Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 426 to 450 of 894Affiliation shown is the affiliation at the time the talk was given.
Modeling DNS Security: Misconfiguration, Availability, and Visualization
Casey Deccio - Sandia National Labs
Understanding insiders: An analysis of risk-taking behavior *
Fariborz Farahmand - Purdue University
User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds
Torsten Braun - University of Bern
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Junghwan Rhee - Purdue University
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
Matthew Hashim - Purdue University
Security Applications for Physically Unclonable Functions
Michael Kirkpatrick - Purdue University
Detecting Coordinated Attacks with Traffic Analysis
Nikita Borisov - University of Illinois at Urbana-Champaign
The Role of Automata Theory in Software Verification
P. Madhusudan - University of Illinois at Urbana-Champaign
Trust and Protection in the Illinois Browser Operating System
Sam King - University of Illinois
Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems
Alex Liu - Michigan State University
Global Study of Web 2.0 Use in Organizations
Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University
Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
Xiaofeng Wang - Indiana University
Secure Network Coding for Wireless Mesh Networks
Cristina Nita-Rotaru - Purdue University
Ontological Semantic Technology for Detecting Insider Threat and Social Engineering
Victor Raskin & Julia Taylor - Purdue University
The role of System Security Engineering in the engineering lifecycle
Stephen Dill - Lockheed Martin