Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/10/2007

Computer-Related Incidents:  Factors Related to Cause and Prevention

Computer-Related Incidents: Factors Related to Cause and Prevention


Virginia Rezmierski - University of Michigan
(219.7MB): Video Icon MP4 Video   Watch on Youtube
01/17/2007

Research Challenges in Assured Information Sharing

Research Challenges in Assured Information Sharing


Vipin Swarup - MITRE
(220.8MB): Video Icon MP4 Video   Watch on Youtube
01/24/2007

WHAT IS INFORMATION?

WHAT IS INFORMATION?


Wojciech Szpankowski - Purdue University
(219.6MB): Video Icon MP4 Video   Watch on Youtube
01/31/2007

Mathematically Defining Privacy

Mathematically Defining Privacy


Chris Clifton - Purdue University
(218.9MB): Video Icon MP4 Video   Watch on Youtube
02/07/2007

Scenario-Driven Construction of Enterprise Information Policy

Scenario-Driven Construction of Enterprise Information Policy


Stuart Shapiro - The MITRE Corporation
(219.4MB): Video Icon MP4 Video   Watch on Youtube
02/21/2007

Cyber Security and the

Cyber Security and the "NEW" world enterprise


Howard Schmidt - R & H Security Consulting LLC
(219.8MB): Video Icon MP4 Video   Watch on Youtube
02/28/2007

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners


Bhavani Thuraisingham - The University of Texas at Dallas
(218.8MB): Video Icon MP4 Video   Watch on Youtube
03/07/2007

Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls

Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls


Eugene Schultz - High Tower Software
(219.8MB): Video Icon MP4 Video   Watch on Youtube
03/21/2007

A quant looks at the future

A quant looks at the future


Dan Geer - Geer Risk Services, LLC
(217.5MB): Video Icon MP4 Video   Watch on Youtube
04/04/2007

How the Criminal Law Must Adapt to the Networked World


Richard Downing - US Department of Justice
04/11/2007

Dumb Ideas in Computer Security

Dumb Ideas in Computer Security


Dr. Charles P. Pfleeger - Pfleeger Consulting Group
(220.2MB): Video Icon MP4 Video   Watch on Youtube
04/18/2007

Hiding the Message Behind the Words: Advances in Natural Language Watermarking

Hiding the Message Behind the Words: Advances in Natural Language Watermarking


Mercan Topkara - Purdue University
(189.4MB): Video Icon MP4 Video   Watch on Youtube
08/22/2007

Role Discovery

Role Discovery


Bill Horne - HP Labs
(581.6MB): Video Icon MP4 Video   Watch on Youtube
08/29/2007

Towards Effective and Efficient Behavior-based Trust Models

Towards Effective and Efficient Behavior-based Trust Models


Klemens Boehm - Karlsruhe University
(579.3MB): Video Icon MP4 Video   Watch on Youtube
09/05/2007

Applying Recreational Mathematics to Secure Multiparty Computation

Applying Recreational Mathematics to Secure Multiparty Computation


Yvo Desmedt - University College, London
(555.9MB): Video Icon MP4 Video   Watch on Youtube
09/12/2007

 Security issues within embedded software development

Security issues within embedded software development


Ron Buskey - Motorola
(539.3MB): Video Icon MP4 Video   Watch on Youtube
09/19/2007

Protecting Data Privacy: A Practical Guide to Managing Risk

Protecting Data Privacy: A Practical Guide to Managing Risk


Jill Frisby - Crowe Chizek and Company LLC
(406.3MB): Video Icon MP4 Video   Watch on Youtube
09/26/2007

The Effect of Rootkits on the Corporate Environment

The Effect of Rootkits on the Corporate Environment


David Ehinger - Rolls Royce
(453.2MB): Video Icon MP4 Video   Watch on Youtube
10/17/2007

From Securing Navigation Systems to Securing Wireless Communication

From Securing Navigation Systems to Securing Wireless Communication


Srdjan Capkun - ETH Zurich
(575.0MB): Video Icon MP4 Video   Watch on Youtube
10/24/2007

Secure Virtualization

Secure Virtualization


George Heron - McAfee
(589.3MB): Video Icon MP4 Video   Watch on Youtube
10/31/2007

Protocols and Systems for Privacy Preserving Protection of Digital Identity

Protocols and Systems for Privacy Preserving Protection of Digital Identity


Abhilasha Bhargav-Spantzel - Purdue University
(557.0MB): Video Icon MP4 Video   Watch on Youtube
11/14/2007

Wireless Router Insecurity: The Next Crimeware Epidemic

Wireless Router Insecurity: The Next Crimeware Epidemic


Steve Myers, Indiana University - Indiana University
(582.8MB): Video Icon MP4 Video   Watch on Youtube
11/28/2007

CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations

CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations


Ventkat Venkatakrishnan - University of Illinois at Chicago
(109.9MB): Video Icon MP4 Video   Watch on Youtube
12/05/2007

Canceled




Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information