The following list of posts is filtered
Clear Filter
Posts
With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...
April 11, 2022
·
3:30 PM
With developments in quantum computers and algorithms, quantum-resistant key exchange protocols are needed to replace our existing vulnerable protocols The UMBC Cyber Defense Lab presents...
April 11, 2022
·
3:30 PM
Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session The UMBC Cyber Defense Lab presents A Formal Methods...
March 27, 2022
·
10:09 PM
Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session The UMBC Cyber Defense Lab presents A Formal Methods...
March 27, 2022
·
10:09 PM
Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session The UMBC Cyber Defense Lab presents A Formal...
March 27, 2022
·
10:09 PM
The UMBC Cyber Defense Lab presents CyMOT: Cybersecurity Training for Operational Technology in Manufacturing Nilanjan Banerjee, UMBC CSEE 12-1 pm Friday, 18 March 2022, via WebEx The...
March 15, 2022
·
12:10 PM
The UMBC Cyber Defense Lab presents Voting Technology Ted Selker Research Professor UMBC CSEE Department 12–1 ET Friday, 4 March 2022 via WebEx Traditionally most votes are lost in...
March 1, 2022
·
12:47 PM
The UMBC Cyber Defense Lab presents Context, a Red Flag, or Both? Users’ Preferences for Enhanced Misinformation Warnings on Twitter Prof. Filipo Sharevski Adversarial Cybersecurity Automation...
January 30, 2022
·
5:22 PM
ArtIAMAS Seminar Series, Co-organized by UMBC, UMCP, and the Army Research Lab Building Resilience against Cyberattacks Aryya Gangopadhyay, UMBC 12-1 PM ET Wednesday, 15 December 15, 2021...
December 9, 2021
·
4:05 PM
Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. The UMBC Cyber Defense Lab presents Shadow IT in...
November 28, 2021
·
9:06 PM