News
-
Enhancing Security in Industrial Control Systems with SDN/NFVVijay Varadharajan, Uday Tupakula, and Kallol Krishna Karmakar's recent publication, Techniques for Enhancing Security in Industrial Control Systems (ACM Trans. Cyber-Phys.
-
"New Algorithms Increase the Privacy of Sensitive Data"Saloni Kwatra, a doctoral student at Umea University, has identified flaws in the technology known as "federated learning" or "collaborative learning" and developed new algorithms to bolster user security.
-
"Researchers Eye 'Topological Signatures' of Cyber Threats"Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures.
-
"New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, includ
-
"Secure Messaging Through Distributed Messages"Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels.
-
"Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
-
"Security in Quantum Computing"Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.
-
"Health Monitoring Devices at Risk of Being Hacked, Study Shows"Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr.
-
"The Sherlock Holmes of AI"Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determin
-
"Cybersecurity and Privacy Institute Secures $1.5M in Funding"Researchers at the University of Waterloo's Cybersecurity and Privacy Institute (CPI) will receive over $1.5 million in funding from the National Cybersecurity Consortium (NCC) to advance digital security in Canada.
-
"CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"The student-led program "CodeHoppers," sponsored by Augusta University's (AU) School of Computer and Cyber Sciences, is returning.