Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Pragathi Jha, Modeling Cyber Adversaries: A Critical Survey of Methods and Assumptions
|
Apr 29, 2026 |
|
Smriti Bhatt, Evolving Security Landscape in the Agentic AI-Enabled IoT Era
|
Apr 22, 2026 |
|
Gary Hayslip, The AI Arms Race
|
Apr 15, 2026 |
|
Brian Peretti, Symposium Closing Keynote: AI, Cybersecurity, and the Path Forward
|
Apr 08, 2026 |
|
Jen Sims, Analyzing Supply Chain Risk in Mobile Applications for Home Energy Storage Systems
|
Apr 01, 2026 |
|
Ashish Kundu, Quantum Secure Networks
|
Mar 11, 2026 |
|
Ruqi Zhang, Discovering and Controlling AI Safety Risks in Foundation Models: A Probabilistic Perspective
|
Mar 04, 2026 |
|
Danny Vukobratovich, ISO 27001 as the Engine, NIST CSF 2.0 as the Dashboard, A Practical Operating Model
|
Feb 25, 2026 |
|
Thai Le, Towards Robust and Trustworthy AI Speech Models: What You Read Isn't What You Hear
|
Feb 18, 2026 |
|
Bethanie Williams, AI-Assisted Cyber-Physical Attack Detection in Smart Manufacturing Systems
|
Feb 11, 2026 |
|
Mary Jean Amon, Parental Sharing ("Sharenting") Through the Lens of Interdependent Privacy
|
Feb 04, 2026 |
|
Young Kim, Counterfeit Medical Devices and Medicines as a Fundamental Cyber-Physical Security Problem
|
Jan 28, 2026 |
|
Vijayanth Tummala, Evaluating The Impact of Cyberattacks On AI-based Machine Vision Systems: A Case Study of Threaded Fasteners
|
Jan 21, 2026 |
|
Rohan Paleja, Building Interpretability into Human-Aware Robots through Neural Tree-Based Models
|
Jan 14, 2026 |
|
Peter Ukhanov, From MOVEit to EBS – a Look at Mass Exploitation Extortion Campaigns
|
Dec 10, 2025 |
|
Antonio Bianchi, Attacking and Defending Modern Software with LLMs
|
Dec 03, 2025 |
|
Stephen Flowerday, The Hidden Laundromat at Play: how illicit value moves through online games
|
Nov 19, 2025 |
|
Abulhair Saparov, Can/Will LLMs Learn to Reason?
|
Nov 12, 2025 |
|
Hanshen Xiao, When is Automatic Privacy Proof Possible for Black-Box Processing?
|
Nov 05, 2025 |
|
Marcus Botacin, Malware Detection under Concept Drift: Science and Engineering
|
Oct 29, 2025 |
|
Rajiv Khanna, The Shape of Trust: Structure, Stability, and the Science of Unlearning
|
Oct 22, 2025 |
|
Matthew Sharp, Securing Linux in a Heterogenous Enterprise Environment
|
Oct 15, 2025 |
|
Stephen Kines, Four Deadly Sins of Cyber: Sloth, Gluttony, Greed & Pride
|
Oct 08, 2025 |
|
Sanket Naik, AI Agents for DevSecOps
|
Oct 01, 2025 |
|
Richard Thieme, Thinking Like a Hacker in the Age of AI
|
Sep 24, 2025 |
|
Rolf Oppliger, E2EE Messaging: State of the Art and Future Challenges
|
Sep 17, 2025 |
|
Kris Lovejoy, The Converged Threat Landscape: What's Next in Cybersecurity
|
Sep 10, 2025 |
|
Dave Schroeder, Utilization of National Guard Cyber Forces in Title 32 Status for National Cyber Missions
|
Sep 03, 2025 |
|
Nick Selby, Build Things Properly
|
Aug 27, 2025 |
|
Paul Vixie, Force Projection in the Information Domain: Implications of DNS Security
|
Apr 30, 2025 |
|
Tristen Mullins, Using Side-Channels for Critical Infrastructure Protection
|
Apr 23, 2025 |
|
Richard Love, Russian Hacking: Why, How, Who, and to What End
|
Apr 16, 2025 |
|
Josiah Dykstra, Lessons for Cybersecurity from the American Public Health System
|
Apr 09, 2025 |
|
Michael Clothier, Annual CERIAS Security Symposium Closing Keynote IT, OT, IoT — It's Really Just the "T": An International and Historical Perspective
|
Apr 02, 2025 |
|
Tim Benedict, The Future of AI Depends on Guardrails
|
Mar 26, 2025 |
|
Amir Sadovnik, What do we mean when we talk about AI Safety and Security?
|
Mar 12, 2025 |
|
Hisham Zahid & David Haddad, Decrypting the Impact of Professional Certifications in Cybersecurity Careers
|
Mar 05, 2025 |
|
Ali Al-Haj, Zero Trust Architectures and Digital Trust Frameworks: A Complementary or Contradictory Relationship?
|
Feb 26, 2025 |
|
Adam Shostack, Risk is Not Axiomatic
|
Feb 12, 2025 |
|
Mustafa Abdallah, Effects of Behavioral Decision-Making in Proactive Security Frameworks in Networked Systems
|
Feb 05, 2025 |
|
D. Richard Kuhn, How Can We Provide Assured Autonomy?
|
Jan 29, 2025 |
|
Nick Harrell, Mechanisms of Virality in Online Discourse
|
Jan 22, 2025 |
|
Stanislav Kruglik, Querying Twice: How to Ensure We Obtain the Correct File in a Private Information Retrieval Protocol
|
Jan 15, 2025 |
|
Christopher Yeomans, Fairness as Equal Concession: Critical Remarks on Fair AI
|
Dec 04, 2024 |
|
Mason Rice, Adversarial C2 inside OT Networks
|
Nov 20, 2024 |
|
Yanxue Jia, HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
|
Nov 06, 2024 |
|
Roger Grimes, Many Ways to Hack MFA
|
Oct 30, 2024 |
|
Alessandro Acquisti, Behavioral Advertising and Consumer Welfare
|
Oct 23, 2024 |
|
Xiaoqi Chen, SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
|
Oct 16, 2024 |
|
Zhou Li, The Road Towards Accurate, Scalable and Robust Graph-based Security Analytics: Where Are We Now?
|
Oct 09, 2024 |
|
Michail Maniatakos, Dissecting the Software Supply Chain of Modern Industrial Control Systems
|
Oct 02, 2024 |
|
Chance Younkin, Shamrock Cyber – When Luck Just Isn't Enough
|
Sep 25, 2024 |
|
Ashok Vardhan Raja, Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms
|
Sep 18, 2024 |
|
Russel Waymire, IDART (Information Design Assurance Red Team): A Red Team Assessment Methodology
|
Sep 11, 2024 |
|
Chris Kubecka de Medina, Empowering the Next Generation of Digital Defenders: Ethics in Cybersecurity and Emerging Technologies
|
Sep 04, 2024 |
|
David Haddad, AI's Security Maze: Navigating AI's Top Cybersecurity Risks Through Strategic Planning and Resilient Operations
|
Aug 28, 2024 |
|
Shagufta Mehnaz, Privacy and Security in ML: A Priority, not an Afterthought
|
Aug 21, 2024 |
|
David Stracuzzi, Defining Trusted Artificial Intelligence for the National Security Space
|
Apr 24, 2024 |
|
Evan Sultanik, In Pursuit of Silent Flaws: Dataflow Analysis for Bugfinding and Triage
|
Apr 10, 2024 |
|
Daniel Shoemaker, Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education
|
Mar 27, 2024 |
|
Douglas Huelsbeck, The Importance of Security by Design & The Importance of Including Cybersecurity Experts in Your Business Decisions
|
Mar 20, 2024 |
|
Alejandro Cuevas, The Fault in Our Stars: How Reputation Systems Fail in Practice
|
Mar 06, 2024 |
|
Sanket Naik, Modern Enterprise Cybersecurity: A CISO perspective
|
Feb 28, 2024 |
|
Jennifer Bayuk, Stepping Through Cybersecurity Risk Management A Systems Thinking Approach
|
Feb 21, 2024 |
|
Jonathan (Jono) Spring, On Security Operations for AI Systems
|
Feb 14, 2024 |
|
Maksim Eren, Tensor Decomposition Methods for Cybersecurity
|
Feb 07, 2024 |
|
William Malik, Multifactor Authentication - The Problem, Recommendations, and Future Concerns
|
Jan 31, 2024 |
|
Solomon Sonya, Enhancing Cybersecurity via Lessons Learned from the Evolution of Malware
|
Jan 24, 2024 |
|
Leigh Metcalf, Grep for Evil
|
Jan 17, 2024 |
|
Sandhya Aneja, Invisible Signatures: Device Fingerprinting in a Connected World
|
Jan 10, 2024 |
|
