Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 101 to 125 of 894Affiliation shown is the affiliation at the time the talk was given.
The Need for Legal Education within a Cybersecurity Curriculum
Paula deWitte - Texas A&M University
Educating the Next Generation on the Challenges of Securing Critical Infrastructure
Dave Henthorn - Rose-Hulman
Security Engineering for Machine Learning
Gary McGraw - Berryville Institute of Machine Learning
Cybersecurity Skills – Easy to say, harder to recognise?
Steven Furnell - University of Nottingham in the United Kingdom
Delving into differential privacy and anomaly detection: a meta-learning perspective
Yimin Chen - Virginia Tech
The Invisible Risks: An Empirical Analysis on Data Sharing Activities and Systemic Risk among the Data Brokers
Tawei (David) Wang - DePaul University
Practical software Supply Chain Security and Transparency
Santiago Torres-Arias - Purdue University
SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool
Greg Akers - Executive Technology Consultant
Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology (IT/OT)
Randall Brooks - Raytheon