Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Dissecting Digital Data: Context & Meaning through Analytics](/assets/video/secsem/images/secsem_20100210_full.jpg)
Dissecting Digital Data: Context & Meaning through Analytics
Marcus Rogers - Purdue University
![Provenance-based Data Trustworthiness Assessment in Data Streams](/assets/video/secsem/images/secsem_20100217_full.jpg)
Provenance-based Data Trustworthiness Assessment in Data Streams
Hyo-Sang Lim - Purdue University
![Ribbons, A Partially-Shared Memory Programming Model](/assets/video/secsem/images/secsem_20100224_full.jpg)
Ribbons, A Partially-Shared Memory Programming Model
Kevin Hoffman - PhD candidate in the Computer Science, Purdue University
![Detection and protection from denial of service attacks in grids by accountability agents](/assets/video/secsem/images/secsem_20100303_full.jpg)
Detection and protection from denial of service attacks in grids by accountability agents
Wonjun Lee - Purdue University
![A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems](/assets/video/secsem/images/secsem_20100324_full.jpg)
A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems
David Zage - Purdue University
![60 years of scientific research in cryptography: a reflection](/assets/video/secsem/images/secsem_20100407_full.jpg)
60 years of scientific research in cryptography: a reflection
Yvo Desmedt - University College London, UK
![The role of System Security Engineering in the engineering lifecycle](/assets/video/secsem/images/secsem_20100421_full.jpg)
The role of System Security Engineering in the engineering lifecycle
Stephen Dill - Lockheed Martin
![Ontological Semantic Technology for Detecting Insider Threat and Social Engineering](/assets/video/secsem/images/secsem_20100428_full.jpg)
Ontological Semantic Technology for Detecting Insider Threat and Social Engineering
Victor Raskin & Julia Taylor - Purdue University
![Secure Network Coding for Wireless Mesh Networks](/assets/video/secsem/images/secsem_20100825_full.jpg)
Secure Network Coding for Wireless Mesh Networks
Cristina Nita-Rotaru - Purdue University
![Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses](/assets/video/secsem/images/secsem_20100915_full.jpg)
Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
Xiaofeng Wang - Indiana University
![Global Study of Web 2.0 Use in Organizations](/assets/video/secsem/images/secsem_20101006_full.jpg)
Global Study of Web 2.0 Use in Organizations
Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University
![Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems](/assets/video/secsem/images/secsem_20101013_full.jpg)
Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems
Alex Liu - Michigan State University
![Trust and Protection in the Illinois Browser Operating System](/assets/video/secsem/images/secsem_20101020_full.jpg)
Trust and Protection in the Illinois Browser Operating System
Sam King - University of Illinois
![The Role of Automata Theory in Software Verification](/assets/video/secsem/images/secsem_20101027_full.jpg)
The Role of Automata Theory in Software Verification
P. Madhusudan - University of Illinois at Urbana-Champaign
![Detecting Coordinated Attacks with Traffic Analysis](/assets/video/secsem/images/secsem_20101110_full.jpg)
Detecting Coordinated Attacks with Traffic Analysis
Nikita Borisov - University of Illinois at Urbana-Champaign
![Security Applications for Physically Unclonable Functions](/assets/video/secsem/images/secsem_20101117_full.jpg)
Security Applications for Physically Unclonable Functions
Michael Kirkpatrick - Purdue University
![Nudging the Digital Pirate: Behavioral Issues in the Piracy Context](/assets/video/secsem/images/secsem_20101201_full.jpg)
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
Matthew Hashim - Purdue University
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Junghwan Rhee - Purdue University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)