Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 801 to 825 of 887Affiliation shown is the affiliation at the time the talk was given.
Distributed monitoring and intrusion detection using autonomous agents
Diego Zamboni - Purdue COAST
Building a High-Performance, Programmable Secure Coprocessor
Sean W. Smith - IBM T.J. Watson Research Center
Theft of Information and Conspiracy in the Take-Grant Protection Model
Matt Bishop - U.C. Davis
Intelligence Requirements for Information Warfare: an Initial Assessment
Lorenzo Valeri - King's College
Web Certifications: The Good, the Bad, and the Ugly
Steve Lodin - Ernst & Young Information Security Services
US Government Perspective on Information Security
Chris Shutters - National Security Agency
Applying Neural Networks to Anomaly Dectection
Kymie Tan - University of Melbourne (Australia)
The need to license and restrict the users of general purpose computers
Yvo Desmedt - UWisc-Milwaukee
GeoPlex: Universal Service Platform for IP Network-based Services
George Vanecek - AT&T/GeoPlex