Archive
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
![Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box](/assets/video/secsem/images/secsem_20160120_full.jpg)
Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
Chris Clifton - Purdue University
![IN-ISAC: SOC, Security Awareness and More](/assets/video/secsem/images/secsem_20160210_full.jpg)
IN-ISAC: SOC, Security Awareness and More
Nicholas Sturgeon - Indiana Office of Technology
![Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule](/assets/video/secsem/images/secsem_20160224_full.jpg)
Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
Xukai Zou - Indiana University-Purdue University Indianapolis
![Context Aware, Policy based approaches to Security](/assets/video/secsem/images/secsem_20160302_full.jpg)
Context Aware, Policy based approaches to Security
Anupam Joshi - University of Maryland, Baltimore County
![Batch Techniques for Practical Private Information Retrieval](/assets/video/secsem/images/secsem_20160309_full.jpg)
Batch Techniques for Practical Private Information Retrieval
Ryan Henry - Indiana University
![Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations](/assets/video/secsem/images/secsem_20160406_full.jpg)
Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
Endadul Hoque
![Information Security: Through the Lens of Crisis Organizations](/assets/video/secsem/images/secsem_20160420_full.jpg)
Information Security: Through the Lens of Crisis Organizations
Kelley Misata - Purdue University
![Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications](/assets/video/secsem/images/secsem_20160824_full.jpg)
Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
Michael Taylor - Rook Security
![The role of cyber insurance in security and risk management](/assets/video/secsem/images/secsem_20160928_full.jpg)
The role of cyber insurance in security and risk management
Nicholas Reuhs - Ice Miller LLP
![Enforcing Least Privilege Memory Views for Multithreaded Applications](/assets/video/secsem/images/secsem_20161012_full.jpg)
Enforcing Least Privilege Memory Views for Multithreaded Applications
Terry Ching-Hsiang Hsu - Purdue University
Protecting Computer Systems by Eliminating Vulnerabilities
Byoungyoung Lee - Purdue University
![The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain](/assets/video/secsem/images/secsem_20161116_full.jpg)
The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
Corey Holzer - Purdue University
![When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices](/assets/video/secsem/images/secsem_20161207_full.jpg)
When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices
Yinqian Zhang - The Ohio State University
Ways to Watch
![YouTube](/assets/images/youtube_200.png)