NavTalks
From Navigators
(Difference between revisions)
Line 185: | Line 185: | ||
<table border="0" cellspacing="0" style="background:#89B085"> | <table border="0" cellspacing="0" style="background:#89B085"> | ||
<tr> | <tr> | ||
- | <td>27/03</td> <td> | + | <td style="width:100px">27/03</td> |
- | <td> | + | <td style="width:300px">Nuno Dionísio</td> |
- | <td> </td> | + | <td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds. |
+ | Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets. | ||
+ | In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks). | ||
+ | ">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td> | ||
+ | <td style="width:100px"> </td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
- | <td> | + | <td style="width:300px">Fernando Ramos</td> |
- | + | <td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual! | |
- | <td> </td> | + | ">My network protocol is better than yours!</span></td> |
+ | <td style="width:100px"> </td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 224: | Line 229: | ||
- | <!-- | + | <!-- André Oliveira????????? ############################################################### |
########################################################### | ########################################################### | ||
############## UPCOMING PRESENTATIONS##################### | ############## UPCOMING PRESENTATIONS##################### |
Revision as of 22:50, 7 May 2019
The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.
Leave mouse over title's presentation to read the abstract.
Contents |
Past presentations
September 2018
20 | Alysson Bessani | SMaRtChain: A Principled Design for a New Generation of Blockchains | |
20 | Rui Miguel | Named Data Networking with Programmable Switches |
October 2018
4 | Bruno Vavala (Research Scientist in Intel Labs) | Private Data Objects | |
4 | Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) | Reflective Consensus | |
18 | Yair Amir (Professor, Johns Hopkins University) | Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks |
November 2018
13 | Salvatore Signorello | The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking | |
13 | Tiago Oliveira | Vawlt - Privacy-Centered Cloud Storage | |
27 | Nuno Neves | Segurança de Software - Como Encontrar uma Agulha num Palheiro? | |
27 | Ricardo Mendes | Vawlt - The Zero-knowledge End-to-end Encryption Protocol |
December 2018
11/12 | António Casimiro | AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments | |
11/12 | Carlos Nascimento | Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot |
January 2019
15/01 | Fernando Alves | A comparison between vulnerability publishing in OSINT and Vulnerability Databases | |
15/01 | Ibéria Medeiros | SEAL: SEcurity progrAmming of web appLications | |
29/01 | Fernando Ramos | Networks that drive themselves…of the cliff | |
29/01 | Miguel Garcia | Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper) |
February 2019
19/02 | Ana Fidalgo | Conditional Random Fields and Vulnerability Detection in Web Applications | |
19/02 | João Sousa | Towards BFT-SMaRt v2: Blockchains and Flow Control |
March 2019
13/03 | Fernando Ramos | How to give a great -- OK, at least a good -- research talk | |
13/03 | Ricardo Morgado | Automatically correcting PHP web applications |
March 2019
27/03 | Nuno Dionísio | Cyberthreat Detection from Twitter using Deep Neural Networks | |
Fernando Ramos | My network protocol is better than yours! |
April 2019
10/04 | Adriano Serckumecka | SIEMs | |
10/04 | Tulio Ribeiro | BFT Consensus & PoW Consensus (blockchain). |
Upcoming presentations
May 2019
08/05 | Miguel Moreira | ||
08/05 | Miguel Garcia | ||
22/05 | Pedro Ferreira | ||
22/05 | Vinicius Cogo |
June 2019
05/06 | Diogo Gonçalves | ||
05/06 | Francisco Araújo | ||
19/06 | Tiago Correia | ||
19/06 | Miguel Matos |
July 2019
03/07 | Eric Vial | ||
03/07 | Robin Vassantlal | ||
03/07 | João Pinto |