Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![A Rules Based Statistical Algorithm for Keystroke Detection](/assets/video/secsem/images/secsem_20090121_full.jpg)
A Rules Based Statistical Algorithm for Keystroke Detection
Paul Kidwell - Purdue University
![An Alternate Memory Architecture for Code Injection Prevention](/assets/video/secsem/images/secsem_20090128_full.jpg)
An Alternate Memory Architecture for Code Injection Prevention
Ryan Riley - Purdue University
![The Dark Side of Software Engineering and How to Defend Against It](/assets/video/secsem/images/secsem_20090204_full.jpg)
The Dark Side of Software Engineering and How to Defend Against It
Cassio Goldschmidt - Symantec
![Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory](/assets/video/secsem/images/secsem_20090211_full.jpg)
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
Mehmet Sahinoglu - Auburn University at Montgomery, AL
![Mace: Systems and Language Support for Building Correct, High-Performance Networked Services](/assets/video/secsem/images/secsem_20090218_full.jpg)
Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
Charles Killian - Purdue University
![Providing Privacy through Plausibly Deniable Search](/assets/video/secsem/images/secsem_20090225_full.jpg)
Providing Privacy through Plausibly Deniable Search
Mummoorthy Murugesan - Purdue University
![Security for the Next Internet over Heterogeneous Environments](/assets/video/secsem/images/secsem_20090311_full.jpg)
Security for the Next Internet over Heterogeneous Environments
Arjan Durresi - Indiana University Purdue University at Indianapolis
![Privacy – from accessing databases to location based services](/assets/video/secsem/images/secsem_20090408_full.jpg)
Privacy – from accessing databases to location based services
Johann-Christoph Freytag - Humboldt University
![User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach](/assets/video/secsem/images/secsem_20090415_full.jpg)
User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy - Notre Dame
Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University
![Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance](/assets/video/secsem/images/secsem_20090902_full.jpg)
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
Ragib Hasan - University of Illinois at Urbana-Champaign
![The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw](/assets/video/secsem/images/secsem_20090923_full.jpg)
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
Rick Aldrich - Booz Allen Hamilton
![Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security](/assets/video/secsem/images/secsem_20090930_full.jpg)
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
Richard Power - CyLab - Carnegie Mellon
![Information Security Management and IT Executives in a Top Management Team](/assets/video/secsem/images/secsem_20091021_full.jpg)
Information Security Management and IT Executives in a Top Management Team
Juhee Kwon - Purdue University
![Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges](/assets/video/secsem/images/secsem_20091028_full.jpg)
Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
Andre Koenig - Technical University Darmstadt
![Multi-Policy Access Control for Healthcare using Policy Machine](/assets/video/secsem/images/secsem_20091104_full.jpg)
Multi-Policy Access Control for Healthcare using Policy Machine
Zahid Pervaiz - Purdue University
![Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.](/assets/video/secsem/images/secsem_20091111_full.jpg)
Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
Leszek Lilien - Western Michigan University
![Safely Analyzing Sensitive Network Data](/assets/video/secsem/images/secsem_20091118_full.jpg)
Safely Analyzing Sensitive Network Data
Gerome Miklau - University of Massachusetts, Amherst
Ways to Watch
![YouTube](/assets/images/youtube_200.png)