Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 451 to 475 of 717
08/25/2004

Application of Thermodynamics to Computer Network Defense


Dave Ford - Naval Postgraduate School
04/21/2004

Improving audit sources by categorizing security monitoring systems


Benjamin Kuperman - PhD Candidate, Purdue University
04/14/2004

Secure Collaboration for Capacity Sharing in Logistics


Chris Clifton - Computer Science, Purdue University
04/07/2004

Security in Outsourced Databases


Gene Tsudik - UC Irvine
03/31/2004

Securing Wireless Sensor Networks


Wenliang (Kevin) Du - Syracuse University
03/24/2004

Managing Policy for Coordinated Defense


Clifford Neuman - ISI/USC
03/10/2004

Lessons from the EROS Experiment


Jonathan Shapiro - Johns Hopkins University
02/25/2004

Testing Computer Forensic Tools


James R. Lyle - National Institute of Standards and Technology
02/18/2004

Signatures, Heuristics and Behavior Blocking


Sarah Merrion - Symantec
02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems


Kent Seamons - Brigham Young University
02/04/2004

Info Forthcoming


Prof. Steve Elliott - Purdue University
01/28/2004

Proactive Protection Against DDoS and Worm Attacks


Kihong Park - Computer Science, Purdue University
01/21/2004

Enabling Effective Trust Judgments


Sean Smith - Dartmouth College
01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data


Jaideep Vaidya - Purdue University
12/10/2003

NL Downgrading, Sanitization, and Declassification


Dina Mohamed - Purdue University Department of Linguistics
12/03/2003

Using Criminal Law to Encourage the Prevention of Cybercrime


Susan Brenner - University of Dayton School of Law
11/19/2003

Natural Language Watermarking and Tamperproofing


Katrina E. Triezenberg - PhD Candidate, Purdue University
11/12/2003

Port Scans: Real Numbers, Real Networks


Carrie Gates - Carnegie Mellon University
11/05/2003

Semantic Mimicking: Creating Nonsense with Sense


Krista Bennett - Purdue University
10/29/2003

An End-To-End Approach to Digital Investigation


Peter Stephenson - International Institute for Digital Forensic Studies
10/22/2003

Privacy-Preserving Online Collaborations


Mikhail Atallah - Purdue University
10/08/2003

Specification and Management of Attribute-based Authorization Policy


Dr. William H. Winsborough - George Mason University

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information