2022-01-20 | A New Class of Buffer Overflow Attacks | 55:45 | 2 | Guide |
|
2022-01-20 | Publishing Microdata with a Robust Privacy Guarantee | 54:22 | 0 | Guide |
|
2022-01-20 | Privacy Preserving Assessment of Location Data Trustworthiness | 47:26 | 0 | Guide |
|
2022-01-20 | A Flexible System for Access Control | 56:11 | 0 | Guide |
|
2022-01-20 | Trends in cyber security consulting | 50:17 | 0 | Guide |
|
2022-01-20 | Privacy preserving attribute based group key management | 51:04 | 1 | Guide |
|
2022-01-20 | Forensic Carving of Network Packets with bulk extractor and tcpflow | 46:24 | 10 | Guide |
|
2022-01-20 | The new frontier, welcome the Cloud Brokers | 55:34 | 1 | Guide |
|
2022-01-20 | Not the Who but the What New applications of Hardware Identity | 42:15 | 0 | Guide |
|
2022-01-20 | Firmware Risks The Next Frontier Steve Battista, MITRE | 41:31 | 1 | Guide |
|
2022-01-20 | The Inertia of Productivity | 56:57 | 1 | Guide |
|
2022-01-20 | Leveraging internal network traffic to detect malicious activity Lessons lea | 44:18 | 0 | Guide |
|
2022-01-20 | Digital Citizenship A Target s View of Security and Life Online | 54:39 | 0 | Guide |
|
2022-01-20 | FuzzyFusiontm, an application architecture for multisource informati | 43:30 | 0 | Guide |
|
2022-01-20 | Retrofitting Legacy Code for Security | 50:32 | 1 | Guide |
|
2022-01-20 | Exploiting Banners for Fun and Profits | 49:48 | 0 | Guide |
|
2022-01-20 | User and Machine Authentication and Authorization Infrastructure for Distrib | 53:35 | 2 | Guide |
|
2022-01-20 | Provisioning Protocol Challenges in an Era of gTLD Expansion | 58:50 | 0 | Guide |
|
2022-01-20 | Process Implanting A New Active Introspection Framework for Virtualization | 29:11 | 2 | Guide |
|
2022-01-20 | Understanding insiders An analysis of risk taking behavior | 42:56 | 1 | Guide |
|
2022-01-20 | Enterprise Wide Intrusions Involving Advanced Threats | 59:30 | 5 | Guide |
|
2022-01-20 | Ontological Semantic Technology Goes Phishing | 50:32 | 0 | Vlog |
|
2022-01-20 | Trusted Computing and Security for Embedded Systems | 48:10 | 4 | Guide |
|
2022-01-20 | Detecting Bots in Online Games using Human Observational Proofs | 50:44 | 2 | Guide |
|
2022-01-20 | SureView AMP, Active Malware Protection, detecting malware anti virus solutio | 51:42 | 1 | Review |
|
2022-01-20 | Non homogeneous anonymizations | 57:10 | 1 | Guide |
|
2022-01-20 | A couple of results about JavaScript | 41:27 | 0 | Guide |
|
2022-01-20 | Soundcomber A Stealthy and Context Aware Sound Trojan for Smartphones | 59:51 | 1 | Guide |
|
2022-01-20 | Modeling DNS Security Misconfiguration, Availability, and Visualizatio | 49:00 | 1 | Guide |
|
2022-01-20 | Society, Law Enforcement and the Internet Models for Give and Take | 1:11:14 | 2 | Guide |
|
2022-01-20 | Mobile Phones and Evidence Preservation | 49:26 | 1 | Guide |
|
2022-01-20 | Semantic Security or How I Learned to Stop Worrying and Looooooove the | 56:59 | 6 | Guide |
|
2022-01-20 | What does Knowledge Discovery, Predictability, and Human Behavior have to do | 44:19 | 0 | Guide |
|
