Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 226 to 250 of 903Affiliation shown is the affiliation at the time the talk was given.

Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
Josh Corman - PTC

Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
Chris Reed - Eli Lilly

Mind Your Credit: Assessing the Health of the Ripple Credit Network
Pedro Moreno-Sanchez - Purdue University

What Roles Can Empirical Research Play to Advance Software Security Knowledge?
Lotfi ben-Othmane - Iowa State University

Securing the Future of Business: Broadening the Role of Security Technology
Kirsten Bay - Cyber adAPT

Refraction Networking: Censorship Circumvention in the Core of the Internet
Nikita Borisov - University of Illinois at Urbana-Champaign

Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
Jerome Edge - Lockheed Martin

Locally Differential Private Protocols for Frequency Estimation
Tianhao Wang - Purdue University

The Stark Reality of Red vs. Blue and Why it's Not Working
Chris Roberts - Acalvio Technologies
Ways to Watch
