Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 26 to 50 of 894Affiliation shown is the affiliation at the time the talk was given.
Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory
Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting
Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University
Invisible Signatures: Device Fingerprinting in a Connected World
Sandhya Aneja - Marist College
Backtracking Intrusions in Modern Industrial Internet of Things
Mu Zhang - University of Utah
Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Robert Denz - Riverside Research
Sorting Surveillance Benefits from Harms
Rebecca Herold - Ponemon Institute Distinguished Fellow
Vulnerability Identification and Defense Construction in Cyber-Physical Systems
Khaled Serag
How the Cyberspace Domain has Changed the Game for the Space Domain
Scott Sage, Erin Miller
Enhancing Software Supply Chain Security in Distributed Systems
Christopher Nuland - Red Hat
Cyber defender's plead - If it's not codified – Please go away
Rita Foster - Idaho National Laboratory
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
Cyber's Offspring: AI and the Missing Security Mindset
Chris Demchak - US Naval War College
Advancements and New Developments in Biometric Privacy, Security and Ethics
Marina Gavrilova - University of Calgary
Don't Copy That Floppy!: A History of Anti-cracking Controls in Early Video Games and Its Economic Impact
Kelly FitzGerald - Raytheon Technologies