Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine
Ambrose Kam - Lockheed Martin
Problems and Challenges in Data Security Posture Management
Mummoorthy Murugesan - Normalyze, Inc.
Chinese Views of Information and Future Warfare
Dean Cheng - Potomac Institute for Policy Studies
Trust Engineering – from Developing Resilient Systems to Artificial Conscience
Arjan Durresi - IUPUI
Elements of Robust Real-Time Systems: Regularity-Based Virtualization and Functional Reactive Programming
Albert Cheng - University of Houston
Don't Copy That Floppy!: A History of Anti-cracking Controls in Early Video Games and Its Economic Impact
Kelly FitzGerald - Raytheon Technologies
Advancements and New Developments in Biometric Privacy, Security and Ethics
Marina Gavrilova - University of Calgary
Cyber's Offspring: AI and the Missing Security Mindset
Chris Demchak - US Naval War College
From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
Jeremiah Sahlberg - Tevora
Cyber defender's plead - If it's not codified – Please go away
Rita Foster - Idaho National Laboratory
Enhancing Software Supply Chain Security in Distributed Systems
Christopher Nuland - Red Hat
How the Cyberspace Domain has Changed the Game for the Space Domain
Scott Sage, Erin Miller
Vulnerability Identification and Defense Construction in Cyber-Physical Systems
Khaled Serag
Sorting Surveillance Benefits from Harms
Rebecca Herold - Ponemon Institute Distinguished Fellow
Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
Robert Denz - Riverside Research
Backtracking Intrusions in Modern Industrial Internet of Things
Mu Zhang - University of Utah