About CAE Tech Talk
CAE Tech Talk is a live, online academic forum where members of the CAE in Cybersecurity Community give technical presentations on cybersecurity related topics to the rest of the CAE in Cybersecurity Community. All representatives from National Centers of Academic Excellence in Cybersecurity designated institutions (e.g., professors, students, and staff) can present a topic as well as government representatives.
CAE Tech Talks is taking a short break. Stay tuned for further updates regarding the rescheduled date and time, and thank you for your understanding.
The entire CAE in Cybersecurity Community is invited to attend the live presentation.
Disclaimer: All presentations/recordings on this page are the thoughts and opinions of the presenters and are not curated by the website moderators.
Join Us on Zoom!
Tech Talks Recordings and Presentations
Tech Talks
Date | Title | Recording Link | Attachment |
---|---|---|---|
Thursday, November 17, 2022 | Security of Heterogeneous Systems | Video Link | |
Thursday, November 17, 2022 | ReLF: Scalable Remote Live Forensics for Android | Video Link | |
Thursday, October 20, 2022 | A Metrics Driven Approach to Prioritizing Vulnerability Mitigation | Video Link | |
Thursday, October 20, 2022 | Security Patch Identification on Open-Source Software | Video Link | |
Thursday, April 21, 2022 | Symbolic Execution for the Win: Pwning CTFs with angr | Payne_CAE Tech Talk_angr.pdf | |
Thursday, April 21, 2022 | HE and ZKP: Privacy-Enhancing Technologies | UD_HE_ZKP.pdf | |
Thursday, March 17, 2022 | An Empirical Investigation of Static and Polymorphic Tactile Stimuli’s Effect on Habituation to Mitigate Cybersecurity Attacks | 20220314_CotoLevy_CAETalk.pdf | |
Thursday, March 17, 2022 | Automated Fast-flux Detection using Machine Learning and Genetic Algorithms | CAE Tech Talk Dr. Aksoy.pdf | |
Thursday, February 17, 2022 | The use of Labtainers cybersecurity lab exercises | Video Link | Labtainers-CAE-TechTalk.pdf |
Thursday, February 17, 2022 | Security of CAN bus in automobiles | Video Link | CANSentry-CAETechTalk-v5.pdf |
Thursday, January 20, 2022 | IDS Performance in Constrained Environments | Video Link | IDS performance in constrained environments.pdf |
Thursday, January 20, 2022 | Security Protection and Quality Control in Crowdsourcing | Video Link | WeipingPei_ChuanYue_Mines_CAE_TechTalk_Jan20_2022.pdf |
Thursday, December 16, 2021 | President’s Cup Cybersecurity Competition - Building a Competition Across the Federal Workforce | Video Link | PresCup_Post2021Comp_0.pdf |
Thursday, December 16, 2021 | AI and Cybersecurity: The Twain Shall Meet | Video Link | AI+Cyber2021_0.pdf |
Thursday, November 18, 2021 | Practical adversarial attack against speech recognition platforms | Video Link | AE for ASR.pdf |
Thursday, November 18, 2021 | Securing Cyber-Physical Systems by Platform Reboot | Video Link | MH_RT_Security_Reboot_CAE_Nov21.pdf |
Thursday, October 21, 2021 | A User-Oriented Approach and Tool for Security and Privacy Protection on the Web | Video Link | 2021.10.21-Phung_CAE-TechTalk.pdf |
Thursday, October 21, 2021 | Understanding How People with Upper Extremity Impairments Authenticate on their Personal Computing Devices | Video Link | Lewis_Tech_Talk_10_21.pdf |
Thursday, September 16, 2021 | An Introduction to Jump-Oriented Programming: An Alternative Code-Reuse Attack | Video Link | Bramwell Brizendine-NSA Tech Talk-Jump Oriented Programming.pdf |
Thursday, September 16, 2021 | Automated Software Vulnerability Detection with Deep Learning for Natural Language Processing | Video Link | TechTalk-SoftwareVulnerability_0.pdf |
