Presented in-person and onlne via Bluejeans Events on October 22, 2021 at 12:30 p.m in the CODA 9th floor atrium.Jonathan Fuller is a Ph.D. Student in the School of Electrical and Computer Engineering (ECE) at the Georgia Institute of Technology, advised by Dr. Brendan Saltaformaagio in the Cyber Forensics Innovation (CyFi) Lab. My research interests lie in cyber attack forensics, web and IoT security, and malware analysis. His current research aims to combine advanced program analysis techniques and large-scale measurements to explore new methods that target counteractions against botnets.Sena Sahin is a Ph.D. candidate in the School of Cybersecurity and Privacy at Georgia Tech.Carter Yagemann is a Ph.D. candidate in the Institute for Info...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
One of the most demanding challenges security programs have had to address in the last few years has...
In the contemporary digital era, Advanced Persistent Threat (APT) attacks are evolving, becoming inc...
Presented on February 24, 2017 at 12:00 p.m. in t he Klaus Advanced Computing Building, Room 1116W.M...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Cybersecurity has become one of the largest growing fields in computer science and the technology in...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., ...
Presented on August 29, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
Presented in-person and online via Bluejeans Events on October 1, 2021 at 12:30 p.m.William Robertso...
Many computer security problems stem from buggy software. Attackers exploit software bugs to infiltr...
Presented on January 27, 2017 at 12:00 p.m. in the Engineered Biosystems Building, room 1005.Phani V...
Presented on August 25, 2017 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116W.Joel...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech.B...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
One of the most demanding challenges security programs have had to address in the last few years has...
In the contemporary digital era, Advanced Persistent Threat (APT) attacks are evolving, becoming inc...
Presented on February 24, 2017 at 12:00 p.m. in t he Klaus Advanced Computing Building, Room 1116W.M...
As software becomes increasingly embedded in our daily lives, it becomes more and more critical to f...
Cybersecurity has become one of the largest growing fields in computer science and the technology in...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., ...
Presented on August 29, 2019 at 11:30 a.m.-1:00 p.m. in the Technology Square Research Building (TSR...
Presented in-person and online via Bluejeans Events on October 1, 2021 at 12:30 p.m.William Robertso...
Many computer security problems stem from buggy software. Attackers exploit software bugs to infiltr...
Presented on January 27, 2017 at 12:00 p.m. in the Engineered Biosystems Building, room 1005.Phani V...
Presented on August 25, 2017 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116W.Joel...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech.B...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
One of the most demanding challenges security programs have had to address in the last few years has...
In the contemporary digital era, Advanced Persistent Threat (APT) attacks are evolving, becoming inc...