Mu Zhang, Backtracking Intrusions in Modern Industrial Internet of Things
|
Dec 06, 2023 |
|
Robert Denz, Mind the Gap: Vulnerabilities and Opportunities for Cyber R&D at the Edge
|
Nov 29, 2023 |
|
Andy Ellis, How to Build and Measure a Corporate Security Program
|
Nov 15, 2023 |
|
Wen Masters, Cyber Risk Analysis for Critical Infrastructure
|
Nov 08, 2023 |
|
Steve Lipner, Thinking About the Future of Encryption
|
Nov 01, 2023 |
|
Courtney Falk, The Bride of the Pod People
|
Oct 25, 2023 |
|
Derek Dervishian, Fuzzing: Understanding the Landscape
|
Oct 18, 2023 |
|
Rebecca Herold, Sorting Surveillance Benefits from Harms
|
Oct 11, 2023 |
|
Khaled Serag, Vulnerability Identification and Defense Construction in Cyber-Physical Systems
|
Oct 04, 2023 |
|
Scott Sage, Erin Miller, How the Cyberspace Domain has Changed the Game for the Space Domain
|
Sep 27, 2023 |
|
Christopher Nuland, Enhancing Software Supply Chain Security in Distributed Systems
|
Sep 20, 2023 |
|
Stuart Shapiro, MITRE PANOPTIC™ Privacy Threat Model
|
Sep 13, 2023 |
|
Rita Foster, Cyber defender's plead - If it's not codified – Please go away
|
Sep 06, 2023 |
|
Dr. Anand Singh, The State of Software Supply Chain Security
|
Aug 30, 2023 |
|
Marina Gavrilova, Advancements and New Developments in Biometric Privacy, Security and Ethics
|
Apr 19, 2023 |
|
Kelly FitzGerald, Don't Copy That Floppy!: A History of Anti-cracking Controls in Early Video Games and Its Economic Impact
|
Apr 12, 2023 |
|
Sayak Ray, Pre-Silicon Hardware Security Analysis through Information Flow Tracking - Current Industry Applications and Research Questions
|
Apr 05, 2023 |
|
Wendy Nather, CERIAS Security Symposium Closing Keynote
|
Mar 29, 2023 |
|
Steve Bellovin, 35 Years of Protecting the Internet
|
Mar 22, 2023 |
|
Patrick Schlapfer, Using Endpoint Isolation to Track Malware Trends
|
Mar 08, 2023 |
|
Albert Cheng, Elements of Robust Real-Time Systems: Regularity-Based Virtualization and Functional Reactive Programming
|
Mar 01, 2023 |
|
Arjan Durresi, Trust Engineering – from Developing Resilient Systems to Artificial Conscience
|
Feb 22, 2023 |
|
Dean Cheng, Chinese Views of Information and Future Warfare
|
Feb 15, 2023 |
|
Ronald Keen, Increasing Dependency; Increasing Threat
|
Feb 08, 2023 |
|
Jason Ortiz, Securing Your Software Supply Chain
|
Feb 01, 2023 |
|
Aurobindo Sundaram, Our Journey in Phishing Mitigation
|
Jan 25, 2023 |
|
Mummoorthy Murugesan, Problems and Challenges in Data Security Posture Management
|
Jan 18, 2023 |
|
Ambrose Kam, Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine
|
Jan 11, 2023 |
|
Julie Haney, Users Are Not Stupid: Six Cybersecurity Pitfalls Overturned
|
Dec 07, 2022 |
|
Meng Xu, Fast and Reliable Formal Verification of Smart Contracts with the Move Prover
|
Nov 30, 2022 |
|
Brian Barnier & Prachee Kale, Making Cybersecurity Reliable and Cybersecurity Careers Rewarding
|
Nov 16, 2022 |
|
Christine Task, Data, Privacy---and the Interactions Between Them
|
Nov 09, 2022 |
|
Ning Zhang, Security and Privacy in the Cyber-physical World
|
Oct 26, 2022 |
|
Florian Kerschbaum, On Using Differential Privacy
|
Oct 19, 2022 |
|
David C. Benson, Stop Selling Cybersecurity Short!: Cybersecurity as a Component of National Power
|
Oct 12, 2022 |
|
Maggie MacAlpine, Ransomware and the Future of Cyberwarfare
|
Oct 05, 2022 |
|
Dipankar Dasgupta, Adaptive Multi-Factor Authentication & Cyber Identity
|
Sep 28, 2022 |
|
Abhilasha Bhargav-Spantzel & Sonnie Ebikwo, "With great power comes great responsibility" – Responsible Cybersecurity Innovations and Investments for Cloud Computing
|
Sep 21, 2022 |
|
James Huffaker, Cyber Security in Aviation
|
Sep 14, 2022 |
|
Cuihua (Cindy) Shen, A Fake Image is Worth a Thousand Lies
|
Sep 07, 2022 |
|
Chris Jenkins, Moving Target Defense for Space Systems
|
Aug 31, 2022 |
|
Kevin Kornegay, IoT Device Security in a Zero Trust Environment
|
Aug 24, 2022 |
|
Máire O'Neill, Securing Connected Devices – Challenge and Opportunities
|
Apr 27, 2022 |
|
Dr. Guan-Hua (Scott) Tu, Enabling a Practically Secure Mobile Networked System
|
Apr 20, 2022 |
|
Paul Rosenzweig, Crowd Forecasting to Enhance Cybersecurity
|
Apr 13, 2022 |
|
Jim Alves-Foss, Automated Function Boundary Detection in Stripped Binaries
|
Apr 06, 2022 |
|
Richard Clarke, Now That We're in a Hybrid War…
|
Mar 30, 2022 |
|
Andy Klein, What You Don't Know About Hard Drives!
|
Mar 09, 2022 |
|
Samuel Visner, The Evolution of Cybersecurity and its Role in the International System
|
Mar 02, 2022 |
|
Chen-Ching Liu, Cyber-Physical System Security of the Power Grid
|
Feb 23, 2022 |
|
Bob Gourley, The Metaverse: Infinite attack surface and boundless risk
|
Feb 16, 2022 |
|
Dr. Chris C. Demchak, Robust Collective Cyber Power across Consolidated Democracies
|
Feb 09, 2022 |
|
Alyssa Miller, Threat Modeling in the World of DevOps
|
Feb 02, 2022 |
|
Dr. David Mussington, Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence
|
Jan 26, 2022 |
|
Chuck Brooks, Leading Trends and Emerging Technologies for Cybersecurity in 2022
|
Jan 19, 2022 |
|
Melissa Dark, Building the Next Generation Cybersecurity Workforce: Progress and Challenges
|
Jan 12, 2022 |
|
Melissa Hathaway & Francesca Spidalieri, Integrating Cybersecurity into Digital Development
|
Dec 08, 2021 |
|
Kacper Gradon, Future Trends in Cyber Crime and Hybrid Warfare
|
Dec 01, 2021 |
|
Lesley Carhart, You Are The Future of Industrial Cybersecurity
|
Nov 17, 2021 |
|
Helen Patton, Navigating the Cybersecurity Profession: Essential Elements for a Satisfying Career
|
Nov 03, 2021 |
|
Jeremiah Blocki, Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
|
Oct 27, 2021 |
|
Amit Yoran, Symposium Closing Keynote
|
Oct 20, 2021 |
|
Jordan Mauriello, Understanding Attackers and Motivations
|
Oct 13, 2021 |
|
Yoon Auh, NUTS: The Beta Demo
|
Oct 06, 2021 |
|
Jennifer Bayuk, The History of Cybersecurity Metrics
|
Sep 29, 2021 |
|
Paula deWitte, The Need for Legal Education within a Cybersecurity Curriculum
|
Sep 22, 2021 |
|
Aaron Shafer, Securing SaaS, a Practitioner's Guide
|
Sep 15, 2021 |
|
Jeremy Rasmussen, The Changing Cybersecurity Threatscape
|
Aug 25, 2021 |
|
Nasir Memon, AI, Computational Imaging and the Battle for Media Integrity
|
Jul 28, 2021 |
|
David Dill, A Formal Verifier for the Diem Blockchain Move Language
|
Jul 21, 2021 |
|
Dave Henthorn, Educating the Next Generation on the Challenges of Securing Critical Infrastructure
|
Jul 14, 2021 |
|
Winn Schwartau, Security is Probabilistic, Not Deterministic: Get Over It
|
Jul 07, 2021 |
|
Neil Daswani, Big Breaches: Cybersecurity Lessons For Everyone
|
Jun 30, 2021 |
|
Laura Thomas, National Security Implications of Quantum Technology
|
Jun 23, 2021 |
|
Ida Ngambeki, Understanding the Human Hacker
|
Jun 16, 2021 |
|
Neil Gong, Secure Federated Learning
|
Jun 09, 2021 |
|
Leigh Metcalf, The Gauntlet of Cybersecurity Research
|
Jun 02, 2021 |
|
Gary McGraw, Security Engineering for Machine Learning
|
May 26, 2021 |
|
Steven Furnell, Cybersecurity Skills – Easy to say, harder to recognise?
