Security and Privacy

Available Speakers on this Topic

Haider Abbas – Islamabad, Pakistan

Mohiuddin Ahmed – Perth, WN, Australia

Rizwan Ahmed – Nagpur, India

Mohiuddin Ahmed – Perth, WN, Australia

Mohammed M. Alani – Mississauga, ON, Canada

  • How can we trust AI in Cybersecurity?
    With the cybersecurity market exceeding 50USD billion, are organizations doing enough to stops the rapid increase in attacks? The trends and the success rates of the attacks suggest...
  • How safe is your AI application?
    The rapid growth in adopting artificial intelligence in different aspects of life has made it an interesting target to malicious actors. The growth in investments in artificial intelligence should...

Mamoun Alazab – Bayview, ACT, Australia

Parameshachari B D – Karnataka, India

Federico Cerutti – Brescia, Italy

Abbas Cheddad – Karlskrona, Sweden

  • Digital Image Forensics
    With the development of information technology and the availability of image acquisition and editing
    tools, the use of these devices has become within a reach to everyone....

Aswani Kumar Cherukuri – Vellore, India

  • Exploring Blockchain Technology
    Blockchain is a distributed ledger technology that maintains verifiable records with protection against malicious modifications and with Byzantine fault tolerance.   This...

Kim-Kwang Raymond Choo – San Antonio, TX, United States

Ashutosh Dutta – Laurel, MD, United States

Josiah Dykstra – Severn, MD, United States

  • American Self-Defense in Cyberspace
    The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
  • Getting Started with Cybersecurity Science
    This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...

Francesco Flammini – Västerås, Sweden

Swaroop Ghosh – State College, PA, United States

Gernot Heiser – Sydney, NSW, Australia

  • Making Trusted Systems Trustworthy
    We trust computer systems all the time: with our money, our sensitive private data, our critical infrastructure and, in the age of autonomous vehicles, increasingly with our lives. Yet...

Celestine Iwendi – Uppsala, Sweden

Latifur Rahman Khan – Plano, TX, United States

Charalambos Konstantinou – Jeddah, Saudi Arabia

Weizhi Meng – Copenhagen, Denmark

Mehdi Mirakhorli – Rochester, NY, United States

  • Secure by Design
    Secure by design is an approach to developing secure software systems from the ground up.  In such an approach,  the alternate security controls and design decisions are first thought;...

Sanjay Misra – Lagos, Nigeria

David Mohaisen – Orlando, FL, United States

Nour Moustafa – Canberra, ACT, Australia

Zeeshan Pervez – Paisley, United Kingdom

Junaid Qadir – Doha, Qatar

  • Secure and Robust Machine Learning for Healthcare
    Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the...

Danda B Rawat – Washington, DC, United States

Shishir Kumar Shandilya – Bhopal, India

RK Shyamasundar – Mumbai, India

Biplab Sikdar – Singapore, Singapore

Madhusudan Singh – Daejeon, Republic of Korea

Nicolas Sklavos – Patra, Greece

Yan Solihin – Orlando, FL, United States

Gaurav Somani – Ajmer, India

  • Advanced Persistent Threats: Incidents and road ahead
    In this talk, we discuss the upcoming cyber security threat, advanced persistent threat (APT) which is very hard to detect due to its zero-day nature. Zero-day vulnerabilities do not get detected...
  • Cloud and Virtualization: Inception, Reality and Usage
    In this talk, we give a practical overview of cloud computing infrastructures and virtualization technology. This involves, discussion related to server consolidation, formal model of a virtual...
  • DDoS Attack Space in Cloud Computing
    In this talk, we will get to understand one of the important security breaches in modern networks, DDoS (distributed denial of service) attack and its impact on emerging cloud computing...
  • Security Engineering: Overview and Directions
    In this talk, we discuss an important field of cyber security solution space where we strive to design security solutions by keeping a number of aspects in mind. Security Engineering is a...

Houbing Song – Baltimore, MD, United States

Gautam Srivastava – Brandon, MB, Canada

Shamik Sural – Kharagpur, India

Daniel Takabi – ATLANTA, GA, United States

  • Secure Privacy preserving Machine Learning
    Deep learning with neural networks has become a highly popular machine learning method due to recent breakthroughs in computer vision, speech recognition, and other areas. However, the deep...

Stefano Zanero – Milano, Italy