Talk: Formal Methods or Usable Security: Why Not Both?
McKenna McCall, 11:45 ET, Monday, Feb 17, ITE325
Formal Methods or Usable Security: Why Not Both? McKenna McCall, CMU 11:45-12:45 Monday, Feb 17, UMBC ITE 325 and online Formal methods research involves using mathematical techniques to...
Posted: February 16, 2025, 9:19 AM

Talk: Unveiling Privacy Risks in AI: Data, Models, and Systems
11:30-12:30 Friday, February 14 in ITE325b and online
Shengwei An will give a talk on Unveiling Privacy Risks in AI: Data, Models, & Systems, 11:30-12:30 Friday, February 14 in ITE325b and online. Artificial Intelligence has become deeply...
Posted: February 14, 2025, 9:36 AM
Talk: Do LLMs Exhibit Cybersecurity Misconceptions? 1/31 online
Evaluation of LLMs on CCI and CCA examinations
Do LLMs Show Cybersecurity Misconceptions? Evaluation of LLMs Performance on Cybersecurity Concept Inventories Shan Huang, UIUC Joint work with Jeffrey Herman and Alan Sherman, et al....
Posted: January 29, 2025, 8:42 AM

CodeBot'25 Workshop: Can We Trust AI-Generated Code?
Workshop Feb. 25-26, 2025 in Columbia, MD and online
Can We Trust AI-Generated Code? Workshop sponsored by UMBC & Army Research Laboratory Feb. 25-26, 2025 UMBC Training Centers, Columbia, MD & online position paper deadline extended...
Posted: January 7, 2025, 5:22 PM

6th International Country-to-Country Capture the Flag Competition
Students register by February 1, 2025
The International Cyber Security Center of Excellence and Northeastern University invite students to participate in the 6th International Country-to-Country (C2C) Capture the Flag (CTF)...
Posted: December 22, 2024, 10:58 AM

Salt Typhoon and its attacks on US telecommunications networks
UMBC’s Dr. Richard Forno describes Salt Typhoon, the Chinese threat actor group, and its recent attack on US telecommunications networks in an article in the latest issue of UMBC Magazine. Sen....
Posted: December 12, 2024, 6:54 PM

CodeBot '25: Can We Trust AI-Generated Code? 2/25-26
Workshop Feb. 25-26, 2025 in Columbia, MD and online
Can We Trust AI-Generated Code? Workshop sponsored by UMBC & Army Research Laboratory Feb. 25-26, 2025 UMBC Training Centers, Columbia, MD & online The era of generative AI is upon us,...
Posted: December 12, 2024, 1:16 PM
AI Lunchbox: Security Risk in AI/ML, 12/12
12:00-1:00 pm EST, Thursday, December 12, 2024
In the AI Lunchbox session Security Risk in AI/ML, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach...
Posted: December 12, 2024, 11:05 AM

Talk: Privacy-Preserving Data Sharing in Intrusion Detection Systems, 12/6 online
12–1pm EST Friday, December 6, 2024, online
UMBC Cyber Defense Lab presents Privacy-Preserving Data Sharing in Intrusion Detection Systems Zhiyuan Chen Professor and Chair, UMBC Information Systems Department 12:00–1pm, Friday, December...
Posted: November 29, 2024, 5:28 PM

CMSC-491/691 Cybersecurity Research (INSuRE), Fall 2024
In fall 2024, UMBC will offer the cybersecurity research course CMSC-491/691 Special Topics in Computer Science: Cybersecurity Research (INSuRE). Professor Alan Sherman will teach it Tues/Thurs...
Posted: April 1, 2024, 6:03 PM
- Go to page 1
- Go to page 2
- Go to page 3
- …
- Go to page 16