2022-01-20 | Methods and Techniques for Protecting Data in Real Time on the Wire | 49:46 | 1 | Guide |
|
2022-01-20 | Securing Application Level Topology Estimation Networks Facing the Frog Boil | 28:54 | 0 | Vlog |
|
2022-01-20 | Weighted Multiple Secret Sharing | 49:08 | 0 | Guide |
|
2022-01-20 | Risk Perception and Trust in Cloud | 37:10 | 0 | Guide |
|
2022-01-20 | Jam me if you can Mitigating the Impact of Inside Jammers | 56:55 | 1 | Guide |
|
2022-01-20 | Data in the Cloud Authentication Without Leaking | 52:27 | 4 | Guide |
|
2022-01-20 | Making of the CWE Top 25, 2010 Edition | 53:11 | 2 | Guide |
|
2022-01-20 | Assured Processing through Obfuscation | 53:27 | 2 | Guide |
|
2022-01-20 | Ontological Semantic Technology for Detecting Insider Threat and Socia | 56:19 | 0 | Vlog |
|
2022-01-20 | The role of System Security Engineering in the engineering lifecycle | 57:39 | 2 | Guide |
|
2022-01-20 | Nudging the Digital Pirate Behavioral Issues in the Piracy Context | 48:02 | 3 | Guide |
|
2022-01-20 | Detecting Coordinated Attacks with Traffic Analysis | 55:47 | 4 | Guide |
|
2022-01-18 | Tackling System Wide Integrity | 1:00:16 | 1 | Guide |
|
2022-01-18 | Global Study of Web 2 0 Use in Organizations | 50:50 | 1 | Guide |
|
2022-01-18 | Applications of Biometric Technologies | 50:04 | 1 | Vlog |
|
2022-01-18 | Side Channel Threats in the Software as a Service Era Challenges and Respons | 1:00:15 | 0 | Guide |
|
2022-01-18 | A Platform for Creating Efficient, Robust, and Resilient Peer to Peer Systems | 40:57 | 0 | Guide |
|
2022-01-18 | Fast Regular Expression Matching using Small TCAMs for Network Intrusion Dete | 53:35 | 0 | Guide |
|
2022-01-18 | Security of Mobile Ad Hoc Networks MANETs | 51:40 | 22 | Guide |
|
2022-01-18 | Security Applications for Physically Unclonable Functions | 53:50 | 5 | Guide |
|
2022-01-18 | 60 years of scientific research in cryptography a reflection | 1:02:53 | 3 | Guide |
|
2022-01-18 | Security of JavaScript in a Browser Environment | 47:19 | 1 | Guide |
|
2022-01-18 | Secure Network Coding for Wireless Mesh Networks | 52:32 | 8 | Guide |
|
2022-01-18 | Everything I Needed to Know about Security, I Learned in 1974 | 1:01:18 | 0 | Guide |
|
2022-01-18 | Trust and Protection in the Illinois Browser Operating System | 50:04 | 1 | Guide |
|
2022-01-18 | Dissecting Digital Data Context and Meaning through Analytics | 55:52 | 0 | Guide |
|
2022-01-18 | Rootkits | 1:01:00 | 6 | Guide |
|
2022-01-18 | Thinking Outside the Box | 53:16 | 1 | Guide |
|
2022-01-18 | Ribbons, A Partially Shared Memory Programming Model | 50:07 | 0 | Guide |
|
2022-01-18 | Detection and protection from denial of service attacks in grids by accountab | 54:03 | 0 | Guide |
|
2022-01-18 | The role of System Security Engineering in the engineering lifecycle | 57:39 | 16 | Guide |
|
2022-01-18 | Provenance based Data Trustworthiness Assessment in Data Streams | 45:43 | 1 | Guide |
|
2022-01-18 | Detecting Insider Theft of Trade Secrets | 51:23 | 3 | Guide |
|
2022-01-18 | Database Assurance Anomaly Detection for Relational Databases | 48:45 | 6 | Guide |
|
