Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 801 to 825 of 940Affiliation shown is the affiliation at the time the talk was given.
Algorithms for Internet Security Services
Michael T. Goodrich - Johns Hopkins University
Automatic identification of classified documents
Judy Hochberg - Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory
Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.
Clay Shields - CERIAS, Purdue University
Commercial High-Resolution Satellite Imagery Polic
Gerald Thomas - Political Science, Purdue University
NLP for IAS: Overview and Implementations
Victor Raskin - English and Linguistics at Purdue University
PFIRES: Policy Framework for Interpreting Risk in eCommerce Security
Jackie Rees - Krannert School of Management at Purdue University
Developing Custom Intrusion Detection Filters Using Data Mining
Chris Clifton - The MITRE Corporation
Asynchronous Transfer Mode (ATM) Networks: Security Vulnerability Research
Susan Labonte - MITRE Corporation
Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
Wenliang Du & Mahesh Tripunitara - Purdue CERIAS
Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study
Mahesh Tripunitara - Purdue CERIAS
Information Security, a Folk Art in Need of an Upgrade
Donn Parker - SRI Consulting
Computer Forensics Examinations in the Consulting Arena
James R. C. Hansen - Trident Data Systems
Anonymity Online
Albert H. Teich - American Association for the Advancement of Science
A Formal Framework and Evaluation Method for Protocol Denial of Service
Catherine Meadows - Naval Research Laboratory
Architectures and Components for High-Assurance Security
Carl Landwehr - Mitretek
Engineering secure software in Java with Confined Types
Jan Vitek - Purdue, CERIAS
Technical and legal approaches to spam
David E. Sorkin - Center for Information Technology & Privacy Law at The John Marshall Law School
Image and Video Watermarking: An Overview
Edward J. Delp - Video and Image Processing Laboratory (VIPER), Purdue School of Electrical and Computer Engineering
Twelve Challenges in Information Security Research
Gene Spafford - Purdue CERIAS
KHIP - A Scalable Protocol for Secure Multicast Routing
Clay Shields - Purdue CERIAS
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List