|
Apr 28, 2021 |
|
Ira Winkler, You Can Stop Stupid: Human Security Engineering
|
Apr 21, 2021 |
|
Yimin Chen, Delving into differential privacy and anomaly detection: a meta-learning perspective
|
Apr 14, 2021 |
|
Tawei (David) Wang, The Invisible Risks: An Empirical Analysis on Data Sharing Activities and Systemic Risk among the Data Brokers
|
Apr 07, 2021 |
|
Frederick Scholl, Cybercrime: A Proposed Solution
|
Mar 31, 2021 |
|
Jack Daniel, The Shoulders of InfoSec
|
Mar 24, 2021 |
|
Santiago Torres-Arias, Practical software Supply Chain Security and Transparency
|
Mar 17, 2021 |
|
Greg Akers, SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool
|
Mar 10, 2021 |
|
Randall Brooks, Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology (IT/OT)
|
Mar 03, 2021 |
|
Caroline Wong, Security Industry Context
|
Feb 24, 2021 |
|
Cory Doctorow, Technology, Self-Determination, and the Future of the Future
|
Feb 17, 2021 |
|
Levi Lloyd, Securing the Software Supply Chain
|
Feb 10, 2021 |
|
Steve Lipner, Lessons Learned – Fifty Years of Mistakes in Cybersecurity
|
Feb 03, 2021 |
|
Scott Shackelford, The Internet of Things: What Everyone Needs to Know
|
Jan 27, 2021 |
|
Adwait Nadkarni, Building Practical Security Systems for the Post-App Smart Home
|
Jan 20, 2021 |
|
Lorrie Cranor, Security and Privacy for Humans
|
Dec 09, 2020 |
|
Kimberly Ferguson-Walter, Maximizing Cyber Deception to Improve Security: An Empirical Analysis
|
Dec 02, 2020 |
|
Sivaram Ramanathan, Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection
|
Nov 18, 2020 |
|
Abhilasha Bhargav-Spantzel, Fearless Computing
|
Nov 11, 2020 |
|
Kelley Misata, Results from the Field: Cybersecurity in Nonprofits and Why it Matters
|
Nov 04, 2020 |
|
Yoon Auh, NUTS: eNcrypted Userdata Transit & Storage; Viewing Data as an Endpoint™ (DaaE) using Structured Cryptography
|
Oct 28, 2020 |
|
Jeff Man, Why Attack When You Can Defend
|
Oct 21, 2020 |
|
Courtney Falk, The Pod People Campaign: Driving User Traffic via Social Networks
|
Oct 14, 2020 |
|
Michael Clark, From Machine Learning Threats to Machine Learning Protection Requirements
|
Oct 07, 2020 |
|
, Global Challenges in Security and Privacy Policy: elections, pandemics, and biometric technologies
|
Sep 30, 2020 |
|
Osman Ismael, TCB: From Assumption to Assurance
|
Sep 23, 2020 |
|
Warda Zahid Khan, Authentication: Behind The Scenes When You Click "Check Out"
|
Sep 16, 2020 |
|
Rich Banta, EMP Threat & Protection
|
Sep 09, 2020 |
|
Roger Schell, Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel
|
Sep 02, 2020 |
|
Jeremiah Sahlberg, From Compliance in the Classroom to Compliance on the Street, Important Lessons That Every Cybersecurity Professional Must Know
|
Aug 26, 2020 |
|
Elena Peterson, Flexible and Adaptive Malware Identification Using Techniques from Biology
|
Aug 19, 2020 |
|
Shimon Modi, Value of Cyber Threat Intelligence in Modern Security Operations
|
Aug 12, 2020 |
|
Carter Bullard, Network Awareness and Predictive Cyber Analytics
|
Jul 29, 2020 |
|
Sam Curry and Alon Kaufman, The Ghost in the Machine: Reconciling AI and Trust in the Connected World
|
Jul 22, 2020 |
|
Joe Weiss, Cyber Security of Control Systems: The Second Coming of the Maginot Line
|
Jul 15, 2020 |
|
Jim Richberg, Election Security in the Age of COVID-19: Risk Management in the face of a "Perfect Storm"
|
Jul 01, 2020 |
|
Nandi Leslie, Using Machine Learning for Network Intrusion Detection
|
Jun 24, 2020 |
|
Sami Saydjari, A Principled Approach to Cybersecurity Engineering
|
Jun 17, 2020 |
|
Corey Maypray, Proactive Endpoint and Network Security Operations. Detecting the Unknown Known
|
Apr 29, 2020 |
|
Bruce Coffing, Public Sector Cyber Security 2020: Challenges and Rewards
|
Apr 22, 2020 |
|
Leon Ravenna, Everyone Wants to Help You: Understanding the Issues and Surviving with a Multitude of Regulatory Authorities
|
Apr 15, 2020 |
|
Elliott Peterson, Mirai - DDoS and the Criminal Ecosystem
|
Apr 08, 2020 |
|
Neil Rowe, Empirical Digital Forensics
|
Apr 01, 2020 |
|
Nick Sturgeon, Cyber Risk Management 101
|
Mar 25, 2020 |
|
Vireshwar Kumar, Security and Privacy of Connected Autonomous Vehicles
|
Mar 11, 2020 |
|
Matt Mickelson, Physics-Based Approaches for creating Cyber Resilient Systems
|
Mar 04, 2020 |
|
Yuhong Nan, Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
|
Feb 26, 2020 |
|
Doug Rapp, Security, Ethics and the End of the World as We Know It
|
Feb 19, 2020 |
|
Char Sample, The Role of Culture in Cybersecurity
|
Feb 12, 2020 |
|
Syed Rafiul Hussain, Automated Reasoning of Security and Privacy of Cellular Networks
|
Feb 05, 2020 |
|
Abe Baggili, Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security and Forensics
|
Jan 29, 2020 |
|
Morgan Princing, Identifying Security Risks Using Internet-Wide Scan Data
|
Jan 22, 2020 |
|
Sriharsha Etigowni, Contactless Control Flow Monitoring via Electromagnetic Emanations
|
Jan 15, 2020 |
|
Boyang Wang, Fingerprinting Encrypted Voice Commands on Smart Speakers
|
Dec 04, 2019 |
|
Mohsen Minaei, Forgetting the Forgotten: Conceal Content Deletions from Persistent Observers
|
Nov 20, 2019 |
|
Celeste Paul, Hacking Stressed: Frustration, burnout, and the pursuit of happiness
|
Nov 13, 2019 |
|
James Cole, Securing the Internet of Things
|
Nov 06, 2019 |
|
Mitch Parker, Bitcoin and other dreams of utopian thinking-what happens when they meet reality?
|
Oct 30, 2019 |
|
Leon Ravenna, Your Privacy has been Breached
|
Oct 23, 2019 |
|
Andrew Rozema, 'Networking' Skills for Cybersecurity
|
Oct 16, 2019 |
|
Chet Hosmer, Forensic Identification of Fake Digital Photographs
|
Oct 09, 2019 |
|
Chris Jenkins, Moving Target Defense for a Serial Communication Protocol
|
Oct 02, 2019 |
|
Aritra Mitra, A New Approach to Distributed Hypothesis Testing and Non-Bayesian Learning: Improved Learning Rate and Byzantine Resilience
|
Sep 11, 2019 |
|
Luke Butcher, Connected Intelligence
|
Sep 04, 2019 |
|
Steve Lodin, The Golden Rules of Security and Assurance
|
Aug 28, 2019 |
|
Eugene Spafford, Rethinking Cyber Security
|
Aug 21, 2019 |
|
Lauren Featherstun, Shivam Trivedi, Brian Werts, Erik Gough, The Purdue Live Security Analyzer (PULSAR)
|
Apr 24, 2019 |
|
Robert Mundt, Protecting your online Identity in a world of modern application architecture
|
Apr 17, 2019 |
|
Jim Routh, The Rise of Unconventional Security Controls
|
Apr 10, 2019 |
|
Krishna Kavi, Hardware Cybersecurity Attacks and Some Solutions
|
Apr 03, 2019 |
|
Wei Jiang, Efficient and Constant-Round Secure Comparison through Function Transformation, Dynamic Group Switching and Asymmetric Computation
|
Mar 27, 2019 |
|
Sathish Kumar, Securing IoT-based Cyber-Physical Human Systems against diverse attacks
|
Mar 20, 2019 |
|
Charles Kamhoua, Game Theoretic Modeling of Cyber Deception in the Internet of Battlefield Things
|
Mar 06, 2019 |
|
Bowei Xi, A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data Meets Cyber Security
|
Feb 27, 2019 |
|
Meng Yu, Protection against Compromised Operating Systems on ARM Cortex-A Architecture
|
Feb 20, 2019 |
|
David Ebert, Trustable Information for Security Applications: Visual Analytics for Reliable, Effective Decision Making
|
Feb 06, 2019 |
|
Sanjay Madria, Secure Information Forwarding through Fragmentation in Delay- tolerant Networks
|
Jan 23, 2019 |
|
Chris Clifton, A Data Privacy Primer
|
Jan 16, 2019 |
|
Haotian Deng, CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification
|
Jan 09, 2019 |
|
Yousra Aafer, Normalizing Diverse Android Access Control Checks for Inconsistency Detection
|
Dec 05, 2018 |
|
James Lerums, Developing a Public/Private Cybersecurity Scorecard for the State of Indiana
|
Nov 28, 2018 |
|
Courtney Falk, Enemy Perspectives: When Nation-States Meet Cybercriminals
|
Nov 14, 2018 |
|
Jason Ortiz, IoT Security: Living on the Edge
|
Nov 07, 2018 |
|
Meng Xu, Precise and Scalable Detection of Double-Fetch Bugs in Kernels
|
Oct 31, 2018 |
|
Mark Loepker, 80/20 Rule-Cyber Hygiene
|
Oct 24, 2018 |
|
Ryan Goldsberry, Applied Cyber and Mobile Security Consulting
|
Oct 17, 2018 |
|
Jessy Irwin, Double the Factors, Double the Fails: How Usability Obstacles Impact Adoption of Strong Authentication Habits
|
Oct 10, 2018 |
|
Shiqing Ma, Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
|
Sep 26, 2018 |
|
Jillean Long Battle, What's Private: Exploring Reasonable Expectation of Privacy in the Age of Modern Innovation
|
Sep 19, 2018 |
|
Doug Rapp, Breaching Water Treatment Plants: Lessons Learned from Complex Exercises
|
Sep 05, 2018 |
|
Ryan Elkins, Hacking Your Security Career: Strategies That College Did Not Teach Me
|
Aug 29, 2018 |
|
Abe Clements, Protecting Bare-metal Embedded Systems from Memory Corruption Attacks
|
Aug 22, 2018 |
|
Cristina Ledezma, DoD Cyber Requirements and Directives
|
Apr 25, 2018 |
|
Leon Ravenna, Personally Identifiable Data and the Specter of Customer Privacy
|
Apr 18, 2018 |
|
Debajyoti Das, Anonymity Trilemma : Strong Anonymity, Low Bandwidth Overhead, Low Latency – Choose Two.
