Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 26 to 50 of 908Affiliation shown is the affiliation at the time the talk was given.

IDART (Information Design Assurance Red Team): A Red Team Assessment Methodology
Russel Waymire - Sandia

Empowering the Next Generation of Digital Defenders: Ethics in Cybersecurity and Emerging Technologies
Chris Kubecka de Medina - HypaSec

AI's Security Maze: Navigating AI's Top Cybersecurity Risks Through Strategic Planning and Resilient Operations
David Haddad - Purdue University

Privacy and Security in ML: A Priority, not an Afterthought
Shagufta Mehnaz - The Pennsylvania State University

Defining Trusted Artificial Intelligence for the National Security Space
David Stracuzzi - Sandia National Laboratories

In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
Evan Sultanik - Trail of Bits

Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
Daniel Shoemaker - University of Detroit Mercy

The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
Douglas Huelsbeck - DoD

The Fault in Our Stars: How Reputation Systems Fail in Practice
Alejandro Cuevas - Carnegie Mellon University

Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
Jennifer Bayuk - Jennifer L. Bayuk, LLC

On Security Operations for AI Systems
Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)

Tensor Decomposition Methods for Cybersecurity
Maksim Eren - Los Alamos National Laboratory

Multifactor Authentication - The Problem, Recommendations, and Future Concerns
William Malik - Malik Consulting

Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
Solomon Sonya - Purdue University

Invisible Signatures: Device Fingerprinting in a Connected World
Sandhya Aneja - Marist College

Backtracking Intrusions in Modern Industrial Internet of Things
Mu Zhang - University of Utah

Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Robert Denz - Riverside Research
Ways to Watch
