Past Events
Indian Institutes of Technology (IIT) Guest Lectures
In the past, the design of cyber physical systems required a model based engineering approach, where as a first step of the...
Big Data: Threat Landscape and Protection Gap Analysis
The advent of IoT and cloud services has resulted in collecting and sharing massive amounts of data. From a security...
CSAW’15 – High School Forensics Challenge
Bletchley Park from GEMS Academy in Abu Dhabi and LIGHT from Delhi Private School in Dubai were our top finalists. The two teams...
Fault Tolerant Implementations of Cryptosystems: Threats and Defenses
In today’s world security requirements of various information disciplines, e.g., networking, telecommunications, database...
Intrusion Detection Systems: Faster Pattern Matching & Beyond
Guest Speaker Monther Aldwairi Monther Aldwairi is an associate professor at the College of Technological Innovation at Zayed...
UAE Security Day – 2015
CCS-AD has been working in the past year to develop a high quality research program that addresses challenges relevant to the...
Workshop on Trustworthy Hardware
Hardware security and trustworthy hardware are on the brink of a revolution and this workshop and the resulting special...
Jason Healey on Dynamics of Cyber Conflict
In almost all areas of national security, new personnel are instructed in the importance of understanding the lessons of history...
Cyber Stability and Security in the Gulf: Challenges and Opportunities
This one-day conference on cybersecurity threats and opportunities in the Gulf region, is jointly hosted by the Atlantic...