Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
A Survey of intrusion detection research at the IBM Zurich Research Laboratory
Marc Dacier - IBM Global Security Laboratory
Practical Security Solutions Using Smartcards
Naomaru Itoi and James Rees - CITIUniversity of Michigan
Trends in Intrusion Detection: Perspectives from a Security Tool Vendor
Gene Kim - Tripwire Security Systems Inc.
Effectively Managing Your E-Business Risk Profile - A Standard Approach for Assessing Risk and Protecting Corporate Stakeholders
Rick Davis - INSUREtrust.com

Image and Video Watermarking: An Overview
Edward J. Delp - Video and Image Processing Laboratory (VIPER), Purdue School of Electrical and Computer Engineering
Technical and legal approaches to spam
David E. Sorkin - Center for Information Technology & Privacy Law at The John Marshall Law School
A Formal Framework and Evaluation Method for Protocol Denial of Service
Catherine Meadows - Naval Research Laboratory

Computer Forensics Examinations in the Consulting Arena
James R. C. Hansen - Trident Data Systems

Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study
Mahesh Tripunitara - Purdue CERIAS

Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
Wenliang Du & Mahesh Tripunitara - Purdue CERIAS
Asynchronous Transfer Mode (ATM) Networks: Security Vulnerability Research
Susan Labonte - MITRE Corporation
Developing Custom Intrusion Detection Filters Using Data Mining
Chris Clifton - The MITRE Corporation
Ways to Watch
