Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 376 to 400 of 896Affiliation shown is the affiliation at the time the talk was given.
![Defending Users Against Smartphone Apps: Techniques and Future Directions](/assets/video/secsem/images/secsem_20121003_full.jpg)
Defending Users Against Smartphone Apps: Techniques and Future Directions
William Enck - North Carolina State University
![Leveraging internal network traffic to detect malicious activity: Lessons learned](/assets/video/secsem/images/secsem_20120926_full.jpg)
Leveraging internal network traffic to detect malicious activity: Lessons learned
Marc Brooks - MITRE
![Global Revocation for the Intersection Collision Warning Safety Application](/assets/video/secsem/images/secsem_20120919_full.jpg)
Global Revocation for the Intersection Collision Warning Safety Application
Jason Haas - Sandia
![What firmware exists in your computer and how the fight for your systems will be below your operating system](/assets/video/secsem/images/secsem_20120418_full.jpg)
What firmware exists in your computer and how the fight for your systems will be below your operating system
Steve Battista - MITRE
![: K-Anonymity in Social Networks: A Clustering Approach](/assets/video/secsem/images/secsem_20120411_full.jpg)
: K-Anonymity in Social Networks: A Clustering Approach
Traian Truta - Northern Kentucky University
![Privacy preserving attribute based group key management](/assets/video/secsem/images/secsem_20120328_full.jpg)
Privacy preserving attribute based group key management
Nabeel Mohamed - PhD Candidate, Purdue University
![Adding a Software Assurance Dimension to Supply Chain Practices](/assets/video/secsem/images/secsem_20120321_full.jpg)
Adding a Software Assurance Dimension to Supply Chain Practices
Randall Brooks - Raytheon
![Privacy-Preserving Assessment of Location Data Trustworthiness](/assets/video/secsem/images/secsem_20120307_full.jpg)
Privacy-Preserving Assessment of Location Data Trustworthiness
Chenyun Dai - Purdue University
![Cryptographic Protocols in the Era of Cloud Computing](/assets/video/secsem/images/secsem_20120229_full.jpg)
Cryptographic Protocols in the Era of Cloud Computing
Nishanth Chandran - Microsoft Research
![Forensic Carving of Network Packets with bulk_extractor and tcpflow](/assets/video/secsem/images/secsem_20120215_full.jpg)
Forensic Carving of Network Packets with bulk_extractor and tcpflow
Simson Garfinkel - Naval Postgraduate School
Ways to Watch
![YouTube](/assets/images/youtube_200.png)