
Point processes and their application to modeling drug seizure and overdose interactions
Prof. George Mohler, Computer Science, Boston CollegeSeminar
https://kaust.zoom.us/j/8570786729Contact Person: Stefanos Georgiadis-
Vulnerability discovery in binaries and protocols
Prof. Sven Dietrich, the Computer Science Department, Hunter College, the City University of New York (CUNY)Seminar
Building 5, Level 5, Room 5209Contact Person: Marc Dacier -
Designing, Synthesizing, and Automating Domain-Specific Accelerators
Jian Weng, PhD student, Computer Science Department, UCLASeminar
https://kaust.zoom.us/j/94988389944Contact Person: Marco Canini -
Security evaluation of modern industrial control systems
Michail Maniatakos, Electrical and Computer Engineering, New York University (NYU), Abu DhabiGraduate Seminar
Building 9, Level 2, Room 2325Contact Person: Charalambos Konstantinou