Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Secure and Private Outsourcing to Untrusted Cloud Servers](/assets/video/secsem/images/secsem_20140129_full.jpg)
Secure and Private Outsourcing to Untrusted Cloud Servers
Shumiao Wang - Purdue University
![Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks](/assets/video/secsem/images/secsem_20140212_full.jpg)
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Ting-Fang Yen - RSA
![Technical Tradeoffs in the NSA's Mass Phone Call Program](/assets/video/secsem/images/secsem_20140219_full.jpg)
Technical Tradeoffs in the NSA's Mass Phone Call Program
Ed Felten - Princeton University
![Delivering "Always-on" Services Despite Flaky Network Infrastructure](/assets/video/secsem/images/secsem_20140226_full.jpg)
Delivering "Always-on" Services Despite Flaky Network Infrastructure
Rahul Potharaju - Purdue University
![Machine Intelligence for Biometric and On-Line Security](/assets/video/secsem/images/secsem_20140305_full.jpg)
Machine Intelligence for Biometric and On-Line Security
Marina Gavrilova - University of Calgary
![General-Purpose Secure Computation and Outsourcing](/assets/video/secsem/images/secsem_20140312_full.jpg)
General-Purpose Secure Computation and Outsourcing
Marina Blanton - University of Notre Dame
![Online Privacy Agreements, is it Informed Consent?](/assets/video/secsem/images/secsem_20140416_full.jpg)
Online Privacy Agreements, is it Informed Consent?
Masooda Bashir - University of Illinois at Urbana-Champaign
![DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse](/assets/video/secsem/images/secsem_20140903_full.jpg)
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
Brendan Saltaformaggio - Purdue University
![Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis](/assets/video/secsem/images/secsem_20141001_full.jpg)
Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis
Larry Ponemon - Ponemon Institute
![Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers](/assets/video/secsem/images/secsem_20141105_full.jpg)
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
Barrett Caldwell and Omar Eldardiry - Purdue University
![How Program Analysis can be Used in Security Applications](/assets/video/secsem/images/secsem_20141210_full.jpg)
How Program Analysis can be Used in Security Applications
Xiangyu Zhang - Purdue University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)