Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 401 to 425 of 879Affiliation shown is the affiliation at the time the talk was given.
![Detecting Bots in Online Games using Human Observational Proofs](/assets/video/secsem/images/secsem_20110907_full.jpg)
Detecting Bots in Online Games using Human Observational Proofs
Steven Gianvecchio - MITRE
![Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet](/assets/video/secsem/images/secsem_20110420_full.jpg)
Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet
Jose Fernandez - Montreal Polytechnic
![FuzzyFusion™, an application architecture for multisource information fusion](/assets/video/secsem/images/secsem_20110413_full.jpg)
FuzzyFusion™, an application architecture for multisource information fusion
Ronda R. Henning - Harris Corporation
![Society, Law Enforcement and the Internet: Models for Give and Take](/assets/video/secsem/images/secsem_20110406_full.jpg)
Society, Law Enforcement and the Internet: Models for Give and Take
Carter Bullard - QoSient, LLC
The Threat to Our Nation's Infrastructure and Intellectual Property Is Substantial
Dennis McCallam - Northrop Grumman
![Wireless Technologies and how it relates to cyber security research](/assets/video/secsem/images/secsem_20110323_full.jpg)
Wireless Technologies and how it relates to cyber security research
Kim Trieu - Lockheed Martin
![Modeling DNS Security: Misconfiguration, Availability, and Visualization](/assets/video/secsem/images/secsem_20110302_full.jpg)
Modeling DNS Security: Misconfiguration, Availability, and Visualization
Casey Deccio - Sandia National Labs
![Understanding insiders: An analysis of risk-taking behavior *](/assets/video/secsem/images/secsem_20110209_full.jpg)
Understanding insiders: An analysis of risk-taking behavior *
Fariborz Farahmand - Purdue University
![User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds](/assets/video/secsem/images/secsem_20110126_full.jpg)
User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds
Torsten Braun - University of Bern
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Junghwan Rhee - Purdue University
![Nudging the Digital Pirate: Behavioral Issues in the Piracy Context](/assets/video/secsem/images/secsem_20101201_full.jpg)
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
Matthew Hashim - Purdue University
![Security Applications for Physically Unclonable Functions](/assets/video/secsem/images/secsem_20101117_full.jpg)
Security Applications for Physically Unclonable Functions
Michael Kirkpatrick - Purdue University
![Detecting Coordinated Attacks with Traffic Analysis](/assets/video/secsem/images/secsem_20101110_full.jpg)
Detecting Coordinated Attacks with Traffic Analysis
Nikita Borisov - University of Illinois at Urbana-Champaign
![The Role of Automata Theory in Software Verification](/assets/video/secsem/images/secsem_20101027_full.jpg)
The Role of Automata Theory in Software Verification
P. Madhusudan - University of Illinois at Urbana-Champaign
![Trust and Protection in the Illinois Browser Operating System](/assets/video/secsem/images/secsem_20101020_full.jpg)
Trust and Protection in the Illinois Browser Operating System
Sam King - University of Illinois
Ways to Watch
![YouTube](/assets/images/youtube_200.png)