Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Showing: 576 to 600 of 926Affiliation shown is the affiliation at the time the talk was given.
Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas
Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC
Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation
Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan
The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
Marc Rogers - Purdue University
OS-Level Taint Analysis for Malware Investigation and Defense
Dongyan Xu - Purdue University
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Richard Power - GS(3) Intelligence & Words of Power
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
David Zage - Purdue University
Developing an Operational Framework for Integrated System Security
Paula DeWitte - St. Mary’s Law School in San Antonio
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Qihua Wang - Purdue University
Network Security Begins at Home: Changing Consumer Behavior for i-Safety
Nora Rifon - Michigan State University
Verification of Integrity for Outsourced Content Publishing and Database Queries
Danfeng Yao - Brown University
The Secure Information Sharing Problem and Solution Approaches
Ravi Sandhu - George Mason University
Prioritizing Processes and Controls for Effective and Measurable Security
Gene Kim - Tripwire, Inc
Real-Time Visualization of Network Attacks on High-Speed Links
Hyogon Kim - Korea University/PU Visitor
Toward Autonomic Security Policy Management
Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL
On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks
Virgil D. Gligor - University of Maryland
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List