2022-01-18 | Some Thoughts on the Pervasive Trust Foundation for the Future Internet Archi | 48:59 | 0 | Guide |
|
2022-01-18 | Providing Privacy through Plausibly Deniable Search | 39:16 | 0 | Guide |
|
2022-01-18 | Cyber Security Trends and Disruptors | 56:55 | 3 | Guide |
|
2022-01-18 | Software Assurance Motivation, Background, and Acquisition Pursuits | 56:35 | 2 | Guide |
|
2022-01-18 | Privacy from accessing databases to location based services | 49:35 | 0 | Guide |
|
2022-01-18 | Security in Infrastructureless and Decentralized Communication Networks Pos | 42:04 | 3 | Guide |
|
2022-01-18 | An Analysis of Data Breach Disclosure | 55:22 | 3 | Guide |
|
2022-01-18 | PlugNPlay Trust for Embedded Communication Systems | 56:49 | 0 | Guide |
|
2022-01-18 | USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYST | 55:01 | 1 | Guide |
|
2022-01-18 | Multi Policy Access Control for Healthcare using Policy Machine | 29:20 | 0 | Guide |
|
2022-01-18 | An Alternate Memory Architecture for Code Injection Prevention | 38:10 | 1 | Guide |
|
2022-01-18 | Access Control and Resiliency for WS BPEL | 30:37 | 1 | Guide |
|
2022-01-18 | The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb | 54:43 | 0 | Guide |
|
2022-01-18 | A Rules Based Statistical Algorithm for Keystroke Detection | 46:37 | 0 | Guide |
|
2022-01-18 | Mace Systems and Language Support for Building Correct, High Performance Net | 48:55 | 0 | Guide |
|
2022-01-18 | Security for the Next Internet over Heterogeneous Environments | 53:34 | 1 | Guide |
|
2022-01-18 | The Building Security In Maturity Model BSIMM | 51:28 | 93 | Guide |
|
2022-01-18 | Human Factors Approaches to Preserving Privacy | 54:30 | 1 | Guide |
|
2022-01-18 | The Best Defense is Information | 47:04 | 0 | Guide |
|
2022-01-18 | Safely Analyzing Sensitive Network Data | 57:25 | 0 | Guide |
|
2022-01-18 | From Security Architecture to Implementation | 41:47 | 2 | Guide |
|
2022-01-18 | Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber S | 59:37 | 0 | Guide |
|
2022-01-18 | Rick Clark, Ontario Systems | 49:40 | 4 | Guide |
|
2022-01-18 | Fake Picassos, Tampered History, and Digital Forgery Protecting the Genealog | 51:24 | 1 | Vlog |
|
2022-01-18 | Sphinx A Compact and Provably Secure Mix Format | 54:06 | 2 | Guide |
|
2022-01-18 | Quantitative Risk Assessment of Software Security and Privacy, and Risk Manag | 52:06 | 0 | Guide |
|
2022-01-18 | Towards Event Source Location Privacy in Wireless Sensor Networks | 51:47 | 8 | Guide |
|
2022-01-18 | Exploiting Opportunistic Scheduling in Cellular Data Networks | 48:48 | 6 | Guide |
|
2022-01-18 | Reading the Disclosures with New Eyes Bridging the Gap between Information S | 44:17 | 0 | Guide |
|
2022-01-18 | Private Queries in Location Based Services Anonymizers are not Necessary | 44:53 | 2 | Guide |
|
2022-01-18 | Exploitable Redirects on the Web Identification, Prevalence, and Defense | 55:09 | 1 | Guide |
|
2022-01-18 | Measuring the Attack Surfaces of Enterprise Software Systems | 50:43 | 5 | Guide |
|
2022-01-18 | Electronic Voting Danger and Opportunity | 53:54 | 0 | Guide |
|