Event Category: External Presentation (External Speaker)

Protecting privacy through metadata analysis

Metadata, or ‘data about data’ can be a rich source of details and context, revealing information about a user even...

Read more arrow_right_alt

Swarm Robotics: a new “swiss knife” framework for designing, modeling, and experimenting with networks

Swarm Robotics (SR) is a fast-growing field that studies the behavior of large, networked groups of autonomous agents. Due to...

Read more arrow_right_alt

Data-driven Approaches for Assessing the Security and Privacy of Digital Infrastructures

Modern internet applications are complex software artifacts, hosted on multiple infrastructures that rely on one another to provide proper functionality....

Read more arrow_right_alt

Graph reconstruction in the congested clique

The congested clique model is a message-passing model of distributed computing where the underlying communication network is the complete graph...

Read more arrow_right_alt

Path Aware QoS Systems

Path Aware Networking (PAN) allows us to look at existing solutions from a different perspective. For QoS architectures, one of...

Read more arrow_right_alt

What we measure when we measure

In this talk, we will show the importance of knowing the context and the good use of mathematics and statistics...

Read more arrow_right_alt

A decade of IoT/embedded firmware security - a vision stretching from large-scale offensive analysis to scalable defensive techniques

Firmware is at the heart and core of any (I)IoT/embedded system and device. Firmware is essentially software, and time and...

Read more arrow_right_alt

Building Smart and Fast Systems using Machine Learning and Computer Vision

Nowadays, computing platforms use a mix of different hardware technologies, to scale application performance, resource capacities and achieve cost effectiveness....

Read more arrow_right_alt

Cybersecurity and Privacy Law for Smart Products and related Digital Marketing: US and EU Perspectives

Smart product innovation is having a huge impact in today’s world.  Smart products, broadly construed, find themselves in the homes...

Read more arrow_right_alt

Towards Improving Code Stylometry Analysis in Underground Forums

Code Stylometry has emerged as a powerful mechanism to identify programmers.While there have been significant advances in the field, existing...

Read more arrow_right_alt

Recent Comments

    Archives

    Categories