Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Affiliation shown is the affiliation at the time the talk was given.
A Rules Based Statistical Algorithm for Keystroke Detection
Paul Kidwell - Purdue University
An Alternate Memory Architecture for Code Injection Prevention
Ryan Riley - Purdue University
The Dark Side of Software Engineering and How to Defend Against It
Cassio Goldschmidt - Symantec
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
Mehmet Sahinoglu - Auburn University at Montgomery, AL
Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
Charles Killian - Purdue University
Providing Privacy through Plausibly Deniable Search
Mummoorthy Murugesan - Purdue University
Security for the Next Internet over Heterogeneous Environments
Arjan Durresi - Indiana University Purdue University at Indianapolis
Privacy – from accessing databases to location based services
Johann-Christoph Freytag - Humboldt University
User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy - Notre Dame
Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
Ragib Hasan - University of Illinois at Urbana-Champaign
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
Rick Aldrich - Booz Allen Hamilton
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
Richard Power - CyLab - Carnegie Mellon
Information Security Management and IT Executives in a Top Management Team
Juhee Kwon - Purdue University
Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
Andre Koenig - Technical University Darmstadt
Multi-Policy Access Control for Healthcare using Policy Machine
Zahid Pervaiz - Purdue University
Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
Leszek Lilien - Western Michigan University
Safely Analyzing Sensitive Network Data
Gerome Miklau - University of Massachusetts, Amherst
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List