|
Apr 11, 2018 |
|
Josh Corman, Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years
|
Apr 04, 2018 |
|
Chris Reed, Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
|
Mar 28, 2018 |
|
Pedro Moreno-Sanchez, Mind Your Credit: Assessing the Health of the Ripple Credit Network
|
Mar 21, 2018 |
|
Nathan Burrow, CFIXX -- Object Type Integrity for C++
|
Mar 07, 2018 |
|
Courtney Falk, Threats and Risks in Cryptocurrencies
|
Feb 28, 2018 |
|
Mitchell Parker, Lessons Learned From the Retrocomputing Community
|
Feb 21, 2018 |
|
Adil Ahmad, OBLIVIATE: A Data Oblivious File System for Intel SGX
|
Feb 14, 2018 |
|
Brian Lynch, Eli Lilly's Path to a Successful Threat Intelligence Program
|
Feb 07, 2018 |
|
Matt Dimino, State of Cybersecurity in Healthcare
|
Jan 31, 2018 |
|
Lotfi ben-Othmane, What Roles Can Empirical Research Play to Advance Software Security Knowledge?
|
Jan 24, 2018 |
|
Ben Harsha, The Economics of Offline Password Cracking
|
Jan 17, 2018 |
|
Nat Shere, Penetration Testing: What? Why? How?
|
Dec 06, 2017 |
|
Kirsten Bay, Securing the Future of Business: Broadening the Role of Security Technology
|
Nov 29, 2017 |
|
Abhishek Ray, Ad-Blockers: Extortionists or Digital Age Robin Hoods?
|
Nov 15, 2017 |
|
Nikita Borisov, Refraction Networking: Censorship Circumvention in the Core of the Internet
|
Nov 08, 2017 |
|
Mikhail J. Atallah, Opportunities and Perils of the Cyber Revolution
|
Nov 01, 2017 |
|
Jerome Edge, Applying commercial best practices to DoD risk management to offer suggestions how to move from risk avoidance to cost effective risk management
|
Oct 25, 2017 |
|
Tianhao Wang, Locally Differential Private Protocols for Frequency Estimation
|
Oct 18, 2017 |
|
Jeremiah Blocki, Memory Hard Functions and Password Hashing
|
Oct 11, 2017 |
|
Xiaonan Guo, Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
|
Oct 04, 2017 |
|
Tony Huffman, Vulnerability Scanning, how it works and why
|
Sep 27, 2017 |
|
Vince D'Angelo, Counter UAS Challenges and Technology
|
Sep 20, 2017 |
|
Bob Cheripka, Advanced Testing Assessments in the Power & Utilities Industry
|
Sep 13, 2017 |
|
Doug Smith, Secure Code Development
|
Sep 06, 2017 |
|
Chris Roberts, The Stark Reality of Red vs. Blue and Why it's Not Working
|
Aug 30, 2017 |
|
Shiqing Ma, MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
|
Aug 23, 2017 |
|
Adam Bates, Enabling Trust and Efficiency in Provenance-Aware Systems
|
Apr 26, 2017 |
|
Ron Ross, Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices
|
Apr 19, 2017 |
|
Limin Jia, Information Flow Security in Practical Systems
|
Apr 12, 2017 |
|
Scott Carr, DataShield: Configurable Data Confidentiality and Integrity
|
Mar 29, 2017 |
|
Tawei (David) Wang, CIO Risk Appetite and Information Security Management
|
Mar 22, 2017 |
|
Stephen Reynolds, The Rise of Cyber-Crime: A Legal Perspective
|
Mar 08, 2017 |
|
Yonghwi Kwon, A2C: Self Destructing Exploit Executions via Input Perturbation
|
Feb 22, 2017 |
|
Ashish Hota, Behavioral and Computational Aspects of Network Security Games
|
Feb 15, 2017 |
|
Neil Cassidy, Cyber Security in Large Complex Corporations
|
Feb 08, 2017 |
|
Vincent Urias, Network Deception as a Threat Intelligence Platform
|
Feb 01, 2017 |
|
Jean Camp, Changing the Economics of the Network
|
Jan 25, 2017 |
|
Nick Sturgeon, Emerging Cyber Threats
|
Jan 18, 2017 |
|
Aniket Kate, Differential Guarantees for Cryptographic Systems
|
Jan 11, 2017 |
|
Yinqian Zhang, When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices
|
Dec 07, 2016 |
|
Abhilasha Bhargav-Spantzel, Digital Identity Protection
|
Nov 30, 2016 |
|
Corey Holzer, The Application of Natural Language Processing to Open Source Intelligence for Ontology Development in the Advanced Persistent Threat Domain
|
Nov 16, 2016 |
|
Sanjai Narain, A Science of Cyber Infrastructure Configuration
|
Nov 09, 2016 |
|
Victor Raskin, New Research and Resources in NL IAS at Purdue
|
Oct 26, 2016 |
|
Jeremiah Blocki, Usable and Secure Human Authentication
|
Oct 19, 2016 |
|
Terry Ching-Hsiang Hsu, Enforcing Least Privilege Memory Views for Multithreaded Applications
|
Oct 12, 2016 |
|
Tony Sager, Growing Up In Cyber, But Is Cyber Growing Up?
