Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 751 to 775 of 917Affiliation shown is the affiliation at the time the talk was given.
Why is IT in so much pain? Parallels of modern server security to 1700 maritime navigation.
Gene Kim - Tripwire
Distributed DoS Attack Prevention using Route-Based Distributed Packet Filtering
Heejo Lee - CERIAS
Detecting Computer Attackers: Recognizing Patterns of Malicious, Stealthy Behavior
Robert Cunningham - MIT Lincoln Laboratory, Information Systems Technology
Our Policy is to Violate Your Privacy: When Privacy Goals Conflict
Annie Anton - North Carolina State University

Developing Data Mining Techniques for Intrusion Detection: A Progress Report
Wenke Lee - North Carolina State University

Richard Stotts, Jerome Webb & Matthew Beebe
Richard Stotts, Jerome Webb & Matthew Beebe - United States Air Force
Everything I Needed to Know about Network Security I Learned at the Tower of London
William Hugh Murray - CISSP

The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events
Pascal Meunier - CERIAS

The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance
Rick Davis - Aon Corporation

Information Assurance Challenges for the 21st Century
Michael G. Fleming & Victor Maconachy - NSA
Ways to Watch
