Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Showing: 351 to 375 of 927Affiliation shown is the affiliation at the time the talk was given.
How Program Analysis can be Used in Security Applications
Xiangyu Zhang - Purdue University
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
Barrett Caldwell and Omar Eldardiry - Purdue University
Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis
Larry Ponemon - Ponemon Institute
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
Brendan Saltaformaggio - Purdue University
Online Privacy Agreements, is it Informed Consent?
Masooda Bashir - University of Illinois at Urbana-Champaign
General-Purpose Secure Computation and Outsourcing
Marina Blanton - University of Notre Dame
Machine Intelligence for Biometric and On-Line Security
Marina Gavrilova - University of Calgary
Delivering "Always-on" Services Despite Flaky Network Infrastructure
Rahul Potharaju - Purdue University
Technical Tradeoffs in the NSA's Mass Phone Call Program
Ed Felten - Princeton University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List













