Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 576 to 600 of 931Affiliation shown is the affiliation at the time the talk was given.
Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University
Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston
Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas
Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC
Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation
Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan
The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
Marc Rogers - Purdue University
OS-Level Taint Analysis for Malware Investigation and Defense
Dongyan Xu - Purdue University
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Richard Power - GS(3) Intelligence & Words of Power
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
David Zage - Purdue University
Developing an Operational Framework for Integrated System Security
Paula DeWitte - St. Mary’s Law School in San Antonio
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Qihua Wang - Purdue University
Network Security Begins at Home: Changing Consumer Behavior for i-Safety
Nora Rifon - Michigan State University
Verification of Integrity for Outsourced Content Publishing and Database Queries
Danfeng Yao - Brown University
The Secure Information Sharing Problem and Solution Approaches
Ravi Sandhu - George Mason University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List







