CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis


April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida


April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang


March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University


March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan


March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte


February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park


April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park



January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines


June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India


April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University


April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley


April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.



April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary



March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University


April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University


April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park


March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences


March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy


March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign


March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München