Archive

2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/12/2011

Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud


Fariborz Farahmand - Purdue University
(444.7MB): Video Icon MP4 Video   Watch on Youtube
01/19/2011

Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security


Somesh Jha - University of Wisconsin
(446.4MB): Video Icon MP4 Video   Watch on Youtube
02/02/2011

Campus closed/snow



02/09/2011

Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *


Fariborz Farahmand - Purdue University
(442.2MB): Video Icon MP4 Video   Watch on Youtube
02/16/2011

Malware Trends and Techniques


Tom Ervin - MITRE
02/23/2011

A couple of results about JavaScript

A couple of results about JavaScript


Jan Vitek - Purdue University
(443.1MB): Video Icon MP4 Video   Watch on Youtube
03/02/2011


"Modeling DNS Security: Misconfiguration, Availability, and Visualization"


Casey Deccio - Sandia National Labs
(443.7MB): Video Icon MP4 Video   Watch on Youtube
03/09/2011

Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits


Michael Schearer - Booz Allen Hamilton
(446.7MB): Video Icon MP4 Video   Watch on Youtube
03/23/2011

Wireless Technologies and how it relates to cyber security research

Wireless Technologies and how it relates to cyber security research


Kim Trieu - Lockheed Martin
(442.4MB): Video Icon MP4 Video   Watch on Youtube
04/06/2011

Society, Law Enforcement and the Internet:  Models for Give and Take

Society, Law Enforcement and the Internet: Models for Give and Take


Carter Bullard - QoSient, LLC
(451.8MB): Video Icon MP4 Video   Watch on Youtube
04/13/2011

FuzzyFusion™, an application architecture for multisource information fusion

FuzzyFusion™, an application architecture for multisource information fusion


Ronda R. Henning - Harris Corporation
(446.7MB): Video Icon MP4 Video   Watch on Youtube
04/20/2011


"Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet"


Jose Fernandez - Montreal Polytechnic
(445.8MB): Video Icon MP4 Video   Watch on Youtube
04/27/2011

Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation


Eric Katz - Purdue University
(447.7MB): Video Icon MP4 Video   Watch on Youtube
08/24/2011

Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion


Scott Hollenbeck - Verisign
(443.6MB): Video Icon MP4 Video   Watch on Youtube
08/31/2011

Non-homogeneous anonymizations

Non-homogeneous anonymizations


Tamir Tassa - The Open University, Israel
(447.7MB): Video Icon MP4 Video   Watch on Youtube
09/07/2011

Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs


Steven Gianvecchio - MITRE
(445.0MB): Video Icon MP4 Video   Watch on Youtube
09/21/2011

 Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire


Joe Leonard - Global Velocity
(444.0MB): Video Icon MP4 Video   Watch on Youtube
09/28/2011

Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing


Xukai Zou - Indiana University-Purdue University Indianapolis
(449.7MB): Video Icon MP4 Video   Watch on Youtube
10/05/2011

Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems


Hal Aldridge - Sypris Electronics
(445.0MB): Video Icon MP4 Video   Watch on Youtube
10/12/2011

Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats


Dan McWhorter and Steve Surdu - Mandiant Corporation
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/19/2011

Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing


Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University
(446.3MB): Video Icon MP4 Video   Watch on Youtube
10/26/2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack


Sheila Becker - University of Luxembourgh
(446.8MB): Video Icon MP4 Video   Watch on Youtube
11/09/2011

Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization


Zhongshu Gu - Purdue University
(445.3MB): Video Icon MP4 Video   Watch on Youtube
11/16/2011

Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers


Loukas Lazos - University of Arizona
(443.7MB): Video Icon MP4 Video   Watch on Youtube
11/30/2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones


Apu Kapadia - Indiana University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
12/07/2011

No Seminar




Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information