Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 601 to 625 of 940Affiliation shown is the affiliation at the time the talk was given.
OS-Level Taint Analysis for Malware Investigation and Defense
Dongyan Xu - Purdue University
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Richard Power - GS(3) Intelligence & Words of Power
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
David Zage - Purdue University
Developing an Operational Framework for Integrated System Security
Paula DeWitte - St. Mary’s Law School in San Antonio
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Qihua Wang - Purdue University
Forensics Characterization of Printers and Image Capture devices
Nitin Khanna
Network Security Begins at Home: Changing Consumer Behavior for i-Safety
Nora Rifon - Michigan State University
Verification of Integrity for Outsourced Content Publishing and Database Queries
Danfeng Yao - Brown University
The Secure Information Sharing Problem and Solution Approaches
Ravi Sandhu - George Mason University
Prioritizing Processes and Controls for Effective and Measurable Security
Gene Kim - Tripwire, Inc
Real-Time Visualization of Network Attacks on High-Speed Links
Hyogon Kim - Korea University/PU Visitor
A Multi-layered Approach to Web Application Defense
Ed Finkler - Purdue University
Invasive Browser Sniffing and Countermeasures
Sid Stamm - Indiana University
Toward Autonomic Security Policy Management
Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL
On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks
Virgil D. Gligor - University of Maryland
Identity Management Strategies and Integration Perspectives
David Carroll - MITRE
Chaos,Complexity, Cybernetics and Therminator:
Dave Ford - Naval Postgraduate School
Spoofing-resistant Packet Routing for the Internet"
Minaxi Gupta - Indiana University
Privacy Policies in Web-based Healthcare
Julie Earp - North Carolina State University
Dynamic and Efficient Key Management for Access Hierarchies
Marina Blanton - Purdue University
A Policy Engineering Framework for Federated Access Management
Rafae Bhatti - Purdue University
Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience
Yan Chen - Northwestern University
Categories of Digital Forensic Investigation Techniques
Brian Carrier - Purdue University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List



