Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 801 to 825 of 903Affiliation shown is the affiliation at the time the talk was given.
A Survey of intrusion detection research at the IBM Zurich Research Laboratory
Marc Dacier - IBM Global Security Laboratory
Conducting Searches in a Computer Environment
Douglas A. Schmidtknecht - FBI Computer Crime Lab
Lessons Learned in the Implementation of a Multi-Location Network Based Real-Time Intrusion System
Michael Puldy - IBM Emergency Response Service
Information Security Consulting Wargaming Cyber-terrorism in SEAS
Alok R. Chaturvedi - Management, Purdue University
Infrastructure Assurance - The Challenge of the Next Millennium
William Harris - U.S. Critical Infrastructure Assurance Office
Multilingual Information Processing at NMSU CRL: Problems, Technologies, Applications, Tools and Resources
Sergei Nirenburg - Computing Research Laboratory, New Mexico State University
Distributed monitoring and intrusion detection using autonomous agents
Diego Zamboni - Purdue COAST
Building a High-Performance, Programmable Secure Coprocessor
Sean W. Smith - IBM T.J. Watson Research Center
Theft of Information and Conspiracy in the Take-Grant Protection Model
Matt Bishop - U.C. Davis
Intelligence Requirements for Information Warfare: an Initial Assessment
Lorenzo Valeri - King's College
Ways to Watch
