Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 176 to 200 of 879Affiliation shown is the affiliation at the time the talk was given.
![Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things](/assets/video/secsem/images/secsem_20190306_full.jpg)
Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things
Charles Kamhoua - US Army Research Laboratory
![A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security](/assets/video/secsem/images/secsem_20190227_full.jpg)
A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security
Bowei Xi - Purdue University
![Protection against Compromised Operating Systems on ARM Cortex-A Architecture](/assets/video/secsem/images/secsem_20190220_full.jpg)
Protection against Compromised Operating Systems on ARM Cortex-A Architecture
Meng Yu - Roosevelt University
Defending the Grid for Fun and Non-Profit: Cybersecurity and Infrastructure Resilience Research at LLNL
Steve Chapin - Lawrence Livermore National Laboratory
![Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making](/assets/video/secsem/images/secsem_20190206_full.jpg)
Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
David Ebert - Purdue University
![Secure Information Forwarding through Fragmentation in Delay- tolerant Networks](/assets/video/secsem/images/secsem_20190123_full.jpg)
Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
Sanjay Madria - Missouri University of Science and Technology
![CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification](/assets/video/secsem/images/secsem_20190109_full.jpg)
CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
Haotian Deng - Purdue University
![Normalizing Diverse Android Access Control Checks for Inconsistency Detection](/assets/video/secsem/images/secsem_20181205_full.jpg)
Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Yousra Aafer - Purdue University
![Developing a Public/Private Cybersecurity Scorecard for the State of Indiana](/assets/video/secsem/images/secsem_20181128_full.jpg)
Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
James Lerums - Purdue University
![Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits](/assets/video/secsem/images/secsem_20181010_full.jpg)
Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
Jessy Irwin - Tendermint
![Kernel-Supported Cost-Effective Audit Logging for Causality Tracking](/assets/video/secsem/images/secsem_20180926_full.jpg)
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Shiqing Ma - Purdue University
![What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation](/assets/video/secsem/images/secsem_20180919_full.jpg)
What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
Jillean Long Battle - Rofori Corporation
![Breaching Water Treatment Plants: Lessons Learned from Complex Exercises](/assets/video/secsem/images/secsem_20180905_full.jpg)
Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
Doug Rapp - Rofori Corporation
![Hacking Your Security Career: Strategies That College Did Not Teach Me](/assets/video/secsem/images/secsem_20180829_full.jpg)
Hacking Your Security Career: Strategies That College Did Not Teach Me
Ryan Elkins - Eli Lilly
![Protecting Bare-metal Embedded Systems from Memory Corruption Attacks](/assets/video/secsem/images/secsem_20180822_full.jpg)
Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
Abe Clements - Purdue University
![Personally Identifiable Data and the Specter of Customer Privacy](/assets/video/secsem/images/secsem_20180418_full.jpg)
Personally Identifiable Data and the Specter of Customer Privacy
Leon Ravenna - KAR Auction Services, Inc.
Ways to Watch
![YouTube](/assets/images/youtube_200.png)