Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Computer-Related Incidents: Factors Related to Cause and Prevention](/assets/video/secsem/images/secsem_20070110_full.jpg)
Computer-Related Incidents: Factors Related to Cause and Prevention
Virginia Rezmierski - University of Michigan
![Scenario-Driven Construction of Enterprise Information Policy](/assets/video/secsem/images/secsem_20070207_full.jpg)
Scenario-Driven Construction of Enterprise Information Policy
Stuart Shapiro - The MITRE Corporation
![Cyber Security and the "NEW" world enterprise](/assets/video/secsem/images/secsem_20070221_full.jpg)
Cyber Security and the "NEW" world enterprise
Howard Schmidt - R & H Security Consulting LLC
![Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners](/assets/video/secsem/images/secsem_20070228_full.jpg)
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
Bhavani Thuraisingham - The University of Texas at Dallas
![Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls](/assets/video/secsem/images/secsem_20070307_full.jpg)
Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
Eugene Schultz - High Tower Software
![Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems](/assets/video/secsem/images/secsem_20070328_full.jpg)
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
Dr. Albert M. K. Cheng - University of Houston
How the Criminal Law Must Adapt to the Networked World
Richard Downing - US Department of Justice
![Hiding the Message Behind the Words: Advances in Natural Language Watermarking](/assets/video/secsem/images/secsem_20070418_full.jpg)
Hiding the Message Behind the Words: Advances in Natural Language Watermarking
Mercan Topkara - Purdue University
![Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics](/assets/video/secsem/images/secsem_20070425_full.jpg)
Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
Umut Topkara - Purdue University
![Towards Effective and Efficient Behavior-based Trust Models](/assets/video/secsem/images/secsem_20070829_full.jpg)
Towards Effective and Efficient Behavior-based Trust Models
Klemens Boehm - Karlsruhe University
![Applying Recreational Mathematics to Secure Multiparty Computation](/assets/video/secsem/images/secsem_20070905_full.jpg)
Applying Recreational Mathematics to Secure Multiparty Computation
Yvo Desmedt - University College, London
![Protecting Data Privacy: A Practical Guide to Managing Risk](/assets/video/secsem/images/secsem_20070919_full.jpg)
Protecting Data Privacy: A Practical Guide to Managing Risk
Jill Frisby - Crowe Chizek and Company LLC
Do You Have My Data? Prove it! (Provable Data Possession at Untrusted Stores)
Reza Curtmola - Purdue University
![What Every Engineer Needs To Know About Security And Where To Learn It](/assets/video/secsem/images/secsem_20071010_full.jpg)
What Every Engineer Needs To Know About Security And Where To Learn It
Neil Daswani - Google
![From Securing Navigation Systems to Securing Wireless Communication](/assets/video/secsem/images/secsem_20071017_full.jpg)
From Securing Navigation Systems to Securing Wireless Communication
Srdjan Capkun - ETH Zurich
![Protocols and Systems for Privacy Preserving Protection of Digital Identity](/assets/video/secsem/images/secsem_20071031_full.jpg)
Protocols and Systems for Privacy Preserving Protection of Digital Identity
Abhilasha Bhargav-Spantzel - Purdue University
![Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing](/assets/video/secsem/images/secsem_20071107_full.jpg)
Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
Richard Thieme - ThiemeWorks
![Wireless Router Insecurity: The Next Crimeware Epidemic](/assets/video/secsem/images/secsem_20071114_full.jpg)
Wireless Router Insecurity: The Next Crimeware Epidemic
Steve Myers, Indiana University - Indiana University
![CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations](/assets/video/secsem/images/secsem_20071128_full.jpg)
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
Ventkat Venkatakrishnan - University of Illinois at Chicago
Ways to Watch
![YouTube](/assets/images/youtube_200.png)