Centers of Academic Excellence Tech Talk

About CAE Tech Talk

CAE Tech Talk is a live, online academic forum where members of the CAE in Cybersecurity Community give technical presentations on cybersecurity related topics to the rest of the CAE in Cybersecurity Community. All representatives from National Centers of Academic Excellence in Cybersecurity designated institutions (e.g., professors, students, and staff) can present a topic as well as government representatives.

CAE Tech Talks are normally held on the third Thursday of each month during the Fall and Spring semesters.

The entire CAE in Cybersecurity Community is invited to attend the live presentation.

Disclaimer: All presentations/recordings on this page are the thoughts and opinions of the presenters and are not curated by the website moderators.

Tech Talks Recordings and Presentations

Date Title Recording Link Attachment
Thursday, October 21, 2021 A User-Oriented Approach and Tool for Security and Privacy Protection on the Web 2021.10.21-Phung_CAE-TechTalk.pdf
Thursday, October 21, 2021 Understanding How People with Upper Extremity Impairments Authenticate on their Personal Computing Devices Lewis_Tech_Talk_10_21.pdf
Thursday, September 16, 2021 An Introduction to Jump-Oriented Programming: An Alternative Code-Reuse Attack Bramwell Brizendine-NSA Tech Talk-Jump Oriented Programming.pdf
Thursday, September 16, 2021 Automated Software Vulnerability Detection with Deep Learning for Natural Language Processing TechTalk-SoftwareVulnerability_0.pdf
Thursday, May 20, 2021 Healthcare Virtualization Healthcare Virtualization.pdf
Thursday, May 20, 2021 Agent-based Modeling of Entity Behavior in Cyberspace CAE_Talk_Francia.pdf
Thursday, March 18, 2021 Electromagnetic Side-Channel Attacks and Potential Countermeasures
Thursday, March 18, 2021 Automotive Security - Trends, Problems, Solutions, and Future Work Bloom-UCCS-CAE-Tech-Talk-automotive-security.pdf
Thursday, February 18, 2021 Big Data in Cybersecurity NSA-Cheat_Combo-Feb2021.pdf
Thursday, February 18, 2021 Securing Software Supply Chains with in-toto
Thursday, December 17, 2020 What You See is NOT What You Get: Discovering & Tracking Ad-Driven Social Engineering Attack Campaigns
Thursday, December 17, 2020 Insecure, Unsafe, and Lying Software
Thursday, October 15, 2020 Cybermatics: A Penetration Testing Simulation for Novice Students
Thursday, September 17, 2020 Secure Data Container for Data Protection in Transit and at Rest
Thursday, March 19, 2020 Cybersecurity Centers to Support Hands-on Cybersecurity Education
Thursday, February 20, 2020 Reverse Engineering for Ethical Hackers RevEng for Ethical Hackers_CAE Tech Talk 20 Feb 2020_final.pdf
Thursday, November 14, 2019 Building Secure Software Systems Using Security EF-SecPattsCAE2019A.pdf
Thursday, November 14, 2019 Wireless and Mobile Softwarization: Security and Privacy Pandora’s Box NIETP CAE Tech Talk 2019.pdf
Thursday, October 17, 2019 Malware Analysis Using Machine Learning CAE-techtalk.pdf
Thursday, September 19, 2019 Dictionary Attacks on Biometric Systems ASU19.pdf
Thursday, September 19, 2019 Secure and Intelligent Smartphone App johnYoon_questPool19fCAEtalk.pdf
Thursday, May 16, 2019 Equifax Breach as Cybersecurity Case Study CAE-TechTalk-18APR19-EquifaxCaseStudy.pdf
Thursday, March 21, 2019 Deep and Dark Web TechTalk_Kohy_21March2019.pdf
Thursday, November 15, 2018 Car Hacking for Ethical Hackers Car Hacking CAE Tech Talk.pdf
Thursday, November 15, 2018 FR-WARD - Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things frward.pdf
Thursday, October 18, 2018 Open Source Intelligence in Cybersecurity OSINT_CAETECHTALK.pdf
Thursday, September 20, 2018 Architecture - Driven Penetration Testing against an Identity Access Management (IAM) System 2018-09-20 CAE Tech Talk - Sam Chung.pdf
Thursday, September 20, 2018 Teaching Cell Phone Texting Mechanism and Security
Thursday, May 17, 2018 White Hat Operations: Building an Effective Pen Testing Team NCATSCyberCon_WhiteHatOps_Thompson.pdf
Thursday, May 17, 2018 Cyberattack Forecasting using ARIMA with Intensity-based Regressors Cyberattack_Forecasting_ARIMA.pdf
Thursday, April 19, 2018 Apache Metron and Apache Spot – Big Data Tools for Cybersecurity Apache_Metron.pdf
Thursday, March 15, 2018 The PyPy Sandbox The PyPy Sandbox 20180308.pdf
Thursday, February 15, 2018 From Malware Analysis to Suricata Signatures - How to Defend your Networks
Thursday, January 25, 2018 How to test a Network Investigative Technique(NIT) NIT-TechTalk.pdf