Security Scholar Poster Boards

To further enhance the conversation, we are offering the RSAC Security Scholars the opportunity to demonstrate their work at a poster board session:
Wednesday, February 26
12:00 to 1:00 PM
Moscone North
Add this session to your schedule, then drop by, provide feedback and meet the RSAC Security Scholar Class of 2020!
Oluwatobi Akanbi University of Colorado, Colorado Springs Poster Board | Abstract Preemptive Two-Stage Update Mechanism for Software-Defined Networks |
Gustavo Angeles Tennessee Technological University Poster Board | Abstract Towards Standardization of Internet of Things (IoT) for Intrusion Data Sharing |
Kyle Avery University of Texas, San Antonio Poster Board | Abstract Fingerprinting IoT Network Traffic |
Leonardo Babun Florida International University Poster Board | Abstract Security and Privacy Mechanisms for IoT and IIoT Devices and Applications |
FINALIST Aadesh Bagmar University of Maryland, College Park (UMCP) Poster Board | Abstract The Python Ecosystem is Messed Up and Here’s Why. |
Cody Carter Michigan State University Poster Board | Abstract Trends in Ransomware That Help Lead to Stronger Data Protection |
Youngwook Do Georgia Institute of Technology Poster Board | Abstract Spidey Sense: Designing Wrist-Mounted Haptics to Improve Awareness of Cybersecurity Warnings |
Nicholas Handaja University of Washington, Bothell Poster Board | Abstract Privacy-Preserving Health Analytics |
FINALIST Michael Hanling United States Naval Academy Poster Board | Abstract Proving Cloud Storage Data Integrity |
Collin Kane United States Naval Academy Poster Board | Abstract Appeasement in Cyberspace: Assessing the ethical permissibility of conceding to ransomware attacks |
Tyler Kim Rutgers University Poster Board | Abstract DARPA SocialSim Externship: A Prediction Model for Information Spread on Vulnerabilities |
Ahmet Kurt Florida International University Poster Board | Abstract LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network |
Josiah Lashley |
Nhu Ly University of Washington, Bothell Poster Board | Abstract Poisoning Attack Defense for Intrusion Detection Systems in Wireless Medical Devices |
Jess MacMillan California Polytechnic State University, San Luis Obispo Poster Board | Abstract California Cyber Innovation Challenge: Igniting and Equipping Passionate Future Cyber Defenders |
FINALIST Evgeny Manzhosov Columbia University Poster Board | Abstract PAIRS: Control Flow Protection using Phantom Addressed Instructions |
Pragati Mishra Carnegie Mellon University Poster Board | Abstract Security Analysis oF MI BAND 4 |
David Ng University of California, Berkeley Poster Board | Abstract "The California Consumer Privacy Act: Its impact and significance for privacy rights" |
Samuel Sabogal Pardo Carnegie Mellon University Poster Board | Abstract AI for Privacy |
Ramesh Paudel Tennessee Technological University Poster Board | Abstract SNAPSKETCH: Network Representation Approach for Anomaly Detection in Dynamic Network |
James Andrew Schmidt Michigan State University Poster Board | Abstract Fully Homomorphic Noiseless Polynomial Encryption |
Krishnapriya Kottakka Sugathan Florida Institute of Technology Poster Board | Abstract Characterizing the Variability in Face Recognition Accuracy Relative to Race |
Alex Sumner North Carolina A&T State University Poster Board | Abstract Evaluating Phishing Security Training: A Case Study on KnowBe4 |
Rick Trilling Brown University Poster Board | Abstract Developing Affordable Cybersecurity Plans for Small and Medium Businesses |
Marinos Vomvas Northeastern University Poster Board | Abstract Towards Real Time Understanding of the RF Spectrum |
Paul Wagenseller III Arizona State University Poster Board | Abstract Location Prediction with Communities in User Ego-Net in Social Media |
Wai Tuck Wong Carnegie Mellon University Poster Board | Abstract Security for Developers. A unique spin to wargaming, focusing on developer education |
Jiahao Xie Georgia Institute of Technology Poster Board | Abstract Resilient secure substation protection against cyber-attacks in the power grid. |