|
Oct 05, 2016 |
|
Nicholas Reuhs, The role of cyber insurance in security and risk management
|
Sep 28, 2016 |
|
Aniket Kate, The Internet of Value: Privacy and Applications
|
Sep 21, 2016 |
|
Di Jin, General Motors Product Cybersecurity Overview
|
Sep 14, 2016 |
|
Maria Andrews, Improving Outcomes with Services
|
Sep 07, 2016 |
|
Srivatsan Ravi, Towards Safe In-memory Transactions
|
Aug 31, 2016 |
|
Michael Taylor, Secure Coding - Patterns and anti-patterns in the design & architecture of secure applications
|
Aug 24, 2016 |
|
Christopher N. Gutierrez, ErsatzPasswords - Ending Password Cracking
|
Apr 27, 2016 |
|
Kelley Misata, Information Security: Through the Lens of Crisis Organizations
|
Apr 20, 2016 |
|
Richard M. (Dickie) George, Life as a Target
|
Apr 20, 2016 |
|
Pedro Moreno Sanchez, Privacy-preserving payments in credit networks
|
Apr 13, 2016 |
|
Endadul Hoque, Finding Specification Noncompliance and Attacks in Wireless Network Protocol Implementations
|
Apr 06, 2016 |
|
Chris Kanich, Bottom Line Security: Understanding the True Cost of Cybersecurity Attacks
|
Mar 30, 2016 |
|
Kent Seamons, Usable Secure Webmail for Grassroots Adoption
|
Mar 23, 2016 |
|
Ryan Henry, Batch Techniques for Practical Private Information Retrieval
|
Mar 09, 2016 |
|
Anupam Joshi, Context Aware, Policy based approaches to Security
|
Mar 02, 2016 |
|
Xukai Zou, Resilient, privacy-preserving, revocable and user-centric authentication – Biometric Capsule
|
Feb 24, 2016 |
|
Bruno Ribeiro, Predicting What Users Will do Next
|
Feb 17, 2016 |
|
Nicholas Sturgeon, IN-ISAC: SOC, Security Awareness and More
|
Feb 10, 2016 |
|
Hemanta Maji, Robust Secure Computation
|
Feb 03, 2016 |
|
Elisa Bertino, Big Data Security and Privacy
|
Jan 27, 2016 |
|
Chris Clifton, Privacy in Big Data: Thinking Outside the Anonymity/Confidentiality Box
|
Jan 20, 2016 |
|
Jim Gallagher, Microsemi Security Solutions and Threat Driven Security
|
Jan 13, 2016 |
|
Aniket Kate, Preventing or Penalizing Equivocation in Decentralized Environments
|
Dec 09, 2015 |
|
Laura Amo, Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
|
Dec 02, 2015 |
|
Jongho Won, A Secure Communication Protocol for Drones and Smart Objects
|
Nov 18, 2015 |
|
Ariel Feldman, Verifying Computations with (Private) State
|
Nov 11, 2015 |
|
Balamurugan Anandan, Secure Multiparty Computation and Differential Privacy
|
Nov 04, 2015 |
|
Kate Seigfried-Spellar, Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
|
Oct 28, 2015 |
|
Koray Mancuhan, Anonymized Data
|
Oct 21, 2015 |
|
Fang-Yu Rao, A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
|
Oct 14, 2015 |
|
Kevin McPeak, The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
|
Oct 07, 2015 |
|
Omar Chowdhury, Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
|
Sep 30, 2015 |
|
Kexin Pei, LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
|
Sep 23, 2015 |
|
John Feddema, Evaluation of Urban Vehicle Tracking Algorithms
|
Sep 16, 2015 |
|
Yonghwi Kwon, P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
|
Sep 09, 2015 |
|
Jianjun Huang, SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
|
Sep 02, 2015 |
|
Samuel Jero, Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
|
Aug 26, 2015 |
|
Steve Bellovin, Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
|
Apr 29, 2015 |
|
Rohit Ranchal & Payuna Uday & Zhemei Fang, CERIAS Poster Contest Winners
|
Apr 22, 2015 |
|
Yan Huang, Engineering Secure Computation -- Efficiently
|
Apr 15, 2015 |
|
Rebecca Herold, Privacy Potpourri: Changing Privacy from the Bottom Up
|
Apr 08, 2015 |
|
Kui Ren, Breaking Mobile Social Networks for Automated User Location Tracking
|
Apr 01, 2015 |
|
Michelle Dennedy, Symposium/Michelle Dennedy, Intel
|
Mar 25, 2015 |
|
Andrew Pyles, Virtual Android Malware Detection and Analysis (VAMDA)
|
Mar 11, 2015 |
|
Xinming Ou, Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
|
Mar 04, 2015 |
|
Kami Vaniea, Software updates: decisions and security implications
|
Feb 25, 2015 |
|
Ninghui Li, Privacy Notions for Data Publishing and Analysis
|
Feb 18, 2015 |
|
Mathias Payer, Code-Pointer Integrity
|
Feb 11, 2015 |
|
Omar Chowdhury, Regulatory Compliance Checking Over Encrypted Audit Logs
|
Feb 04, 2015 |
|
Savvas Savvides, Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
|
Jan 28, 2015 |
|
Bharath Samanthula, Security with Privacy - A Research Agenda
|
Jan 21, 2015 |
|
Jackie Rees Ulmer, Learning from Information Security Maturity: A Textual Analysis
|
Jan 14, 2015 |
|
Xiangyu Zhang, How Program Analysis can be Used in Security Applications
|
Dec 10, 2014 |
|
Marcus Ranum, Privacy in the Age of the Police State
|
Nov 19, 2014 |
|
Kevin Bowers, You can hack, but you can't hide: Using log analysis to detect APTs
|
Nov 12, 2014 |
|
Barrett Caldwell and Omar Eldardiry, Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
|
Nov 05, 2014 |
|
Robert Zimmerman, Healthcare Security and Privacy: Not There Yet
|
Oct 29, 2014 |
|
Golden G. Richard III, "Memory Analysis, Meet GPU Malware"
|
Oct 22, 2014 |
|
Stephen Elliott, Biometrics and Usability
|
Oct 08, 2014 |
|
Larry Ponemon, Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis
|
Oct 01, 2014 |
|
Sam Liles, Threat intelligence and digital forensics
|
Sep 24, 2014 |
|
Mark Guido, MITRE/Purdue Mobile Masquerading User Experiment
|
Sep 17, 2014 |
|
Mathias Payer, WarGames in Memory: Fighting Powerful Attackers
|
Sep 10, 2014 |
|
Brendan Saltaformaggio, DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
|
Sep 03, 2014 |
|
Rachel Sitarz, Women In Cyber Security
|
Apr 30, 2014 |
|
Masooda Bashir, Online Privacy Agreements, is it Informed Consent?
|
Apr 16, 2014 |
|
Chris Jenkins, Integrity Levels: A New Paradigm for Protecting Computing Systems
|
Apr 09, 2014 |
|
Philip Ritchey & Mohammed Almeshekah, CERIAS Poster Contest Winners
|
Apr 02, 2014 |
|
Joshua Corman, Why so CERIAS!? Why we're losing and what to do about it.
|
Mar 26, 2014 |
|
Marina Blanton, General-Purpose Secure Computation and Outsourcing
|
Mar 12, 2014 |
|
Marina Gavrilova, Machine Intelligence for Biometric and On-Line Security
|
Mar 05, 2014 |
|
Rahul Potharaju, Delivering "Always-on" Services Despite Flaky Network Infrastructure
|
Feb 26, 2014 |
|
Ed Felten, Technical Tradeoffs in the NSA's Mass Phone Call Program
|
Feb 19, 2014 |
|
Ting-Fang Yen, Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
|
Feb 12, 2014 |
|
Shumiao Wang, Secure and Private Outsourcing to Untrusted Cloud Servers
|
Jan 29, 2014 |
|
Marina Kaljurand, Economic Policy and Cyber Challenges in Estonia
|
Dec 04, 2013 |
|
Muhammad Umer Arshad, Trust Management for Publishing Graph Data
|
Nov 20, 2013 |
|
Randall Brooks, Cloud Security: How Does Software Assurance Apply
|
Nov 13, 2013 |
|
Tejashree Datar, Yahoo! Messenger Forensics on Windows Vista and Windows 7
|
Nov 06, 2013 |
|
Ninghui Li, Membership Privacy: A Unifying Framework For Privacy Definitions
|
Oct 30, 2013 |
|
Daniel DeLaurentis, Systems of Systems: Opportunities and Challenges
|
Oct 23, 2013 |
|
Paul Thompson, The Durkheim Project: Privacy Considerations in Predicting Military and Veteran Suicide Risk
|
Sep 25, 2013 |
|
Mark Crosbie, Tim Tickel, Four Flynn, Protecting a billion identities without losing (much) sleep
|
Sep 18, 2013 |
|
John Butterworth, BIOS Chronomancy: Using Timing-Based Attestation to Detect Firmware Rootkits
|
Sep 04, 2013 |
|
Keith Watson, Information Security Challenges in an Academic Environment
|
Aug 28, 2013 |
|
Jarek Duda, New possibilities of steganography based on Kuznetsov-Tsybakov problem
|
Aug 21, 2013 |
|
David Pisano, Identity-Based Internet Protocol Network
|
Apr 24, 2013 |
|
Rahul Potharaju, Towards Automated Problem Inference from Trouble Tickets
|
Apr 17, 2013 |
|
Aaron Massey, Regulatory Compliance Software Engineering
|
Mar 27, 2013 |
|
Kristin Heckman, Active Cyber Network Defense with Denial and Deception
|
Mar 20, 2013 |
|
Emiliano DeCristofaro, Whole Genome Sequencing: Innovation Dream or Privacy Nightmare?
