Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Learning from Information Security Maturity: A Textual Analysis](/assets/video/secsem/images/secsem_20150114_full.jpg)
Learning from Information Security Maturity: A Textual Analysis
Jackie Rees Ulmer - Purdue University
![Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds](/assets/video/secsem/images/secsem_20150128_full.jpg)
Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
Savvas Savvides - Purdue University
![Regulatory Compliance Checking Over Encrypted Audit Logs](/assets/video/secsem/images/secsem_20150204_full.jpg)
Regulatory Compliance Checking Over Encrypted Audit Logs
Omar Chowdhury - Purdue University
![Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology](/assets/video/secsem/images/secsem_20150304_full.jpg)
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
Xinming Ou - Kansas State University
![Breaking Mobile Social Networks for Automated User Location Tracking](/assets/video/secsem/images/secsem_20150401_full.jpg)
Breaking Mobile Social Networks for Automated User Location Tracking
Kui Ren - University at Buffalo
![Privacy Potpourri: Changing Privacy from the Bottom Up](/assets/video/secsem/images/secsem_20150408_full.jpg)
Privacy Potpourri: Changing Privacy from the Bottom Up
Rebecca Herold - Rebecca Herold & Associates, LLC
![CERIAS Poster Contest Winners](/assets/video/secsem/images/secsem_20150422_full.jpg)
CERIAS Poster Contest Winners
Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University
![Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet](/assets/video/secsem/images/secsem_20150429_full.jpg)
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Steve Bellovin - Columbia University
![Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations](/assets/video/secsem/images/secsem_20150826_full.jpg)
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Samuel Jero - Purdue University
![SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps](/assets/video/secsem/images/secsem_20150902_full.jpg)
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Jianjun Huang - Purdue University
![P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions](/assets/video/secsem/images/secsem_20150909_full.jpg)
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
![Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols](/assets/video/secsem/images/secsem_20150930_full.jpg)
Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University
![The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why](/assets/video/secsem/images/secsem_20151007_full.jpg)
The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec
![A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records](/assets/video/secsem/images/secsem_20151014_full.jpg)
A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University
![Case Study of the Authur Pendragon Cyber Threat at The University of Alabama](/assets/video/secsem/images/secsem_20151028_full.jpg)
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University
![Secure Multiparty Computation and Differential Privacy](/assets/video/secsem/images/secsem_20151104_full.jpg)
Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University
![A Secure Communication Protocol for Drones and Smart Objects](/assets/video/secsem/images/secsem_20151118_full.jpg)
A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University
![Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories](/assets/video/secsem/images/secsem_20151202_full.jpg)
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo
![Preventing or Penalizing Equivocation in Decentralized Environments](/assets/video/secsem/images/secsem_20151209_full.jpg)
Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)