Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 51 to 75 of 886Affiliation shown is the affiliation at the time the talk was given.
Problems and Challenges in Data Security Posture Management
Mummoorthy Murugesan - Normalyze, Inc.
Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine
Ambrose Kam - Lockheed Martin
Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
Julie Haney - National Institute of Standards and Technologies
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
Meng Xu - University of Waterloo
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
Brian Barnier & Prachee Kale - Think.Design.Cyber
Data, Privacy---and the Interactions Between Them
Christine Task - Knexus Research Corporation
Security and Privacy in the Cyber-physical World
Ning Zhang - Washington University in St. Louis
Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
David C. Benson - United States Air Force
Adaptive Multi-Factor Authentication & Cyber Identity
Dipankar Dasgupta - The University of Memphis
"With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo - Microsoft
Securing Connected Devices – Challenge and Opportunities
Máire O'Neill - Queen's University Belfast
Enabling a Practically Secure Mobile Networked System
Dr. Guan-Hua (Scott) Tu - Michigan State University
Automated Function Boundary Detection in Stripped Binaries
Jim Alves-Foss - University of Idaho
Challenges at the NIST National Cybersecurity Center of Excellence
Bill Newhouse - National Institute of Standards and Technology (NIST)
The Evolution of Cybersecurity and its Role in the International System
Samuel Visner - MITRE Labs