Cybersecurity and Machine Learning Applications

#Artificial #Intelligence #Machine #Learning #Cyber-Security
Share

The Internet is the baseline for cyberspace, where technology infrastructure can be autonomous. It is a virtual space that can be accessed via different interconnected network devices. These devices can come from trusted or untrusted sources; therefore, the communication among these devices might be safe and/or unsafe which leads to insecure vulnerable communication in cyberspace. Security in cyberspace, namely Cyber-security can be described as a set of measures that makes cyberspace safe. Identifying threats and predicting vulnerabilities in this environment are the key components of the security mechanism. The main cause of security violations is the intrusion of an attacker into the network or the devices. Machine learning is one of the branches of artificial intelligence which can be used to increase the accuracy level for detecting threats in cyberspace to improve the system's efficiency and performance. In this talk, how machine learning can help detect and mitigate cyber threats is presented.



  Date and Time

  Location

  Hosts

  Registration



  • Date: 13 Dec 2022
  • Time: 10:00 AM to 11:00 AM
  • All times are (UTC-05:00) Eastern Time (US & Canada)
  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • Contact Event Host


  Speakers

Dr. Mizanur Rahman Dr. Mizanur Rahman

Topic:

Cybersecurity and Machine Learning Applications

The Internet is the baseline for cyberspace, where technology infrastructure can be autonomous. It is a virtual space that can be accessed via different interconnected network devices. These devices can come from trusted or untrusted sources; therefore, the communication among these devices might be safe and/or unsafe which leads to insecure vulnerable communication in cyberspace. Security in cyberspace, namely Cyber-security can be described as a set of measures that makes cyberspace safe. Identifying threats and predicting vulnerabilities in this environment are the key components of the security mechanism. The main cause of security violations is the intrusion of an attacker into the network or the devices. Machine learning is one of the branches of artificial intelligence which can be used to increase the accuracy level for detecting threats in cyberspace to improve the system's efficiency and performance. In this talk, how machine learning can help detect and mitigate cyber threats is presented.

 

Biography:

Dr. Sk Md Mizanur Rahman is a full-time professor in the department of Information and Communication Engineering Technology, School of Engineering Technology and Applied Science, Centennial College. Prior to his current appointment, he worked as an Assistant Professor for five years in the Information Systems Department at the College of Computer and Information Sciences, King Saud University. He also worked for several years in cryptography and security engineering in the high-tech industry in Ottawa, Canada. In addition, he worked as a postdoctoral researcher for several years at the University of Ottawa, the University of Ontario Institute of Technology (UOIT), and the University of Guelph, Canada. He completed a Ph.D. in Engineering (Major: Cybersecurity Risk Engineering) in the Laboratory of Cryptography and Information Security, Department of Risk Engineering, University of Tsukuba, Japan, in 2007. The Information Processing Society Japan (IPSJ) awarded Dr. Rahman its Digital Courier Funai Young researcher Encouragement Award for his excellent contributions to IT security research. He is awarded a Gold Medal for distinction in his undergraduate and graduate programs. He has published approximately one-hundred peer-reviewed journal and conference research articles. Also, he has a granted industrial patent (US Patent) on cryptographic key generation and protection. Dr. Rahman’s primary research interests are cryptographic protocol design, software, and network security, reverse engineering and ethical hacking, privacy-enhancing technology, sensor, and mobile ad-hoc network security, and cloud and the Internet of Things (IoT) security.