Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 226 to 250 of 894Affiliation shown is the affiliation at the time the talk was given.
What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Lotfi ben-Othmane - Iowa State University
Securing the Future of Business: Broadening the Role of Security Technology
Kirsten Bay - Cyber adAPT
Refraction Networking: Censorship Circumvention in the Core of the Internet
Nikita Borisov - University of Illinois at Urbana-Champaign
Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Jerome Edge - Lockheed Martin
Locally Differential Private Protocols for Frequency Estimation
Tianhao Wang - Purdue University
The Stark Reality of Red vs. Blue and Why it's Not Working
Chris Roberts - Acalvio Technologies
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
Shiqing Ma - Purdue University
Enabling Trust and Efficiency in Provenance-Aware Systems
Adam Bates - University of Illinois at Urbana-Champaign
Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
Ron Ross - National Institute for Standards and Technology (NIST)
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
Sze Yiu Chau - Purdue University
DataShield: Configurable Data Confidentiality and Integrity
Scott Carr - Purdue University
CIO Risk Appetite and Information Security Management
Tawei (David) Wang - DePaul University