Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
US Government Perspective on Information Security
Chris Shutters - National Security Agency
Web Certifications: The Good, the Bad, and the Ugly
Steve Lodin - Ernst & Young Information Security Services
Intelligence Requirements for Information Warfare: an Initial Assessment
Lorenzo Valeri - King's College
Theft of Information and Conspiracy in the Take-Grant Protection Model
Matt Bishop - U.C. Davis
Building a High-Performance, Programmable Secure Coprocessor
Sean W. Smith - IBM T.J. Watson Research Center
Distributed monitoring and intrusion detection using autonomous agents
Diego Zamboni - Purdue COAST
Multilingual Information Processing at NMSU CRL: Problems, Technologies, Applications, Tools and Resources
Sergei Nirenburg - Computing Research Laboratory, New Mexico State University
Infrastructure Assurance - The Challenge of the Next Millennium
William Harris - U.S. Critical Infrastructure Assurance Office
Information Security Consulting Wargaming Cyber-terrorism in SEAS
Alok R. Chaturvedi - Management, Purdue University
Lessons Learned in the Implementation of a Multi-Location Network Based Real-Time Intrusion System
Michael Puldy - IBM Emergency Response Service
Conducting Searches in a Computer Environment
Douglas A. Schmidtknecht - FBI Computer Crime Lab