (such as attack, support, and neutral) is a challenging task because two arguments may be related to each other via implicit inferences. This task often requires external commonsense knowledge to discover how one argument...
-
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation
-Join Chao Feng from the University of Zurich as he unveils the CyberForce framework, a novel approach in malware mitigation for IoT devices using federated reinforcement learning.
-
HW/SW Co-design for Security Systems
-Tune in to our online seminar with Huimin Li from Delft University of Technology, Netherlands. Unpack the details of HW/SW co-design and its impact on constructing resilient security architectures. Understand how intertwining hardware and software methodologies can result in enhanced and secure electronic solutions.
-
Lecture: Animal Venoms - Friend or Foe?
-This lecture will be delivered by Dr Wael Houssen and Dr Soumya Palliyil and followed by a reception.
-
Towards a Robust, Effective, and Resource-Efficient Machine Learning Technique for IoT Security Monitoring
-Join us for a seminar by Dr. Idris Zakariyya, a renowned cybersecurity professional, as he delves into the challenges and solutions for employing Deep Neural Networks in IoT security monitoring.