资讯

Tomorrow, July 1, 2025, ushers in two significant changes. For the first time in over 25 years, our fantastic administrative assistant, Lori Floyd, will not be present to greet us as she has retired.
Santiago Torres-Arias, assistant professor in Purdue University’s Elmore Family School of Electrical and Computer Engineering, recently took center stage at KubeCon 2024 as a keynote speaker. The ...
Discover the Future of Cybersecurity at the 26th Annual CERIAS Cybersecurity Symposium The 26th Annual CERIAS Cybersecurity Symposium is a premier gathering of thought leaders, innovators and ...
Dr. Aarushi Goel is an Assistant Professor in the Computer Science department at Purdue University. Before joining Purdue, she was a postdoc in the CIS Lab at NTT Research, where she worked under the ...
Prof. Younghyun Kim is an Associate Professor of Electrical and Computer Engineering. Prior to Purdue, he led the Wisconsin Embedded Systems and Computing (WISEST) Lab at University of ...
(Purdue CS News) - This prestigious appointment recognizes Grama’s distinguished career as a researcher and educator. Throughout his tenure at Purdue Computer Science, he has made impactful ...
Tensor Decomposition Methods for Cybersecurity Feb 07, 2024 Download: MP4 Video Size: 185.7MB Watch on YouTube Abstract Tensor decomposition is a powerful unsupervised machine learning method used to ...
Dr. Son’s research specializes in modeling and control of complex manufacturing and service enterprises and distributed federation of multi-paradigm simulations. He has authored/co-authored more than ...
Thirty-five years ago today (November 2nd), the Internet Worm program was set loose to propagate on the Internet. Noting that now to the computing public (and cybersecurity professionals, specifically ...
Fifty years ago, IBM introduced the first all-transistor computer (the 7000 series ). Transistors were approximately $60 apiece (in current dollars). Secondary storage was about 10 cents per byte ...
Tianyi Zhang is a Tenure-Track Assistant Professor of Computer Science and Societal Impact Fellow at Purdue University. At Purdue, he leads the Human-Centered Software Systems Lab, where he and his ...
With this model in hand, we use an array of mathematical tools and techniques to i) detect and identify the different types of cyberattacks that can disrupt UAM operations, ii) analyze the security ...