Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 526 to 550 of 879Affiliation shown is the affiliation at the time the talk was given.
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice
![Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems](/assets/video/secsem/images/secsem_20070328_full.jpg)
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston
![Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls](/assets/video/secsem/images/secsem_20070307_full.jpg)
Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software
![Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners](/assets/video/secsem/images/secsem_20070228_full.jpg)
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas
![Cyber Security and the "NEW" world enterprise](/assets/video/secsem/images/secsem_20070221_full.jpg)
Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC
![Scenario-Driven Construction of Enterprise Information Policy](/assets/video/secsem/images/secsem_20070207_full.jpg)
Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation
![Computer-Related Incidents: Factors Related to Cause and Prevention](/assets/video/secsem/images/secsem_20070110_full.jpg)
Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan
![The Psychology of Computer Deviance: How it can assist in digital evidence analysis.](/assets/video/secsem/images/secsem_20061206_full.jpg)
The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
Marc Rogers - Purdue University
![OS-Level Taint Analysis for Malware Investigation and Defense](/assets/video/secsem/images/secsem_20061129_full.jpg)
OS-Level Taint Analysis for Malware Investigation and Defense
Dongyan Xu - Purdue University
![One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)](/assets/video/secsem/images/secsem_20061115_full.jpg)
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
Richard Power - GS(3) Intelligence & Words of Power
![Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks](/assets/video/secsem/images/secsem_20061108_full.jpg)
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
David Zage - Purdue University
![Developing an Operational Framework for Integrated System Security](/assets/video/secsem/images/secsem_20061101_full.jpg)
Developing an Operational Framework for Integrated System Security
Paula DeWitte - St. Mary’s Law School in San Antonio
![Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies](/assets/video/secsem/images/secsem_20061025_full.jpg)
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Qihua Wang - Purdue University
![Network Security Begins at Home: Changing Consumer Behavior for i-Safety](/assets/video/secsem/images/secsem_20061011_full.jpg)
Network Security Begins at Home: Changing Consumer Behavior for i-Safety
Nora Rifon - Michigan State University
![Verification of Integrity for Outsourced Content Publishing and Database Queries](/assets/video/secsem/images/secsem_20061004_full.jpg)
Verification of Integrity for Outsourced Content Publishing and Database Queries
Danfeng Yao - Brown University
![The Secure Information Sharing Problem and Solution Approaches](/assets/video/secsem/images/secsem_20060927_full.jpg)
The Secure Information Sharing Problem and Solution Approaches
Ravi Sandhu - George Mason University
![Prioritizing Processes and Controls for Effective and Measurable Security](/assets/video/secsem/images/secsem_20060920_full.jpg)
Prioritizing Processes and Controls for Effective and Measurable Security
Gene Kim - Tripwire, Inc
![Real-Time Visualization of Network Attacks on High-Speed Links](/assets/video/secsem/images/secsem_20060913_full.jpg)
Real-Time Visualization of Network Attacks on High-Speed Links
Hyogon Kim - Korea University/PU Visitor
Ways to Watch
![YouTube](/assets/images/youtube_200.png)