Thursday, May 20, 2021 | Healthcare Virtualization | Video Link | Healthcare Virtualization.pdf |
Thursday, May 20, 2021 | Agent-based Modeling of Entity Behavior in Cyberspace | Video Link | CAE_Talk_Francia.pdf |
Thursday, March 18, 2021 | Electromagnetic Side-Channel Attacks and Potential Countermeasures | Video Link | |
Thursday, March 18, 2021 | Automotive Security - Trends, Problems, Solutions, and Future Work | Video Link | Bloom-UCCS-CAE-Tech-Talk-automotive-security.pdf |
Thursday, February 18, 2021 | Big Data in Cybersecurity | Video Link | NSA-Cheat_Combo-Feb2021.pdf |
Thursday, February 18, 2021 | Securing Software Supply Chains with in-toto | Video Link | |
Thursday, December 17, 2020 | What You See is NOT What You Get: Discovering & Tracking Ad-Driven Social Engineering Attack Campaigns | Video Link | |
Thursday, December 17, 2020 | Insecure, Unsafe, and Lying Software | Video Link | |
Thursday, October 15, 2020 | Cybermatics: A Penetration Testing Simulation for Novice Students | Video Link | |
Thursday, September 17, 2020 | Secure Data Container for Data Protection in Transit and at Rest | Video Link | |
Thursday, March 19, 2020 | Cybersecurity Centers to Support Hands-on Cybersecurity Education | Video Link | |
Thursday, February 20, 2020 | Reverse Engineering for Ethical Hackers | Video Link | RevEng for Ethical Hackers_CAE Tech Talk 20 Feb 2020_final.pdf |
Thursday, November 14, 2019 | Building Secure Software Systems Using Security | Video Link | EF-SecPattsCAE2019A.pdf |
Thursday, November 14, 2019 | Wireless and Mobile Softwarization: Security and Privacy Pandora’s Box | Video Link | NIETP CAE Tech Talk 2019.pdf |
Thursday, October 17, 2019 | Malware Analysis Using Machine Learning | CAE-techtalk.pdf | |
Thursday, September 19, 2019 | Dictionary Attacks on Biometric Systems | Video Link | ASU19.pdf |
Thursday, September 19, 2019 | Secure and Intelligent Smartphone App | Video Link | johnYoon_questPool19fCAEtalk.pdf |
Thursday, May 16, 2019 | Equifax Breach as Cybersecurity Case Study | Video Link | CAE-TechTalk-18APR19-EquifaxCaseStudy.pdf |
Thursday, March 21, 2019 | Deep and Dark Web | Video Link | TechTalk_Kohy_21March2019.pdf |
Thursday, November 15, 2018 | Car Hacking for Ethical Hackers | Video Link | Car Hacking CAE Tech Talk.pdf |
Thursday, November 15, 2018 | FR-WARD - Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things | Video Link | frward.pdf |
Thursday, October 18, 2018 | Open Source Intelligence in Cybersecurity | Video Link | OSINT_CAETECHTALK.pdf |
Thursday, September 20, 2018 | Architecture - Driven Penetration Testing against an Identity Access Management (IAM) System | Video Link | 2018-09-20 CAE Tech Talk - Sam Chung.pdf |
Thursday, September 20, 2018 | Teaching Cell Phone Texting Mechanism and Security | Video Link | |
Thursday, May 17, 2018 | White Hat Operations: Building an Effective Pen Testing Team | Video Link | NCATSCyberCon_WhiteHatOps_Thompson.pdf |
Thursday, May 17, 2018 | Cyberattack Forecasting using ARIMA with Intensity-based Regressors | Video Link | Cyberattack_Forecasting_ARIMA.pdf |
Thursday, April 19, 2018 | Apache Metron and Apache Spot – Big Data Tools for Cybersecurity | Video Link | Apache_Metron.pdf |
Thursday, March 15, 2018 | The PyPy Sandbox | Video Link | The PyPy Sandbox 20180308.pdf |
Thursday, February 15, 2018 | From Malware Analysis to Suricata Signatures - How to Defend your Networks | Video Link | |
Thursday, January 25, 2018 | How to test a Network Investigative Technique(NIT) | Video Link | NIT-TechTalk.pdf |