Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Automatic Detection of Protocol Manipulation Attacks in Distributed Systems Implementations
Cristina Nita-Rotaru - Purdue University
A Semantic Baseline for Spam Filtering
Christian F. Hempelmann - Texas A&M University-Commerce
Using Probabilistic Generative Models for Ranking Risks of Android Apps
Chris Gates - Purdue University
I'm not stealing, I'm merely borrowing - Plagiarism in Smartphone App Markets
Rahul Potharaju - Purdue University
Protecting Today's Enterprise Systems against Zero-day Attacks
Saurabh Bagchi - Purdue University
Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
Emiliano DeCristofaro - PARC
The Growing Role--and Problems--Facing Science and Engineering
Norman R. Augustine - Lockheed Martin Corporation (Retired)
Towards Automated Problem Inference from Trouble Tickets
Rahul Potharaju - Purdue University
New possibilities of steganography based on Kuznetsov-Tsybakov problem
Jarek Duda - Purdue University
Information Security Challenges in an Academic Environment
Keith Watson - Purdue University
BIOS Chronomancy: Using Timing-Based Attestation to Detect Firmware Rootkits
John Butterworth - MITRE
Protecting a billion identities without losing (much) sleep
Mark Crosbie, Tim Tickel, Four Flynn - Facebook
The Durkheim Project: Privacy Considerations in Predicting Military and Veteran Suicide Risk
Paul Thompson - Dartmouth
Membership Privacy: A Unifying Framework For Privacy Definitions
Ninghui Li - Purdue University
Yahoo! Messenger Forensics on Windows Vista and Windows 7
Tejashree Datar - Purdue University