Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile
Sec4AI4Sec

@sec4ai4sec

Cybersecurity for AI-Augmented Systems

ID: 1737435751736864768

linkhttps://www.sec4ai4sec-project.eu/ calendar_today20-12-2023 11:33:14

60 Tweet

37 Followers

9 Following

Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🎤 Upcoming Webinar Speaker: Davide Ariu 🎤 🔐 How can security be embedded at every stage of the software development lifecycle—without slowing down innovation? Join us for an exciting webinar with Davide Ariu, Co-Founder & CEO at Pluribus One and OWASP Italy Chapter Co-Chair.

🎤 Upcoming Webinar Speaker: Davide Ariu 🎤

🔐 How can security be embedded at every stage of the software development lifecycle—without slowing down innovation?

Join us for an exciting webinar with Davide Ariu, Co-Founder & CEO at Pluribus One and OWASP Italy Chapter Co-Chair.
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🔍 Curious about security in the era of #AI-enhanced software? 🤖💡 Just like our comic character below, you might be wondering: How secure and resilient are AI-powered systems? We’ve got the answers! Join us for an insightful discussion on Security by Design in AI-powered

🔍 Curious about security in the era of #AI-enhanced software? 🤖💡
 Just like our comic character below, you might be wondering: How secure and resilient are AI-powered systems? We’ve got the answers!

Join us for an insightful discussion on Security by Design in AI-powered
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🚀 Sec4AI4Sec at SANER 2025 🚀 We’re excited to share that Sec4AI4Sec partners TU Hamburg and VU Amsterdam successfully organized the 3rd International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S) at SANER 2025! 🎉 📍 Montreal, March

🚀 Sec4AI4Sec at SANER 2025 🚀

We’re excited to share that Sec4AI4Sec partners TU Hamburg and VU Amsterdam successfully organized the 3rd International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S) at SANER 2025! 🎉

📍 Montreal, March
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

Excited to share that two Sec4AI4Sec papers will be presented at ICSE 2025 in Ottawa! 📌 JF Paper: Investigates how security patches from Automated Program Repair (APR) tools are perceived by human reviewers. 📌 NIER Paper: Explores ML-driven "fail fast" validation in

Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🚀 Call for Papers – CyberShield Workshop! 🚀 The submission deadline is approaching! Don't miss your chance to contribute to the 2025 IEEE CSR Workshop on Cybersecurity Innovation and Resilience (CYBERSHIELD). 📅 Paper submission deadline: April 14, 2025 (Online) 🗓 Workshop

🚀 Call for Papers – CyberShield Workshop! 🚀

The submission deadline is approaching! Don't miss your chance to contribute to the 2025 IEEE CSR Workshop on Cybersecurity Innovation and Resilience (CYBERSHIELD).

📅 Paper submission deadline: April 14, 2025 (Online)
🗓 Workshop
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🎥 We interviewed our Project Coordinator, Fabio Massacci, to talk about the Sec4AI4Sec project and the outcomes we expect to achieve. From the challenges we're tackling to the impact we aim to deliver, Fabio shares key insights into the project's vision and what lies ahead. 🚀

Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🔐 Integrating Security: The Key to a Robust Development Process In this short video clip,Hegedűs Péter, one of our project partners from FrontEndART Ltd. Software Ltd., shares key insights on why embedding security early in the development process is crucial for building resilient

Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🚀 Can AI be trusted in aviation’s most critical moments? At Airbus, we’re exploring exactly that through our Aviation Pilot – a new initiative focused on integrating AI into safety-critical systems with certifiability and trustworthiness at the forefront. Our current focus?

🚀 Can AI be trusted in aviation’s most critical moments?

At Airbus, we’re exploring exactly that through our Aviation Pilot – a new initiative focused on integrating AI into safety-critical systems with certifiability and trustworthiness at the forefront.

Our current focus?
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🔍 DeepTest 2025 – Workshop Recap We’re happy to share that the Sixth International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest 2025) was a success! Held on May 3, 2025, as part of ICSE 2025 in Ottawa, Canada, the workshop focused on the

🔍 DeepTest 2025 – Workshop Recap

We’re happy to share that the Sixth International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest 2025) was a success! Held on May 3, 2025, as part of ICSE 2025 in Ottawa, Canada, the workshop focused on the
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🚀 Exciting Research Update from FrontEndART Ltd. ! We’re proud to present our latest work at EASE 2025: "Identifying Helpful Context for LLM-based Vulnerability Repair: A Preliminary Study" In this research, FrontEndART Ltd. explores how enriching #LLM prompts with relevant

🚀 Exciting Research Update from <a href="/FrontEndART/">FrontEndART Ltd.</a> !

We’re proud to present our latest work at EASE 2025:

"Identifying Helpful Context for LLM-based Vulnerability Repair: A Preliminary Study"

In this research, <a href="/FrontEndART/">FrontEndART Ltd.</a> explores how enriching #LLM prompts with relevant
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🔐 Container image analysis -KubeCon 2025 At THALES SIX GTS FRANCE SAS, our research team is exploring new ways to improve the security of software containers — the building blocks of modern cloud-native applications. One of our key focus is Software Composition Analysis (SCA),

🔐 Container image analysis -KubeCon 2025 

At THALES SIX GTS FRANCE SAS, our research team is exploring new ways to improve the security of software containers — the building blocks of modern cloud-native applications. One of our key focus is Software Composition Analysis (SCA),
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

📢 New Publication in Pattern Recognition – Volume 168 We’re pleased to share that our partner, @Università degli Studi di Cagliari (Italy), has published important new research on adversarial pruning methods in Pattern Recognition! Recent years have seen the rise of pruning

📢 New Publication in Pattern Recognition – Volume 168

We’re pleased to share that our partner, @Università degli Studi di Cagliari (Italy), has published important new research on adversarial pruning methods in Pattern Recognition! 

Recent years have seen the rise of pruning
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

The Return of the Heuristics-based Repair? Hamburg University of Technology (TUHH) and the UniTrento DISI(@UNITN) analyzed the official fixes for 198 vulnerabilities, uncovering 15 patterns: recurring actions developers take when patching such vulnerabilities, e.g., calling a

The Return of the Heuristics-based Repair? 

Hamburg University of Technology (TUHH) and the UniTrento DISI(@UNITN) analyzed the official fixes for 198 vulnerabilities, uncovering 15 patterns: recurring actions developers take when patching such vulnerabilities, e.g., calling a
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

🚗 PCLA: Testing Autonomous Agents in CARLA Excited to share that PhD student @Masoud Jamshidiyan Tehrani presented a demo of PCLA at FSE 2025 in Trondheim! 🎉 PCLA is a flexible, user-friendly framework for security testing of autonomous vehicles using the CARLA simulator. It

🚗 PCLA: Testing Autonomous Agents in CARLA

Excited to share that PhD student @Masoud Jamshidiyan Tehrani presented a demo of PCLA at FSE 2025 in Trondheim! 🎉

PCLA is a flexible, user-friendly framework for security testing of autonomous vehicles using the CARLA simulator. It
Sec4AI4Sec (@sec4ai4sec) 's Twitter Profile Photo

📢 #SaveTheDate Webinar | New Cybersecurity Regulations: Turning Compliance into Competitive Advantage 📅 September 25, 2025 🕛 12:00 – 13:00 CEST 💻 Online NIS2, the Cyber Resilience Act, and the new Machinery Regulation are reshaping cybersecurity in manufacturing. Learn how