The following list of posts is filtered
Clear Filter
Posts
UMBC CIO Jack Suess interviewed on CyberTalk podcast UMBC alumnus Mike Shelah (’95) interviewed UMBC’s CIO Jack Seuss on his CyberTalk podcast about how the University addresses evolving...
May 8, 2022
·
1:53 PM
UMBC CIO Jack Suess interviewed on CyberTalk podcast UMBC alumnus Mike Shelah (’95) interviewed UMBC’s CIO Jack Seuss on his CyberTalk podcast about how the University addresses evolving...
May 8, 2022
·
1:53 PM
UMBC CIO Jack Suess interviewed on CyberTalk podcast UMBC alumnus Mike Shelah (’95) interviewed UMBC’s CIO Jack Seuss on his CyberTalk podcast about how the University addresses evolving...
May 8, 2022
·
1:53 PM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...
April 28, 2022
·
9:57 AM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...
April 28, 2022
·
9:57 AM
The UMBC Cyber Defense Lab presents Model Validation for DARPA DPRIVE Ian Blumenfeld UMBC and Two Six Technologies (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul...
April 28, 2022
·
9:57 AM
Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks. UMBC researchers publish book on Cybersecurity and Local...
April 17, 2022
·
3:34 PM
Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks. UMBC researchers publish book on Cybersecurity and Local...
April 17, 2022
·
3:34 PM
Local governments are particularly enticing soft targets, often lacking resources to defend themselves against routine cyberattacks. UMBC researchers publish book on Cybersecurity and...
April 17, 2022
·
3:34 PM
Session Binding Proxy protocol aims to prevent session hijacking by binding the application session to the underlying network session The UMBC Cyber Defense Lab presents A Formal Methods...
March 27, 2022
·
10:09 PM