Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 751 to 775 of 879Affiliation shown is the affiliation at the time the talk was given.
Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
Wenliang Du & Mahesh Tripunitara - Purdue CERIAS
Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study
Mahesh Tripunitara - Purdue CERIAS
Computer Forensics Examinations in the Consulting Arena
James R. C. Hansen - Trident Data Systems
A Formal Framework and Evaluation Method for Protocol Denial of Service
Catherine Meadows - Naval Research Laboratory
Technical and legal approaches to spam
David E. Sorkin - Center for Information Technology & Privacy Law at The John Marshall Law School
Image and Video Watermarking: An Overview
Edward J. Delp - Video and Image Processing Laboratory (VIPER), Purdue School of Electrical and Computer Engineering
Effectively Managing Your E-Business Risk Profile - A Standard Approach for Assessing Risk and Protecting Corporate Stakeholders
Rick Davis - INSUREtrust.com
Trends in Intrusion Detection: Perspectives from a Security Tool Vendor
Gene Kim - Tripwire Security Systems Inc.