Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Privacy Preserving Data Mining on Vertically Partitioned Data
Jaideep Vaidya - Purdue University
Proactive Protection Against DDoS and Worm Attacks
Kihong Park - Computer Science, Purdue University
TrustBuilder: Automated Trust Negotiation in Open Systems
Kent Seamons - Brigham Young University
Testing Computer Forensic Tools
James R. Lyle - National Institute of Standards and Technology
Capabilities and Trends in Security Information Management Systems
Carson Zimmerman - MITRE
Secure Collaboration for Capacity Sharing in Logistics
Chris Clifton - Computer Science, Purdue University
Improving audit sources by categorizing security monitoring systems
Benjamin Kuperman - PhD Candidate, Purdue University
Application of Thermodynamics to Computer Network Defense
Dave Ford - Naval Postgraduate School
Administrative Scope and Role-Based Administration
Jason Crampton - Royal Holloway, University of London
Secure Information Sharing within a Collaborative Environment
Gail-Joon Ahn - University of North Carolina at Charlotte
Automatic Generation and Analysis of Attack Graphs
Jeannette Wing - Carnegie Mellon University
How to Forge Signatures and Be Happy About It
Giuseppe Ateniese - Johns Hopkins University
Robustness testing - black-box testing for software security
Ari Takanen - Codenomicon Ltd.
GTRBAC: A Generalized Temporal Role Based Access Control Model
James Joshi - Pittsburgh University