|
Mar 06, 2013 |
|
Weining Yang, Minimizing Private Data Disclosures in the Smart Grid
|
Feb 20, 2013 |
|
Rahul Potharaju, I'm not stealing, I'm merely borrowing - Plagiarism in Smartphone App Markets
|
Feb 13, 2013 |
|
Chris Gates, Using Probabilistic Generative Models for Ranking Risks of Android Apps
|
Feb 06, 2013 |
|
Christian F. Hempelmann, A Semantic Baseline for Spam Filtering
|
Jan 30, 2013 |
|
Wahbeh Qardaji, Differentially Private Publishing of Geospatial Data
|
Jan 23, 2013 |
|
Bilal Shebaro, You are Anonymous!!! Then you must be Lucky
|
Dec 05, 2012 |
|
Ashish Kundu, A New Class of Buffer Overflow Attacks
|
Nov 28, 2012 |
|
Hal Aldridge, Not the Who but the What -- New applications of Hardware Identity
|
Nov 14, 2012 |
|
Jianneng Cao, Publishing Microdata with a Robust Privacy Guarantee
|
Nov 07, 2012 |
|
Vaibhav Garg, Risk perception of information security risks online
|
Oct 31, 2012 |
|
Mark Guido, Detecting Maliciousness Using Periodic Mobile Forensics
|
Oct 24, 2012 |
|
Edmund Jones, The Boeing Company
|
Oct 17, 2012 |
|
Chris Kanich, Understanding Spam Economics
|
Oct 10, 2012 |
|
William Enck, Defending Users Against Smartphone Apps: Techniques and Future Directions
|
Oct 03, 2012 |
|
Marc Brooks, Leveraging internal network traffic to detect malicious activity: Lessons learned
|
Sep 26, 2012 |
|
Jason Haas, Global Revocation for the Intersection Collision Warning Safety Application
|
Sep 19, 2012 |
|
Sharon Chand & Chad Whitman, Trends in cyber security consulting
|
Sep 12, 2012 |
|
Ed Lopez, The Inertia of Productivity
|
Sep 05, 2012 |
|
Lewis Shepherd, Challenges for R&D in the Security Field
|
Aug 29, 2012 |
|
Scott Andersen, The New Frontier, Welcome the Cloud Brokers
|
Aug 22, 2012 |
|
Christine Task, A Practical Beginners' Guide to Differential Privacy
|
Apr 25, 2012 |
|
Steve Battista, What firmware exists in your computer and how the fight for your systems will be below your operating system
|
Apr 18, 2012 |
|
Traian Truta, : K-Anonymity in Social Networks: A Clustering Approach
|
Apr 11, 2012 |
|
Nabeel Mohamed, Privacy preserving attribute based group key management
|
Mar 28, 2012 |
|
Randall Brooks, Adding a Software Assurance Dimension to Supply Chain Practices
|
Mar 21, 2012 |
|
Chenyun Dai, Privacy-Preserving Assessment of Location Data Trustworthiness
|
Mar 07, 2012 |
|
Nishanth Chandran, Cryptographic Protocols in the Era of Cloud Computing
|
Feb 29, 2012 |
|
Ben Calloni, Vulnerability Path and Assessment
|
Feb 22, 2012 |
|
Simson Garfinkel, Forensic Carving of Network Packets with bulk_extractor and tcpflow
|
Feb 15, 2012 |
|
Kelley Misata, Digital Citizenship: A Target's View of Security and Life Online
|
Feb 08, 2012 |
|
George Vanecek, Is it Time to add Trust to the Future Internet/Web?
|
Feb 01, 2012 |
|
Frank Tompa, A Flexible System for Access Control
|
Jan 25, 2012 |
|
Salmin Sultana, Secure Provenance Transmission for Data Streams
|
Jan 18, 2012 |
|
Stephen Elliott, Introduction to Biometrics
|
Jan 11, 2012 |
|
Apu Kapadia, Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
|
Nov 30, 2011 |
|
Loukas Lazos, Jam me if you can: Mitigating the Impact of Inside Jammers
|
Nov 16, 2011 |
|
Zhongshu Gu, Process Implanting: A New Active Introspection Framework for Virtualization
|
Nov 09, 2011 |
|
Morgan Greenwood, SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss
|
Nov 02, 2011 |
|
Sheila Becker, Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
|
Oct 26, 2011 |
|
Julia M. Taylor, Victor Raskin, and Eugene H. Spafford, Ontological Semantic Technology Goes Phishing
|
Oct 19, 2011 |
|
Dan McWhorter and Steve Surdu, Enterprise-Wide Intrusions Involving Advanced Threats
|
Oct 12, 2011 |
|
Hal Aldridge, Trusted Computing and Security for Embedded Systems
|
Oct 05, 2011 |
|
Xukai Zou, Weighted Multiple Secret Sharing
|
Sep 28, 2011 |
|
Joe Leonard, Methods and Techniques for Protecting Data in Real Time on the Wire
|
Sep 21, 2011 |
|
David Zage, What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security
|
Sep 14, 2011 |
|
Steven Gianvecchio, Detecting Bots in Online Games using Human Observational Proofs
|
Sep 07, 2011 |
|
Tamir Tassa, Non-homogeneous Anonymizations
|
Aug 31, 2011 |
|
Scott Hollenbeck, Provisioning Protocol Challenges in an Era of gTLD Expansion
|
Aug 24, 2011 |
|
Eric Katz, Mobile Phones and Evidence Preservation
|
Apr 27, 2011 |
|
Jose Fernandez, Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet
|
Apr 20, 2011 |
|
Ronda R. Henning, FuzzyFusion™, an application architecture for multisource information fusion
|
Apr 13, 2011 |
|
Carter Bullard, Society, Law Enforcement and the Internet: Models for Give and Take
|
Apr 06, 2011 |
|
Kim Trieu, Wireless Technologies and how it relates to cyber security research
|
Mar 23, 2011 |
|
Michael Schearer, Exploiting Banners for Fun and Profits
|
Mar 09, 2011 |
|
Casey Deccio, Modeling DNS Security: Misconfiguration, Availability, and Visualization
|
Mar 02, 2011 |
|
Jan Vitek, A couple of results about JavaScript
|
Feb 23, 2011 |
|
Fariborz Farahmand, Understanding insiders: An analysis of risk-taking behavior *
|
Feb 09, 2011 |
|
Torsten Braun, User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds
|
Jan 26, 2011 |
|
Somesh Jha, Retrofitting Legacy Code for Security
|
Jan 19, 2011 |
|
Fariborz Farahmand, Risk Perception and Trust in Cloud
|
Jan 12, 2011 |
|
Matthew Hashim, Nudging the Digital Pirate: Behavioral Issues in the Piracy Context
|
Dec 01, 2010 |
|
Michael Kirkpatrick, Security Applications for Physically Unclonable Functions
|
Nov 17, 2010 |
|
Nikita Borisov, Detecting Coordinated Attacks with Traffic Analysis
|
Nov 10, 2010 |
|
Trent Jaeger, Tackling System-Wide Integrity
|
Nov 03, 2010 |
|
P. Madhusudan, The Role of Automata Theory in Software Verification
|
Oct 27, 2010 |
|
Sam King, Trust and Protection in the Illinois Browser Operating System
|
Oct 20, 2010 |
|
Alex Liu, Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems
|
Oct 13, 2010 |
|
Mihaela Vorvoreanu, Lorraine G. Kisselburgh, Global Study of Web 2.0 Use in Organizations
|
Oct 06, 2010 |
|
Sergey Panasyuk, Assured Processing through Obfuscation
|
Sep 29, 2010 |
|
Petros Mouchtaris, Security of Mobile Ad Hoc Networks (MANETs)
|
Sep 22, 2010 |
|
Xiaofeng Wang, Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
|
Sep 15, 2010 |
|
Xeno Kovah, Rootkits
|
Sep 08, 2010 |
|
Ashish Kundu, Data in the Cloud: Authentication Without Leaking
|
Sep 01, 2010 |
|
Cristina Nita-Rotaru, Secure Network Coding for Wireless Mesh Networks
|
Aug 25, 2010 |
|
Victor Raskin & Julia Taylor, Ontological Semantic Technology for Detecting Insider Threat and Social Engineering
|
Apr 28, 2010 |
|
Stephen Dill, The role of System Security Engineering in the engineering lifecycle
|
Apr 21, 2010 |
|
Christian Hammer, Security of JavaScript in a Browser Environment
|
Apr 14, 2010 |
|
Yvo Desmedt, 60 years of scientific research in cryptography: a reflection
|
Apr 07, 2010 |
|
David Bell, Everything I Needed to Know about Security, I Learned in 1974
|
Mar 31, 2010 |
|
David Zage, A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems
|
Mar 24, 2010 |
|
Pascal Meunier, Making of the CWE Top-25, 2010 Edition
|
Mar 10, 2010 |
|
Wonjun Lee, Detection and protection from denial of service attacks in grids by accountability agents
|
Mar 03, 2010 |
|
Kevin Hoffman, Ribbons, A Partially-Shared Memory Programming Model
|
Feb 24, 2010 |
|
Hyo-Sang Lim, Provenance-based Data Trustworthiness Assessment in Data Streams
|
Feb 17, 2010 |
|
Marcus Rogers, Dissecting Digital Data: Context & Meaning through Analytics
|
Feb 10, 2010 |
|
Greg Stephens, Detecting Insider Theft of Trade Secrets
|
Feb 03, 2010 |
|
Stephen Elliott, Applications of biometric technologies
|
Jan 20, 2010 |
|
Eugene Spafford, Thinking Outside the Box
|
Jan 13, 2010 |
|
Kelly Caine, Human Factors Approaches to Preserving Privacy
|
Dec 09, 2009 |
|
Andrew Scholnick, Cyber Security Trends and Disruptors
|
Dec 02, 2009 |
|
Gerome Miklau, Safely Analyzing Sensitive Network Data
|
Nov 18, 2009 |
|
Leszek Lilien, Some Thoughts on the Pervasive Trust Foundation for the Future Internet Architecture. A position presentation.
