Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 1 to 25 of 873Affiliation shown is the affiliation at the time the talk was given.
The Fault in Our Stars: How Reputation Systems Fail in Practice
Alejandro Cuevas - Carnegie Mellon University
Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Jennifer Bayuk - Jennifer L. Bayuk, LLC
On Security Operations for AI Systems
Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)
Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory
Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting
Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University
Invisible Signatures: Device Fingerprinting in a Connected World
Sandhya Aneja - Marist College
Backtracking Intrusions in Modern Industrial Internet of Things
Mu Zhang - University of Utah
Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Robert Denz - Riverside Research
Sorting Surveillance Benefits from Harms
Rebecca Herold - Ponemon Institute Distinguished Fellow
Vulnerability Identification and Defense Construction in Cyber-Physical Systems
Khaled Serag
How the Cyberspace Domain has Changed the Game for the Space Domain
Scott Sage, Erin Miller
Enhancing Software Supply Chain Security in Distributed Systems
Christopher Nuland - Red Hat
Cyber defender's plead - If it's not codified – Please go away
Rita Foster - Idaho National Laboratory
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
Cyber's Offspring: AI and the Missing Security Mindset
Chris Demchak - US Naval War College