Page 1 of 11 to 7 of 7 Events
-
High-Profile Data Breach: An In-Depth Analysis of Crypto-Wallet Case.
-Join us for an enlightening session with Assistant Professor Svetlana Abramova as she delves into the repercussions of a data breach on crypto-wallet users. Discover key findings, challenges, and valuable lessons from this real-life incident.
-
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery
-Join Amir Rafi as he delves into the intricate world of Digital Rights Management (DRM) systems on mobile platforms, offering a comprehensive security assessment of major DRM technologies in the era of cloud-based content delivery.
-
Beyond Bytes and Bugs: Navigating the Human Side of Cybersecurity
-Join cybersecurity veteran Paul Baird as he delves beyond technicalities to unravel the humanistic aspects of cybersecurity, emphasizing the often-overlooked non-technical attributes crucial for success in the industry.
-
It's more than just money: The real-world harms from ransomware attacks
-Join Nandita Pattnaik in a comprehensive exploration of the aftermath of ransomware attacks, revealing the intricate spectrum of damages that span beyond monetary losses.
-
Towards a Robust, Effective, and Resource-Efficient Machine Learning Technique for IoT Security Monitoring
-Join us for a seminar by Dr. Idris Zakariyya, a renowned cybersecurity professional, as he delves into the challenges and solutions for employing Deep Neural Networks in IoT security monitoring.
-
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation
-Join Chao Feng from the University of Zurich as he unveils the CyberForce framework, a novel approach in malware mitigation for IoT devices using federated reinforcement learning.
-
Modelling Extortion Attacks in Cryptocurrencies: Insights into Ethereum Validator Vulnerabilities
-Dive into an academic exploration of how ransomware gangs might target cryptocurrencies, with Dr. Darren Hurley-Smith unveiling a unique extortion attack model concerning Ethereum Validators. This seminar encapsulates a research-driven take on a recent Conversation article, supplemented with mitigation strategies.