Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 276 to 300 of 910Affiliation shown is the affiliation at the time the talk was given.

The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Corey Holzer - Purdue University
Protecting Computer Systems by Eliminating Vulnerabilities
Byoungyoung Lee - Purdue University

Enforcing Least Privilege Memory Views for Multithreaded Applications
Terry Ching-Hsiang Hsu - Purdue University

The role of cyber insurance in security and risk management
Nicholas Reuhs - Ice Miller LLP

Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
Michael Taylor - Rook Security

Information Security: Through the Lens of Crisis Organizations
Kelley Misata - Purdue University

Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
Endadul Hoque

Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University

Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County

Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis

IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology
Ways to Watch
