Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 251 to 275 of 913Affiliation shown is the affiliation at the time the talk was given.

Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Jerome Edge - Lockheed Martin

Locally Differential Private Protocols for Frequency Estimation
Tianhao Wang - Purdue University

The Stark Reality of Red vs. Blue and Why it's Not Working
Chris Roberts - Acalvio Technologies

MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
Shiqing Ma - Purdue University

Enabling Trust and Efficiency in Provenance-Aware Systems
Adam Bates - University of Illinois at Urbana-Champaign

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
Ron Ross - National Institute for Standards and Technology (NIST)
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
Sze Yiu Chau - Purdue University

DataShield: Configurable Data Confidentiality and Integrity
Scott Carr - Purdue University

CIO Risk Appetite and Information Security Management
Tawei (David) Wang - DePaul University

A2C: Self Destructing Exploit Executions via Input Perturbation
Yonghwi Kwon - Purdue University

Behavioral and Computational Aspects of Network Security Games
Ashish Hota - Purdue University
Ways to Watch
