Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 376 to 400 of 879Affiliation shown is the affiliation at the time the talk was given.
![: K-Anonymity in Social Networks: A Clustering Approach](/assets/video/secsem/images/secsem_20120411_full.jpg)
: K-Anonymity in Social Networks: A Clustering Approach
Traian Truta - Northern Kentucky University
![Privacy preserving attribute based group key management](/assets/video/secsem/images/secsem_20120328_full.jpg)
Privacy preserving attribute based group key management
Nabeel Mohamed - PhD Candidate, Purdue University
![Adding a Software Assurance Dimension to Supply Chain Practices](/assets/video/secsem/images/secsem_20120321_full.jpg)
Adding a Software Assurance Dimension to Supply Chain Practices
Randall Brooks - Raytheon
![Privacy-Preserving Assessment of Location Data Trustworthiness](/assets/video/secsem/images/secsem_20120307_full.jpg)
Privacy-Preserving Assessment of Location Data Trustworthiness
Chenyun Dai - Purdue University
![Cryptographic Protocols in the Era of Cloud Computing](/assets/video/secsem/images/secsem_20120229_full.jpg)
Cryptographic Protocols in the Era of Cloud Computing
Nishanth Chandran - Microsoft Research
![Forensic Carving of Network Packets with bulk_extractor and tcpflow](/assets/video/secsem/images/secsem_20120215_full.jpg)
Forensic Carving of Network Packets with bulk_extractor and tcpflow
Simson Garfinkel - Naval Postgraduate School
![Digital Citizenship: A Target's View of Security and Life Online](/assets/video/secsem/images/secsem_20120208_full.jpg)
Digital Citizenship: A Target's View of Security and Life Online
Kelley Misata - PhD Candidate, Purdue University
![Is it Time to add Trust to the Future Internet/Web?](/assets/video/secsem/images/secsem_20120201_full.jpg)
Is it Time to add Trust to the Future Internet/Web?
George Vanecek - Futurewei Technologies
![Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones](/assets/video/secsem/images/secsem_20111130_full.jpg)
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Apu Kapadia - Indiana University
![Jam me if you can: Mitigating the Impact of Inside Jammers](/assets/video/secsem/images/secsem_20111116_full.jpg)
Jam me if you can: Mitigating the Impact of Inside Jammers
Loukas Lazos - University of Arizona
![Process Implanting: A New Active Introspection Framework for Virtualization](/assets/video/secsem/images/secsem_20111109_full.jpg)
Process Implanting: A New Active Introspection Framework for Virtualization
Zhongshu Gu - Purdue University
![SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss](/assets/video/secsem/images/secsem_20111102_full.jpg)
SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss
Morgan Greenwood - Raytheon
![Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack](/assets/video/secsem/images/secsem_20111026_full.jpg)
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
Sheila Becker - University of Luxembourgh
![Ontological Semantic Technology Goes Phishing](/assets/video/secsem/images/secsem_20111019_full.jpg)
Ontological Semantic Technology Goes Phishing
Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University
![Enterprise-Wide Intrusions Involving Advanced Threats](/assets/video/secsem/images/secsem_20111012_full.jpg)
Enterprise-Wide Intrusions Involving Advanced Threats
Dan McWhorter and Steve Surdu - Mandiant Corporation
![Weighted Multiple Secret Sharing](/assets/video/secsem/images/secsem_20110928_full.jpg)
Weighted Multiple Secret Sharing
Xukai Zou - Indiana University-Purdue University Indianapolis
![Methods and Techniques for Protecting Data in Real Time on the Wire](/assets/video/secsem/images/secsem_20110921_full.jpg)
Methods and Techniques for Protecting Data in Real Time on the Wire
Joe Leonard - Global Velocity
![What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security](/assets/video/secsem/images/secsem_20110914_full.jpg)
What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security
David Zage - Sandia National Laboratories
Ways to Watch
![YouTube](/assets/images/youtube_200.png)