NavTalks

From Navigators

(Difference between revisions)
Jump to: navigation, search
Line 185: Line 185:
<table border="0" cellspacing="0"  style="background:#89B085">
<table border="0" cellspacing="0"  style="background:#89B085">
<tr>
<tr>
-
<td>27/03</td> <td>Andr&eacute; Oliveira</td>
+
<td style="width:100px">27/03</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Nuno Dion&iacute;sio</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.
 +
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.
 +
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).
 +
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>27/03</td> <td>Nuno Dion&iacute;sio</td>
+
<td style="width:300px">Fernando Ramos</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!
-
<td>&nbsp;</td>
+
">My network protocol is better than yours!</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
</table>
</table>
Line 224: Line 229:
-
<!--  
+
<!-- Andr&eacute; Oliveira????????? ###############################################################
###########################################################
###########################################################
############## UPCOMING  PRESENTATIONS#####################
############## UPCOMING  PRESENTATIONS#####################

Revision as of 22:50, 7 May 2019

The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.

Leave mouse over title's presentation to read the abstract.


Contents

Past presentations

September 2018

20 Alysson Bessani SMaRtChain: A Principled Design for a New Generation of Blockchains  
20 Rui Miguel Named Data Networking with Programmable Switches  

October 2018

4 Bruno Vavala (Research Scientist in Intel Labs) Private Data Objects  
4 Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) Reflective Consensus  
18 Yair Amir (Professor, Johns Hopkins University) Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks  

November 2018

13 Salvatore Signorello The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking  
13 Tiago Oliveira Vawlt - Privacy-Centered Cloud Storage  
27 Nuno Neves Segurança de Software - Como Encontrar uma Agulha num Palheiro?  
27 Ricardo Mendes Vawlt - The Zero-knowledge End-to-end Encryption Protocol  

December 2018

11/12 António Casimiro AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments  
11/12 Carlos Nascimento Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot  

January 2019

15/01 Fernando Alves A comparison between vulnerability publishing in OSINT and Vulnerability Databases  
15/01 Ibéria Medeiros SEAL: SEcurity progrAmming of web appLications  
29/01 Fernando Ramos Networks that drive themselves…of the cliff  
29/01 Miguel Garcia Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)  

February 2019

19/02 Ana Fidalgo Conditional Random Fields and Vulnerability Detection in Web Applications  
19/02 João Sousa Towards BFT-SMaRt v2: Blockchains and Flow Control  

March 2019

13/03 Fernando Ramos How to give a great -- OK, at least a good -- research talk  
13/03 Ricardo Morgado Automatically correcting PHP web applications  


March 2019

27/03 Nuno Dionísio Cyberthreat Detection from Twitter using Deep Neural Networks  
Fernando Ramos My network protocol is better than yours!  


April 2019

10/04 Adriano Serckumecka SIEMs  
10/04 Tulio Ribeiro BFT Consensus & PoW Consensus (blockchain).  



Upcoming presentations


May 2019

08/05 Miguel Moreira    
08/05 Miguel Garcia    
22/05 Pedro Ferreira    
22/05 Vinicius Cogo    

June 2019

05/06 Diogo Gonçalves    
05/06 Francisco Araújo    
19/06 Tiago Correia    
19/06 Miguel Matos    

July 2019

03/07 Eric Vial    
03/07 Robin Vassantlal    
03/07 João Pinto    


Personal tools
Navigators toolbox