Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeNewsroom >

2006 News

Aruba and Darpa Build Super Wireless Defense Software 12/08/06 http://www.techworld.com
Researchers crafting intelligent, scaleable WLAN defense 12/07/06 http://www.networkworld.com
Detecting Video Forgeries 11/29/06 http:// www.technologyreview.com
Computer Prof Exposes Phony Photos 10/20/06 http://www.weeklyreader.com/pubstore/pc-14-3-current- sciencereg.aspx
The Art of Image Altering [Low- res video] [High-res video] 10/29/06 http://www.cbsnews.com
Picking Out Digital Image Forgeries 10/17/06 http://www.wired.com/
Sim City: Terrortown 10/05/06 http://www.wired.com
Blogs Shoot First, Ask Questions Later 10/04/06 http://www.pdnonline.com
From the Newsroom: Photographers Adhere to Ethics 09/17/06 http://www.timesdispatch.com
Are fake videos next ? 09/11/06 http://news.com
Costs to the U.S. economy of information infrastructure failure 08/28/06 http://www.usnews.com
Keeping it real: How to make digital photography more trustworthy 08/17/06 http://www.economist.com
Three Dartmouth professors invited to Microsoft Summit 07/17/06 http://www.dartmouth.edu/ ~news/
Ready for the Digital Future ? 07/01/06 http://www.scmr.com
Spoofing Defense Dissed by Security Experts 06/19/06 http://www.informationweek.com/
Uganda: Is Seeing Believing? 06/16/06 http://allafrica.com
Fortune 500 executives report they need better tools to measure the benefits of cyber security 06/07/06 http://www.dartmouth.edu/ ~news
Mining data to nab terrorists: fair ? Digital minutiae could be used to track terror networks, but it could produce false positives. 05/15/06 http://www.csmonitor.com
Your camera took this image 05/08/06 http://abc.net.au
Dartmouth Professor Named a 2006 Guggenheim Fellow 04/07/06 http://www.dartmouth.edu/~news/
Podcast: Training Emergency Responders 04/06/06 http://www.dartmouth.edu/~news/
Cyber-Terrorism Part III: What it Means to John Q. 03/17/06 http://www.ccnmagazine.com/
A Photo's Fingerprint; New Software Can Match Images to Specific Digital Cameras 03/14/06 http://www.technologyreview.com
Photoshop Fakers - New Tech Targets Image Manipulators 03/09/06 http://www.nowtoronto.com
The Hunt for Online Criminals at Work and Hiding in Plain Sight 02/20/06 http://www.masshightech.com
Department of Homeland Security Tests Cyberterrorism Response 02/13/06 http://www.theregister.co.uk
Computer Science Professor Elected to NAE 02/13/06 http://www.dartmouth.edu/~news/
Podcast: A Digital Life [mp3] 02/02/06 http://www.cnn.com/services/podcasting/
Smoking Out Photo Hoaxes with Software 01/31/06 http://news.zdnet.com
It May Look Authentic; Here's How to Tell It Isn't 01/24/06 http://www.nytimes.com
Finding Fraud in Digital Images 01/12/06 http://www.dartmouth.edu/~news/
Technology Seen Abetting Manipulation of Research 01/11/06 http://www.boston.com/news/


View Other Years: 
 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

Last Updated: 6/23/15