Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 126 to 150 of 891Affiliation shown is the affiliation at the time the talk was given.
The Internet of Things: What Everyone Needs to Know
Scott Shackelford - Indiana University
Building Practical Security Systems for the Post-App Smart Home
Adwait Nadkarni - College of William and Mary
Maximizing Cyber Deception to Improve Security: An Empirical Analysis
Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
Sivaram Ramanathan - University of Southern California
Results from the Field: Cybersecurity in Nonprofits and Why it Matters
Kelley Misata - Sightline Security
NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
Yoon Auh - NUTS Technologies
The Pod People Campaign: Driving User Traffic via Social Networks
Courtney Falk - GoDaddy
From Machine Learning Threats to Machine Learning Protection Requirements
Michael Clark - Riverside Research
Authentication: Behind The Scenes When You Click "Check Out"
Warda Zahid Khan - Mastercard
Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
Roger Schell - AESec Corporation
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
Flexible and Adaptive Malware Identification Using Techniques from Biology
Elena Peterson - Pacific Northwest National Laboratory
The Ghost in the Machine: Reconciling AI and Trust in the Connected World
Sam Curry and Alon Kaufman - Cybereason / Duality Technologies
Cyber Security of Control Systems: The Second Coming of the Maginot Line
Joe Weiss - Applied Control Systems, LLC
Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
Jim Richberg - Fortinet