|
Nov 11, 2009 |
|
Zahid Pervaiz, Multi-Policy Access Control for Healthcare using Policy Machine
|
Nov 04, 2009 |
|
Andre Koenig, Security in Infrastructureless and Decentralized Communication Networks - Possibilities, Results, and Evaluation Challenges
|
Oct 28, 2009 |
|
Juhee Kwon, Information Security Management and IT Executives in a Top Management Team
|
Oct 21, 2009 |
|
Raquel Hill, PlugNPlay Trust for Embedded Communication Systems
|
Oct 14, 2009 |
|
Gary McGraw, Building Security In Maturity Model (BSIMM)
|
Oct 07, 2009 |
|
Richard Power, Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security
|
Sep 30, 2009 |
|
Rick Aldrich, The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw
|
Sep 23, 2009 |
|
Jerry Saulman, From Security Architecture to Implementation
|
Sep 16, 2009 |
|
Peter Mork, Database Assurance: Anomaly Detection for Relational Databases
|
Sep 09, 2009 |
|
Ragib Hasan, Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance
|
Sep 02, 2009 |
|
Ian Goldberg, Sphinx: A Compact and Provably Secure Mix Format
|
Aug 26, 2009 |
|
Joe Judge, Software Assurance: Motivation, Background, and Acquisition Pursuits
|
Apr 22, 2009 |
|
John D'Arcy, User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
|
Apr 15, 2009 |
|
Johann-Christoph Freytag, Privacy – from accessing databases to location based services
|
Apr 08, 2009 |
|
Melissa Dark, An Analysis of Data Breach Disclosure
|
Apr 01, 2009 |
|
, Rick Clark, Ontario Systems
|
Mar 25, 2009 |
|
Arjan Durresi, Security for the Next Internet over Heterogeneous Environments
|
Mar 11, 2009 |
|
Jeremy Rasmussen, The Best Defense is Information
|
Mar 04, 2009 |
|
Mummoorthy Murugesan, Providing Privacy through Plausibly Deniable Search
|
Feb 25, 2009 |
|
Charles Killian, Mace: Systems and Language Support for Building Correct, High-Performance Networked Services
|
Feb 18, 2009 |
|
Mehmet Sahinoglu, Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory
|
Feb 11, 2009 |
|
Cassio Goldschmidt, The Dark Side of Software Engineering and How to Defend Against It
|
Feb 04, 2009 |
|
Ryan Riley, An Alternate Memory Architecture for Code Injection Prevention
|
Jan 28, 2009 |
|
Paul Kidwell, A Rules Based Statistical Algorithm for Keystroke Detection
|
Jan 21, 2009 |
|
Chris Clifton, Measuring Privacy: A Risk-Based Approach
|
Jan 14, 2009 |
|
Ibrahim Baggili, Extending anonymity research to high-tech white collar crimes and IT Insider threat: A critical step
|
Dec 10, 2008 |
|
Weidong Cui, Automatic Signature Generation for Unknown Vulnerabilities
|
Dec 03, 2008 |
|
Sylvia Osborn, The Role Graph Model and its Extensions
|
Nov 19, 2008 |
|
John Oritz, John Oritz, SRA International
|
Nov 12, 2008 |
|
Scott Orton, The "merge" of Anti-Tamper and Information Assurance - lessons learned from the Anti-Tamper discipline
|
Nov 05, 2008 |
|
Kenji Takahashi, Trends in Identity Management
|
Oct 29, 2008 |
|
Federica Paci, Access Control and Resiliency for WS-BPEL
|
Oct 22, 2008 |
|
Adam Dugger, Signature Analysis Coupled With Slicing Analysis for the Validation of Software
|
Oct 15, 2008 |
|
Yuecel Karabulut, Measuring the Attack Surfaces of Enterprise Software Systems
|
Oct 08, 2008 |
|
Dave Keppler, Resilient Systems for Mission Assurance
|
Oct 01, 2008 |
|
Ashish Kamra, Responding to Anomalous Database Requests
|
Sep 24, 2008 |
|
Shimon Modi, Fingerprint Sensor Interoperability: Analysis of Error Rates for Fingerprint Datasets Acquired from Multiple Fingerprint Sensors
|
Sep 17, 2008 |
|
Dennis Moreau, Virtualization: Resource Coupling and Security across the Stack
|
Sep 10, 2008 |
|
Gabriel Ghinita, Private Queries in Location Based Services: Anonymizers are not Necessary
|
Sep 03, 2008 |
|
Minaxi Gupta, Exploitable Redirects on the Web: Identification, Prevalence, and Defense
|
Aug 27, 2008 |
|
Jacob West, Static source code analysis
|
Apr 16, 2008 |
|
Jack Jones, Shifting focus: Aligning security with risk management
|
Apr 09, 2008 |
|
Hao Chen, Exploiting Opportunistic Scheduling in Cellular Data Networks
|
Apr 02, 2008 |
|
Sencun Zhu, Towards Event Source Location Privacy in Wireless Sensor Networks
|
Mar 26, 2008 |
|
Daniel Hoffman, Hacking the Mobile Workforce
|
Mar 05, 2008 |
|
Buzz Walsh, Managing Security Polarities
|
Feb 27, 2008 |
|
Ta-Wei "David" Wang, Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents
|
Feb 20, 2008 |
|
Myron Cramer, Beyond the Enclave: Evolving Concepts in Security Architectures
|
Feb 13, 2008 |
|
Anand Singh, What are CSO's thinking about? Top information security initiatives for 2008 and beyond …
|
Jan 30, 2008 |
|
Edward W. Felten, Electronic Voting: Danger and Opportunity
|
Jan 23, 2008 |
|
Paul Syverson & Roger Dingledine, Tor: Anonymous communications for government agencies, corporations, journalists... and you
|
Jan 16, 2008 |
|
Eric Cole, Security in a Changing World
|
Jan 09, 2008 |
|
Ventkat Venkatakrishnan, CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
|
Nov 28, 2007 |
|
Steve Myers, Indiana University, Wireless Router Insecurity: The Next Crimeware Epidemic
|
Nov 14, 2007 |
|
Richard Thieme, Security, Soft Boundaries, and oh-so-subtle Strategies:How to Play Chess While the Board is Disappearing
|
Nov 07, 2007 |
|
Abhilasha Bhargav-Spantzel, Protocols and Systems for Privacy Preserving Protection of Digital Identity
|
Oct 31, 2007 |
|
George Heron, Secure Virtualization
|
Oct 24, 2007 |
|
Srdjan Capkun, From Securing Navigation Systems to Securing Wireless Communication
|
Oct 17, 2007 |
|
Neil Daswani, What Every Engineer Needs To Know About Security And Where To Learn It
|
Oct 10, 2007 |
|
David Ehinger, The Effect of Rootkits on the Corporate Environment
|
Sep 26, 2007 |
|
Jill Frisby, Protecting Data Privacy: A Practical Guide to Managing Risk
|
Sep 19, 2007 |
|
Ron Buskey, Security issues within embedded software development
|
Sep 12, 2007 |
|
Yvo Desmedt, Applying Recreational Mathematics to Secure Multiparty Computation
|
Sep 05, 2007 |
|
Klemens Boehm, Towards Effective and Efficient Behavior-based Trust Models
|
Aug 29, 2007 |
|
Bill Horne, Role Discovery
|
Aug 22, 2007 |
|
Umut Topkara, Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics
|
Apr 25, 2007 |
|
Mercan Topkara, Hiding the Message Behind the Words: Advances in Natural Language Watermarking
|
Apr 18, 2007 |
|
Dr. Charles P. Pfleeger, Dumb Ideas in Computer Security
|
Apr 11, 2007 |
|
Dr. Albert M. K. Cheng, Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems
|
Mar 28, 2007 |
|
Dan Geer, A quant looks at the future
|
Mar 21, 2007 |
|
Eugene Schultz, Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls
|
Mar 07, 2007 |
|
Bhavani Thuraisingham, Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners
|
Feb 28, 2007 |
|
Howard Schmidt, Cyber Security and the "NEW" world enterprise
|
Feb 21, 2007 |
|
Stuart Shapiro, Scenario-Driven Construction of Enterprise Information Policy
|
Feb 07, 2007 |
|
Chris Clifton, Mathematically Defining Privacy
|
Jan 31, 2007 |
|
Wojciech Szpankowski, What is Information?
|
Jan 24, 2007 |
|
Vipin Swarup, Research Challenges in Assured Information Sharing
|
Jan 17, 2007 |
|
Virginia Rezmierski, Computer-Related Incidents: Factors Related to Cause and Prevention
|
Jan 10, 2007 |
|
Marc Rogers, The Psychology of Computer Deviance: How it can assist in digital evidence analysis.
