Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/13/2010


"Thinking Outside the Box"


Eugene Spafford - Purdue University
(443.9MB): Video Icon MP4 Video   Watch on Youtube
01/20/2010

Applications of biometric technologies

Applications of biometric technologies


Stephen Elliott - Purdue University
(416.3MB): Video Icon MP4 Video   Watch on Youtube
01/27/2010

Fast-flux Attacks


Shijie Zhou - University of Electronic Science and Technology of China
02/03/2010

Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets


Greg Stephens - Mitre
(429.3MB): Video Icon MP4 Video   Watch on Youtube
02/10/2010

Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics


Marcus Rogers - Purdue University
(465.4MB): Video Icon MP4 Video   Watch on Youtube
02/17/2010

Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams


Hyo-Sang Lim - Purdue University
(379.8MB): Video Icon MP4 Video   Watch on Youtube
02/24/2010

Ribbons, A Partially-Shared Memory Programming Model

Ribbons, A Partially-Shared Memory Programming Model


Kevin Hoffman - PhD candidate in the Computer Science, Purdue University
(418.4MB): Video Icon MP4 Video   Watch on Youtube
03/10/2010

Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition


Pascal Meunier - Purdue University
(444.7MB): Video Icon MP4 Video   Watch on Youtube
03/24/2010

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems


David Zage - Purdue University
(463.0MB): Video Icon MP4 Video   Watch on Youtube
03/31/2010

Everything I Needed to Know about Security, I Learned in 1974

Everything I Needed to Know about Security, I Learned in 1974


David Bell - Retired
(452.5MB): Video Icon MP4 Video   Watch on Youtube
04/07/2010

60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection


Yvo Desmedt - University College London, UK
(449.3MB): Video Icon MP4 Video   Watch on Youtube
04/14/2010

Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment


Christian Hammer - Purdue University
(448.0MB): Video Icon MP4 Video   Watch on Youtube
04/21/2010

The role of System Security Engineering in the engineering lifecycle

The role of System Security Engineering in the engineering lifecycle


Stephen Dill - Lockheed Martin
(446.1MB): Video Icon MP4 Video   Watch on Youtube
04/28/2010


"Ontological Semantic Technology for Detecting Insider Threat and Social Engineering"


Victor Raskin & Julia Taylor - Purdue University
(451.7MB): Video Icon MP4 Video   Watch on Youtube
08/25/2010

Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks


Cristina Nita-Rotaru - Purdue University
(443.7MB): Video Icon MP4 Video   Watch on Youtube
09/01/2010

Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking


Ashish Kundu - Purdue University
(441.4MB): Video Icon MP4 Video   Watch on Youtube
09/08/2010

Rootkits

Rootkits


Xeno Kovah - MITRE
(445.4MB): Video Icon MP4 Video   Watch on Youtube
09/15/2010

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses


Xiaofeng Wang - Indiana University
(445.1MB): Video Icon MP4 Video   Watch on Youtube
09/22/2010

Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)


Petros Mouchtaris - Telcordia
(448.2MB): Video Icon MP4 Video   Watch on Youtube
09/29/2010

Assured Processing through Obfuscation

Assured Processing through Obfuscation


Sergey Panasyuk - Air Force Research Laboratory
(445.8MB): Video Icon MP4 Video   Watch on Youtube
10/06/2010

Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations


Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University
(444.4MB): Video Icon MP4 Video   Watch on Youtube
10/20/2010

Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System


Sam King - University of Illinois
(451.0MB): Video Icon MP4 Video   Watch on Youtube
10/27/2010

The role of automata theory in software verification

The role of automata theory in software verification


P. Madhusudan - University of Illinois at Urbana-Champaign
(451.1MB): Video Icon MP4 Video   Watch on Youtube
11/03/2010

Tackling System-Wide Integrity

Tackling System-Wide Integrity


Trent Jaeger - Pennsylvania State
(444.9MB): Video Icon MP4 Video   Watch on Youtube
11/10/2010

Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis


Nikita Borisov - University of Illinois at Urbana-Champaign
(439.5MB): Video Icon MP4 Video   Watch on Youtube
11/17/2010

Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions


Michael Kirkpatrick - Purdue University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
12/01/2010

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context


Matthew Hashim - Purdue University
(443.7MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information