Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 476 to 500 of 879Affiliation shown is the affiliation at the time the talk was given.
![An Alternate Memory Architecture for Code Injection Prevention](/assets/video/secsem/images/secsem_20090128_full.jpg)
An Alternate Memory Architecture for Code Injection Prevention
Ryan Riley - Purdue University
![A Rules Based Statistical Algorithm for Keystroke Detection](/assets/video/secsem/images/secsem_20090121_full.jpg)
A Rules Based Statistical Algorithm for Keystroke Detection
Paul Kidwell - Purdue University
![Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step](/assets/video/secsem/images/secsem_20081210_full.jpg)
Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
Ibrahim Baggili - Purdue University
![The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline](/assets/video/secsem/images/secsem_20081105_full.jpg)
The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
Scott Orton - Ratheon
![Trends in Identity Management](/assets/video/secsem/images/secsem_20081029_full.jpg)
Trends in Identity Management
Kenji Takahashi - ITT Information Sharing Platform Laboratories
![Signature Analysis Coupled With Slicing Analysis for the Validation of Software](/assets/video/secsem/images/secsem_20081015_full.jpg)
Signature Analysis Coupled With Slicing Analysis for the Validation of Software
Adam Dugger - Arxan
![Measuring the Attack Surfaces of Enterprise Software Systems](/assets/video/secsem/images/secsem_20081008_full.jpg)
Measuring the Attack Surfaces of Enterprise Software Systems
Yuecel Karabulut - SAP Research
![Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors](/assets/video/secsem/images/secsem_20080917_full.jpg)
Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
Shimon Modi - Purdue University
![Virtualization: Resource Coupling and Security across the Stack](/assets/video/secsem/images/secsem_20080910_full.jpg)
Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft
![Private Queries in Location Based Services: Anonymizers are not Necessary](/assets/video/secsem/images/secsem_20080903_full.jpg)
Private Queries in Location Based Services: Anonymizers are not Necessary
Gabriel Ghinita - Purdue University
![Exploitable Redirects on the Web: Identification, Prevalence, and Defense](/assets/video/secsem/images/secsem_20080827_full.jpg)
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Minaxi Gupta - Indiana University
![Shifting focus: Aligning security with risk management](/assets/video/secsem/images/secsem_20080409_full.jpg)
Shifting focus: Aligning security with risk management
Jack Jones - Risk Management Insight
![Exploiting Opportunistic Scheduling in Cellular Data Networks](/assets/video/secsem/images/secsem_20080402_full.jpg)
Exploiting Opportunistic Scheduling in Cellular Data Networks
Hao Chen - University of California, Davis
![Towards Event Source Location Privacy in Wireless Sensor Networks](/assets/video/secsem/images/secsem_20080326_full.jpg)
Towards Event Source Location Privacy in Wireless Sensor Networks
Sencun Zhu - Pennsylvania State
Multiple Independent Levels of Security Architecture: A High Robustness Approach Using COTS
Ben Calloni - Lockheed Martin
Ways to Watch
![YouTube](/assets/images/youtube_200.png)