Page 3 of 2521 to 30 of 248 Past Events
2023
November
-
Expressive Automated Planning via Satisfiability Modulo Theories
-Planning is a fundamental activity, impacting our daily lives in many and varied ways. The planning task consists of selecting a sequence of actions to achieve a specified goal from specified starting conditions. This type of problem arises frequently in many contexts. Consider, for example, holiday planning. Various interleaved elements...
-
Wearable Activity Trackers and Privacy: Assessment of the Risks, Threats, and Countermeasures
-Join us for an enlightening session with Dr. NoƩ Zufferey, postdoctoral fellow at the University of Lausanne as he delves into the privacy threats related to the use of wearable activity trackers.
-
Uncovering Implicit Inferences for Improved Relational Argument Mining
-Argument mining seeks to extract arguments and their structure from unstructured texts. Identifying relations between arguments (such as attack, support, and neutral) is a challenging task because two arguments may be related to each other via implicit inferences. This task often requires external commonsense knowledge to discover how one argument...
-
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation
-Join Chao Feng from the University of Zurich as he unveils the CyberForce framework, a novel approach in malware mitigation for IoT devices using federated reinforcement learning.
-
HW/SW Co-design for Security Systems
-Tune in to our online seminar with Huimin Li from Delft University of Technology, Netherlands. Unpack the details of HW/SW co-design and its impact on constructing resilient security architectures. Understand how intertwining hardware and software methodologies can result in enhanced and secure electronic solutions.
-
Lecture: Animal Venoms - Friend or Foe?
-This lecture will be delivered by Dr Wael Houssen and Dr Soumya Palliyil and followed by a reception.
-
Towards a Robust, Effective, and Resource-Efficient Machine Learning Technique for IoT Security Monitoring
-Join us for a seminar by Dr. Idris Zakariyya, a renowned cybersecurity professional, as he delves into the challenges and solutions for employing Deep Neural Networks in IoT security monitoring.
October
-
It's more than just money: The real-world harms from ransomware attacks
-Join Nandita Pattnaik in a comprehensive exploration of the aftermath of ransomware attacks, revealing the intricate spectrum of damages that span beyond monetary losses.
-
Beyond Bytes and Bugs: Navigating the Human Side of Cybersecurity
-Join cybersecurity veteran Paul Baird as he delves beyond technicalities to unravel the humanistic aspects of cybersecurity, emphasizing the often-overlooked non-technical attributes crucial for success in the industry.
-
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery
-Join Amir Rafi as he delves into the intricate world of Digital Rights Management (DRM) systems on mobile platforms, offering a comprehensive security assessment of major DRM technologies in the era of cloud-based content delivery.