Centers of Academic Excellence Tech Talk

About CAE Tech Talk

CAE Tech Talk is a live, online academic forum where members of the CAE in Cybersecurity Community give technical presentations on cybersecurity related topics to the rest of the CAE in Cybersecurity Community. All representatives from National Centers of Academic Excellence in Cybersecurity designated institutions (e.g., professors, students, and staff) can present a topic as well as government representatives.

CAE Tech Talks is taking a short break. Stay tuned for further updates regarding the rescheduled date and time, and thank you for your understanding.

The entire CAE in Cybersecurity Community is invited to attend the live presentation.

Disclaimer: All presentations/recordings on this page are the thoughts and opinions of the presenters and are not curated by the website moderators.

Tech Talks Recordings and Presentations

Tech Talks

Filter by Date
Date Title Recording Link Attachment
Thursday, November 17, 2022 Security of Heterogeneous Systems
Thursday, November 17, 2022 ReLF: Scalable Remote Live Forensics for Android
Thursday, October 20, 2022 A Metrics Driven Approach to Prioritizing Vulnerability Mitigation
Thursday, October 20, 2022 Security Patch Identification on Open-Source Software
Thursday, April 21, 2022 Symbolic Execution for the Win: Pwning CTFs with angr Payne_CAE Tech Talk_angr.pdf
Thursday, April 21, 2022 HE and ZKP: Privacy-Enhancing Technologies UD_HE_ZKP.pdf
Thursday, March 17, 2022 An Empirical Investigation of Static and Polymorphic Tactile Stimuli’s Effect on Habituation to Mitigate Cybersecurity Attacks 20220314_CotoLevy_CAETalk.pdf
Thursday, March 17, 2022 Automated Fast-flux Detection using Machine Learning and Genetic Algorithms CAE Tech Talk Dr. Aksoy.pdf
Thursday, February 17, 2022 The use of Labtainers cybersecurity lab exercises Labtainers-CAE-TechTalk.pdf
Thursday, February 17, 2022 Security of CAN bus in automobiles CANSentry-CAETechTalk-v5.pdf
Thursday, January 20, 2022 IDS Performance in Constrained Environments IDS performance in constrained environments.pdf
Thursday, January 20, 2022 Security Protection and Quality Control in Crowdsourcing WeipingPei_ChuanYue_Mines_CAE_TechTalk_Jan20_2022.pdf
Thursday, December 16, 2021 President’s Cup Cybersecurity Competition - Building a Competition Across the Federal Workforce PresCup_Post2021Comp_0.pdf
Thursday, December 16, 2021 AI and Cybersecurity: The Twain Shall Meet AI+Cyber2021_0.pdf
Thursday, November 18, 2021 Practical adversarial attack against speech recognition platforms AE for ASR.pdf
Thursday, November 18, 2021 Securing Cyber-Physical Systems by Platform Reboot MH_RT_Security_Reboot_CAE_Nov21.pdf
Thursday, October 21, 2021 A User-Oriented Approach and Tool for Security and Privacy Protection on the Web 2021.10.21-Phung_CAE-TechTalk.pdf
Thursday, October 21, 2021 Understanding How People with Upper Extremity Impairments Authenticate on their Personal Computing Devices Lewis_Tech_Talk_10_21.pdf
Thursday, September 16, 2021 An Introduction to Jump-Oriented Programming: An Alternative Code-Reuse Attack Bramwell Brizendine-NSA Tech Talk-Jump Oriented Programming.pdf
Thursday, September 16, 2021 Automated Software Vulnerability Detection with Deep Learning for Natural Language Processing TechTalk-SoftwareVulnerability_0.pdf
Thursday, May 20, 2021 Healthcare Virtualization Healthcare Virtualization.pdf
Thursday, May 20, 2021 Agent-based Modeling of Entity Behavior in Cyberspace CAE_Talk_Francia.pdf
Thursday, March 18, 2021 Electromagnetic Side-Channel Attacks and Potential Countermeasures
Thursday, March 18, 2021 Automotive Security - Trends, Problems, Solutions, and Future Work Bloom-UCCS-CAE-Tech-Talk-automotive-security.pdf
Thursday, February 18, 2021 Big Data in Cybersecurity NSA-Cheat_Combo-Feb2021.pdf
Thursday, February 18, 2021 Securing Software Supply Chains with in-toto
Thursday, December 17, 2020 What You See is NOT What You Get: Discovering & Tracking Ad-Driven Social Engineering Attack Campaigns
Thursday, December 17, 2020 Insecure, Unsafe, and Lying Software
Thursday, October 15, 2020 Cybermatics: A Penetration Testing Simulation for Novice Students
Thursday, September 17, 2020 Secure Data Container for Data Protection in Transit and at Rest
Thursday, March 19, 2020 Cybersecurity Centers to Support Hands-on Cybersecurity Education
Thursday, February 20, 2020 Reverse Engineering for Ethical Hackers RevEng for Ethical Hackers_CAE Tech Talk 20 Feb 2020_final.pdf
Thursday, November 14, 2019 Building Secure Software Systems Using Security EF-SecPattsCAE2019A.pdf
Thursday, November 14, 2019 Wireless and Mobile Softwarization: Security and Privacy Pandora’s Box NIETP CAE Tech Talk 2019.pdf
Thursday, October 17, 2019 Malware Analysis Using Machine Learning CAE-techtalk.pdf
Thursday, September 19, 2019 Dictionary Attacks on Biometric Systems ASU19.pdf
Thursday, September 19, 2019 Secure and Intelligent Smartphone App johnYoon_questPool19fCAEtalk.pdf
Thursday, May 16, 2019 Equifax Breach as Cybersecurity Case Study CAE-TechTalk-18APR19-EquifaxCaseStudy.pdf
Thursday, March 21, 2019 Deep and Dark Web TechTalk_Kohy_21March2019.pdf
Thursday, November 15, 2018 Car Hacking for Ethical Hackers Car Hacking CAE Tech Talk.pdf
Thursday, November 15, 2018 FR-WARD - Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things frward.pdf
Thursday, October 18, 2018 Open Source Intelligence in Cybersecurity OSINT_CAETECHTALK.pdf
Thursday, September 20, 2018 Architecture - Driven Penetration Testing against an Identity Access Management (IAM) System 2018-09-20 CAE Tech Talk - Sam Chung.pdf
Thursday, September 20, 2018 Teaching Cell Phone Texting Mechanism and Security
Thursday, May 17, 2018 White Hat Operations: Building an Effective Pen Testing Team NCATSCyberCon_WhiteHatOps_Thompson.pdf
Thursday, May 17, 2018 Cyberattack Forecasting using ARIMA with Intensity-based Regressors Cyberattack_Forecasting_ARIMA.pdf
Thursday, April 19, 2018 Apache Metron and Apache Spot – Big Data Tools for Cybersecurity Apache_Metron.pdf
Thursday, March 15, 2018 The PyPy Sandbox The PyPy Sandbox 20180308.pdf
Thursday, February 15, 2018 From Malware Analysis to Suricata Signatures - How to Defend your Networks
Thursday, January 25, 2018 How to test a Network Investigative Technique(NIT) NIT-TechTalk.pdf