All members of the department are welcome: undergraduates, postgraduates, postdocs, teaching staff, technical staff - anyone who would like to attend and learn a little bit about what our speakers do in their research career. Members from other disciplines within the School, and the wider University community, are also welcome to attend.
All PhD students in Chemistry are expected to attend as part of their PhD training.
Page 1 of 121 to 10 of 119 Past Events
Modelling Extortion Attacks in Cryptocurrencies: Insights into Ethereum Validator Vulnerabilities-
Dive into an academic exploration of how ransomware gangs might target cryptocurrencies, with Dr. Darren Hurley-Smith unveiling a unique extortion attack model concerning Ethereum Validators. This seminar encapsulates a research-driven take on a recent Conversation article, supplemented with mitigation strategies.
Critical Infrastructure Protection: Current Challenges and Solutions-
Join us for an informative seminar with Prof. Leandros Maglaras, one of the world's top cybersecurity experts, as he delves into the evolving challenges and solutions surrounding the protection of our critical digital infrastructures.
Expressive Automated Planning via Satisfiability Modulo Theories-
Planning is a fundamental activity, impacting our daily lives in many and varied ways. The planning task consists of selecting a sequence of actions to achieve a specified goal from specified starting conditions. This type of problem arises frequently in many contexts. Consider, for example, holiday planning. Various interleaved elements...
Wearable Activity Trackers and Privacy: Assessment of the Risks, Threats, and Countermeasures-
Join us for an enlightening session with Dr. Noé Zufferey, postdoctoral fellow at the University of Lausanne as he delves into the privacy threats related to the use of wearable activity trackers.
Uncovering Implicit Inferences for Improved Relational Argument Mining-
Argument mining seeks to extract arguments and their structure from unstructured texts. Identifying relations between arguments (such as attack, support, and neutral) is a challenging task because two arguments may be related to each other via implicit inferences. This task often requires external commonsense knowledge to discover how one argument...
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation-
Join Chao Feng from the University of Zurich as he unveils the CyberForce framework, a novel approach in malware mitigation for IoT devices using federated reinforcement learning.
HW/SW Co-design for Security Systems-
Tune in to our online seminar with Huimin Li from Delft University of Technology, Netherlands. Unpack the details of HW/SW co-design and its impact on constructing resilient security architectures. Understand how intertwining hardware and software methodologies can result in enhanced and secure electronic solutions.
Towards a Robust, Effective, and Resource-Efficient Machine Learning Technique for IoT Security Monitoring-
Join us for a seminar by Dr. Idris Zakariyya, a renowned cybersecurity professional, as he delves into the challenges and solutions for employing Deep Neural Networks in IoT security monitoring.
It's more than just money: The real-world harms from ransomware attacks-
Join Nandita Pattnaik in a comprehensive exploration of the aftermath of ransomware attacks, revealing the intricate spectrum of damages that span beyond monetary losses.
Beyond Bytes and Bugs: Navigating the Human Side of Cybersecurity-
Join cybersecurity veteran Paul Baird as he delves beyond technicalities to unravel the humanistic aspects of cybersecurity, emphasizing the often-overlooked non-technical attributes crucial for success in the industry.