Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 176 to 200 of 879Affiliation shown is the affiliation at the time the talk was given.
Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things
Charles Kamhoua - US Army Research Laboratory
A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security
Bowei Xi - Purdue University
Protection against Compromised Operating Systems on ARM Cortex-A Architecture
Meng Yu - Roosevelt University
Defending the Grid for Fun and Non-Profit: Cybersecurity and Infrastructure Resilience Research at LLNL
Steve Chapin - Lawrence Livermore National Laboratory
Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
David Ebert - Purdue University
Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
Sanjay Madria - Missouri University of Science and Technology
CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
Haotian Deng - Purdue University
Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Yousra Aafer - Purdue University
Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
James Lerums - Purdue University
Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
Jessy Irwin - Tendermint
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Shiqing Ma - Purdue University
What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
Jillean Long Battle - Rofori Corporation
Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
Doug Rapp - Rofori Corporation
Hacking Your Security Career: Strategies That College Did Not Teach Me
Ryan Elkins - Eli Lilly
Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
Abe Clements - Purdue University
Personally Identifiable Data and the Specter of Customer Privacy
Leon Ravenna - KAR Auction Services, Inc.