Parent directory/ | - | - |
Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.en.srt | 40.0 KiB | 2020 May 06 08:25 |
SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.en.srt | 52.2 KiB | 2020 May 06 08:25 |
Yonghwi Kwon - Purdue University.en.srt | 56.3 KiB | 2020 May 06 08:25 |
Virtual Android Malware Detection and Analysis (VAMDA).en.srt | 56.8 KiB | 2020 May 06 08:25 |
Evaluation of Urban Vehicle Tracking Algorithms.en.srt | 62.5 KiB | 2020 May 06 08:25 |
Breaking Mobile Social Networks for Automated User Location Tracking.en.srt | 62.9 KiB | 2020 May 06 08:25 |
Code-Pointer Integrity.en.srt | 66.1 KiB | 2020 May 06 12:10 |
Samuel Jero - Purdue University.en.srt | 67.7 KiB | 2020 May 06 08:25 |
Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.en.srt | 71.6 KiB | 2020 May 06 10:37 |
Regulatory Compliance Checking Over Encrypted Audit Logs.en(transcribed).srt | 75.3 KiB | 2020 May 06 11:40 |
Learning from Information Security Maturity A Textual Analysis.en.srt | 79.1 KiB | 2020 May 06 08:25 |
Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.en.srt | 83.8 KiB | 2020 May 06 08:25 |
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.en.srt | 86.9 KiB | 2020 May 06 08:25 |
Verifying Computations with (Private) State.en.srt | 87.2 KiB | 2020 May 06 08:25 |
Privacy Potpourri Changing Privacy from the Bottom Up.en.srt | 94.5 KiB | 2020 May 06 08:25 |
Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.en.srt | 98.6 KiB | 2020 May 06 08:25 |
Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.en.srt | 100.7 KiB | 2020 May 06 08:25 |
Software updates decisions and security implications.en.srt | 106.1 KiB | 2020 May 06 08:25 |
Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.mp4 | 22.4 MiB | 2021 May 17 03:46 |
Virtual Android Malware Detection and Analysis (VAMDA).mp4 | 23.6 MiB | 2021 May 17 03:46 |
Code-Pointer Integrity.mp4 | 27.5 MiB | 2021 May 17 03:46 |
Breaking Mobile Social Networks for Automated User Location Tracking.mp4 | 28.8 MiB | 2021 May 17 03:46 |
Evaluation of Urban Vehicle Tracking Algorithms.mp4 | 29.4 MiB | 2021 May 17 03:46 |
Yonghwi Kwon - Purdue University.mp4 | 30.8 MiB | 2021 May 17 03:46 |
SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.mp4 | 31.0 MiB | 2021 May 17 03:46 |
Samuel Jero - Purdue University.mp4 | 34.5 MiB | 2021 May 17 03:46 |
Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.mp4 | 35.7 MiB | 2021 May 17 03:46 |
Security with Privacy - A Research Agenda.mp4 | 37.9 MiB | 2021 May 17 03:46 |
Regulatory Compliance Checking Over Encrypted Audit Logs.mp4 | 38.2 MiB | 2021 May 17 03:46 |
Preventing or Penalizing Equivocation in Decentralized Environments.mp4 | 38.6 MiB | 2021 May 17 03:46 |
Verification Techniques for Checking Compliance of Computer Systems and Protocols.mp4 | 39.0 MiB | 2021 May 17 03:46 |
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.mp4 | 41.5 MiB | 2021 May 17 03:46 |
Learning from Information Security Maturity A Textual Analysis.mp4 | 42.7 MiB | 2021 May 17 03:46 |
Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.mp4 | 45.1 MiB | 2021 May 17 03:46 |
Microsemi Security Solutions and Threat Driven Security.mp4 | 45.6 MiB | 2021 May 17 03:46 |
Verifying Computations with (Private) State.mp4 | 45.8 MiB | 2021 May 17 03:46 |
Privacy Notions for Data Publishing and Analysis.mp4 | 46.1 MiB | 2021 May 17 03:46 |
Privacy Potpourri Changing Privacy from the Bottom Up.mp4 | 48.1 MiB | 2021 May 17 03:46 |
Software updates decisions and security implications.mp4 | 48.2 MiB | 2021 May 17 03:46 |
Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.mp4 | 51.0 MiB | 2021 May 17 03:46 |
Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.mp4 | 57.5 MiB | 2021 May 17 03:46 |