Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 751 to 775 of 887Affiliation shown is the affiliation at the time the talk was given.
Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.
Clay Shields - CERIAS, Purdue University
Commercial High-Resolution Satellite Imagery Polic
Gerald Thomas - Political Science, Purdue University
NLP for IAS: Overview and Implementations
Victor Raskin - English and Linguistics at Purdue University
PFIRES: Policy Framework for Interpreting Risk in eCommerce Security
Jackie Rees - Krannert School of Management at Purdue University
Developing Custom Intrusion Detection Filters Using Data Mining
Chris Clifton - The MITRE Corporation
Asynchronous Transfer Mode (ATM) Networks: Security Vulnerability Research
Susan Labonte - MITRE Corporation
Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
Wenliang Du & Mahesh Tripunitara - Purdue CERIAS
Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study
Mahesh Tripunitara - Purdue CERIAS
Computer Forensics Examinations in the Consulting Arena
James R. C. Hansen - Trident Data Systems
A Formal Framework and Evaluation Method for Protocol Denial of Service
Catherine Meadows - Naval Research Laboratory
Technical and legal approaches to spam
David E. Sorkin - Center for Information Technology & Privacy Law at The John Marshall Law School
Image and Video Watermarking: An Overview
Edward J. Delp - Video and Image Processing Laboratory (VIPER), Purdue School of Electrical and Computer Engineering
Effectively Managing Your E-Business Risk Profile - A Standard Approach for Assessing Risk and Protecting Corporate Stakeholders
Rick Davis - INSUREtrust.com