|
Dec 06, 2006 |
|
Dongyan Xu, OS-Level Taint Analysis for Malware Investigation and Defense
|
Nov 29, 2006 |
|
Richard Power, One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)
|
Nov 15, 2006 |
|
David Zage, Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
|
Nov 08, 2006 |
|
Paula DeWitte, Developing an Operational Framework for Integrated System Security
|
Nov 01, 2006 |
|
Qihua Wang, Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
|
Oct 25, 2006 |
|
Nitin Khanna, Forensics Characterization of Printers and Image Capture devices
|
Oct 18, 2006 |
|
Nora Rifon, Network Security Begins at Home: Changing Consumer Behavior for i-Safety
|
Oct 11, 2006 |
|
Danfeng Yao, Verification of Integrity for Outsourced Content Publishing and Database Queries
|
Oct 04, 2006 |
|
Ravi Sandhu, The Secure Information Sharing Problem and Solution Approaches
|
Sep 27, 2006 |
|
Gene Kim, Prioritizing Processes and Controls for Effective and Measurable Security
|
Sep 20, 2006 |
|
Hyogon Kim, Real-Time Visualization of Network Attacks on High-Speed Links
|
Sep 13, 2006 |
|
Ed Finkler, A Multi-layered Approach to Web Application Defense
|
Sep 06, 2006 |
|
Sid Stamm, Invasive Browser Sniffing and Countermeasures
|
Aug 30, 2006 |
|
Ehab Al-Shaer, Ph.D., Toward Autonomic Security Policy Management
|
Aug 23, 2006 |
|
Virgil D. Gligor, On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks
|
Apr 26, 2006 |
|
John Black, Recent Attacks on MD5
|
Apr 19, 2006 |
|
David Carroll, Identity Management Strategies and Integration Perspectives
|
Apr 12, 2006 |
|
Dave Ford, Chaos,Complexity, Cybernetics and Therminator:
|
Apr 05, 2006 |
|
Minaxi Gupta, Spoofing-resistant Packet Routing for the Internet"
|
Mar 29, 2006 |
|
Julie Earp, Privacy Policies in Web-based Healthcare
|
Mar 22, 2006 |
|
Marina Blanton, Dynamic and Efficient Key Management for Access Hierarchies
|
Mar 08, 2006 |
|
Rafae Bhatti, A Policy Engineering Framework for Federated Access Management
|
Mar 01, 2006 |
|
Mike Burmester, Provable security in mobile ad hoc networks
|
Feb 15, 2006 |
|
Brian Carrier, Categories of Digital Forensic Investigation Techniques
|
Feb 08, 2006 |
|
Abhilasha Bhargav-Spantzel, Digital Identity Management and Theft Protection
|
Feb 01, 2006 |
|
Paul Thompson, Semantic Attacks and Security
|
Jan 25, 2006 |
|
Jean Camp, Net Trust: Identification Through Social Context
|
Jan 18, 2006 |
|
Simson Garfinkel, Cross-Drive Forensic Analysis
|
Jan 11, 2006 |
|
Jelena Mirkovic, Clouseau: A practical IP spoofing defense through route-based filtering
|
Dec 07, 2005 |
|
Stanislaw Jarecki, Secret Handshakes
|
Nov 30, 2005 |
|
Shouhuai Xu, Privacy-preserving Policy-driven Access Control with Mixed Credentials
|
Nov 16, 2005 |
|
Anna Squicciarini, Privacy and anonymity in Trust Negotiations".
|
Nov 09, 2005 |
|
Bryant G. Tow, A Demonstration in the Need for a Layered Security Model
|
Oct 26, 2005 |
|
Dr. Angelos D. Keromytis, Toward Self-healing Software
|
Oct 19, 2005 |
|
Dan Massey, Securing the Internet's Domain Name System
|
Oct 05, 2005 |
|
Ting Yu, A Framework for Identifying Compromised Nodes in Sensor Networks
|
Sep 21, 2005 |
|
Peter Bajcsy, Toward Hazard Aware Spaces: Knowing Where, When and What Hazards Occur
|
Sep 14, 2005 |
|
Ed Finkler, Real World Web Application Security
|
Sep 07, 2005 |
|
Himanshu Khurana, Minimizing Trust Liabilities in Secure Group Messaging Infrastructures
|
Aug 31, 2005 |
|
Stephen Elliott, An Introduction to Biometric Technologies
|
Aug 24, 2005 |
|
Sheng Zhong, PrivacyEnhancing k-Anonymization of Customer Data
|
Apr 27, 2005 |
|
Marianne Winslett, Traust and PeerTrust2: Applying Trust Negotiation to Real Systems
|
Apr 20, 2005 |
|
Mohamed Shehab, Watermarking Relational Databases
|
Apr 13, 2005 |
|
Brian Carrier, Defining a Digital Forensic Investigation
|
Apr 06, 2005 |
|
Helen J. Wang, Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
|
Mar 30, 2005 |
|
Dr. Kate Cherry and Dr. Wendy Hamilton, Lockheed Martin
|
Mar 23, 2005 |
|
David Evans, Where's the FEEB? Effectiveness of Instruction Set Randomization
|
Mar 09, 2005 |
|
Florian Buchholz, Using process labels to obtain forensic and traceback information
|
Mar 02, 2005 |
|
Jintai Ding, Perturbation of Multivariable Public-key Cryptosystems
|
Feb 23, 2005 |
|
Wenke Lee, Architectural Considerations for Anomaly Detection
|
Feb 09, 2005 |
|
Vitaly Shmatikov, Obfuscated Databases: Definitions and Constructions
|
Feb 02, 2005 |
|
Keith Frikken, Hidden Access Control Policies with Hidden Credentials
|
Jan 19, 2005 |
|
Cristina Nita-Rotaru, Survivable routing in wireless ad hoc networks
|
Jan 12, 2005 |
|
Dennis Fetterly, Using Statistical Analysis to Locate Spam Web Pages
|
Dec 08, 2004 |
|
William Winsborough, Attribute-Based Access Control
|
Dec 01, 2004 |
|
Indrakshi Ray, An Anonymous Fair-Exchange E-Commerce Protocol
|
Nov 17, 2004 |
|
James Joshi, GTRBAC: A Generalized Temporal Role Based Access Control Model
|
Nov 10, 2004 |
|
Abe Singer, Towards Mining Syslog Data
|
Nov 03, 2004 |
|
Ari Takanen, Robustness testing - black-box testing for software security
|
Oct 27, 2004 |
|
Dan Thomsen, Information Flow Analysis in Security Enhanced Linux
|
Oct 13, 2004 |
|
Gail-Joon Ahn, Secure Information Sharing within a Collaborative Environment
|
Sep 15, 2004 |
|
Jason Crampton, Administrative Scope and Role-Based Administration
|
Sep 08, 2004 |
|
Dave Ford, Application of Thermodynamics to Computer Network Defense
|
Aug 25, 2004 |
|
Sam Wagstaff, Cryptanalysis of Diffie-Hellman and Pohlig-Hellman
|
Jan 23, 2002 |
|
Sam Wagstaff, Information Theory
|
Aug 22, 2001 |
|
Gary McGraw, Building Secure Software
|
Jan 10, 2001 |
|
Peter Stephenson, Investigating Computer Security Incidents
|
Nov 08, 2000 |
|
Wenke Lee, Developing Data Mining Techniques for Intrusion Detection: A Progress Report
|
Oct 11, 2000 |
|
Richard Stotts, Jerome Webb & Matthew Beebe, Richard Stotts, Jerome Webb & Matthew Beebe
|
Oct 04, 2000 |
|
John Richardson, Evolving the Internet
|
Sep 20, 2000 |
|
Eugene Spafford, The Challenge of Secure Software
|
Sep 13, 2000 |
|
Jens Palsberg, Static Checking of Interrupt-Driven Software
|
Sep 06, 2000 |
|
Pascal Meunier, The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events
|
Aug 30, 2000 |
|
John Steven Reel, The Future of Information Security Technologies
|
Aug 23, 2000 |
|
Rick Davis, The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance
|
Apr 28, 2000 |
|
Michael G. Fleming & Victor Maconachy, Information Assurance Challenges for the 21st Century
|
Apr 21, 2000 |
|
Terran Lane, Machine Learning Techniques for Anomaly Detection in Computer Security
|
Apr 07, 2000 |
|
Padgett Peterson, Implications of Mobile Code on Microsoft Platforms
|
Mar 31, 2000 |
|
Judy Hochberg, Automatic identification of classified documents
|
Feb 25, 2000 |
|
Clay Shields, Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.
|
Feb 18, 2000 |
|
Gerald Thomas, Commercial High-Resolution Satellite Imagery Polic
|
Feb 11, 2000 |
|
Victor Raskin, NLP for IAS: Overview and Implementations
|
Feb 04, 2000 |
|
Gene Kim, Open Source Issues and Opportunities for Tripwire
|
Jan 21, 2000 |
|
Wenliang Du & Mahesh Tripunitara, Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)
|
Nov 19, 1999 |
|
Donn Parker, Information Security, a Folk Art in Need of an Upgrade
|
Nov 12, 1999 |
|
Michael Santarcangelo, eInfrastructure Security
|
Nov 05, 1999 |
|
James R. C. Hansen, Computer Forensics Examinations in the Consulting Arena
|
Oct 29, 1999 |
|
David Aucsmith, Balancing Big Brother
|
Oct 15, 1999 |
|
Edward J. Delp, Image and Video Watermarking: An Overview
|
Sep 10, 1999 |
|
Gene Spafford, Twelve Challenges in Information Security Research
|
Sep 03, 1999 |
|
Clay Shields, KHIP - A Scalable Protocol for Secure Multicast Routing
|
Aug 27, 1999 |