Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Tor: Anonymous communications for government agencies, corporations, journalists... and you
Paul Syverson & Roger Dingledine - U.S. Naval Research Laboratory (NRL)
What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
Anand Singh - Target Corporation
Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
Ta-Wei "David" Wang - Purdue University
Multiple Independent Levels of Security Architecture: A High Robustness Approach Using COTS
Ben Calloni - Lockheed Martin
Towards Event Source Location Privacy in Wireless Sensor Networks
Sencun Zhu - Pennsylvania State
Exploiting Opportunistic Scheduling in Cellular Data Networks
Hao Chen - University of California, Davis
Shifting focus: Aligning security with risk management
Jack Jones - Risk Management Insight
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Minaxi Gupta - Indiana University
Private Queries in Location Based Services: Anonymizers are not Necessary
Gabriel Ghinita - Purdue University
Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft
Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Shimon Modi - Purdue University
Measuring the Attack Surfaces of Enterprise Software Systems
Yuecel Karabulut - SAP Research
Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Adam Dugger - Arxan
Trends in Identity Management
Kenji Takahashi - ITT Information Sharing Platform Laboratories
The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Scott Orton - Ratheon
Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
Ibrahim Baggili - Purdue University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List













