CAE Tech Talk is a live, real-time, online, academic forum where members of the CAE community give technical presentations on cyber-security related topics to the rest of the CAE community. We are a warm group of people that want to share knowledge with each other. Anyone in the CAE Community (professors, students, government members) can present a topic.
CAE Tech Talks are normally held on the third Thursday of each month during the Fall and Spring semesters.
The entire CAE community is invited to attend the live presentation.
|Date||Tech Talk||Recording Link||Attachment|
|Thursday, October 17, 2019||Malware Analysis Using Machine Learning||CAE-techtalk.pdf|
|Thursday, September 19, 2019||Dictionary Attacks on Biometric Systems||ASU19.pdf|
|Thursday, September 19, 2019||Secure and Intelligent Smartphone App||johnYoon_questPool19fCAEtalk.pdf|
|Thursday, May 16, 2019||Equifax Breach as Cybersecurity Case Study|
|Thursday, March 21, 2019||Deep and Dark Web||TechTalk_Kohy_21March2019.pdf|
|Thursday, November 15, 2018||Car Hacking for Ethical Hackers||Car Hacking CAE Tech Talk.pdf|
|Thursday, November 15, 2018||FR-WARD - Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things||frward.pdf|
|Thursday, October 18, 2018||Open Source Intelligence in Cybersecurity||OSINT_CAETECHTALK.pdf|
|Thursday, September 20, 2018||Architecture - Driven Penetration Testing against an Identity Access Management (IAM) System||2018-09-20 CAE Tech Talk - Sam Chung.pdf|
|Thursday, September 20, 2018||Teaching Cell Phone Texting Mechanism and Security|
|Thursday, May 17, 2018||White Hat Operations: Building an Effective Pen Testing Team||NCATSCyberCon_WhiteHatOps_Thompson.pdf|
|Thursday, May 17, 2018||Cyberattack Forecasting using ARIMA with Intensity-based Regressors||Cyberattack_Forecasting_ARIMA.pdf|
|Thursday, April 19, 2018||Apache Metron and Apache Spot – Big Data Tools for Cybersecurity||Apache_Metron.pdf|
|Thursday, March 15, 2018||The PyPy Sandbox||The PyPy Sandbox 20180308.pdf|
|Thursday, February 15, 2018||From Malware Analysis to Suricata Signatures - How to Defend your Networks|
|Thursday, January 25, 2018||How to test a Network Investigative Technique(NIT)||NIT-TechTalk.pdf|