News
Phishing remains a critical cyber threat, with traditional ML-based detection models relying on grammatical errors and word anomalies as key indicators. However, LLM-generated phishing emails are well ...
Intent based networking (IBN) is a high-level network configuration concept that allows network operators to use high-level intents instead of complex low-level details. We found there are ...
Rehosting is the process of porting a physical device to run in software. By rehosting operational technology (OT) devices, we are able to perform cyber analysis on critical infrastructure to protect ...
Significant advancements in traffic control systems, such as integration with sensing and communication technologies, have led to increased system complexity. While these developments offer ...
'Pedohunters' pose as children online to catch adults soliciting minors. They often upload confrontation videos with those solicitors. Research shows mixed public reactions to pedohunter content.
This talk explores how the principles and practices of the American public health system can inform and enhance modern cybersecurity strategies. Drawing on insights from our recent CRA Quad Paper, we ...
If you have any ideas or comments for this site, please share them with us. User feedback helps us keep the hotlist current, comprehensive and easy to use so please let us know what you're thinking.
Our poster session will be held in the PMU Ballroom on Tuesday, April 1st from 6:30pm-9:00pm.
The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the ...
The goal of this project is to help software engineers incorporate the lessons learned from prior failures throughout the software development lifecycle. Since all engineered systems fail, one ...
Dr. Aarushi Goel is an Assistant Professor in the Computer Science department at Purdue University. Before joining Purdue, she was a postdoc in the CIS Lab at NTT Research, where she worked under the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results