Parent directory/ | - | - |
Annual Information Security Symposium Awards.en.srt | 15.2 KiB | 2020 May 06 07:25 |
Annual Information Security Symposium Awards.mp4 | 13.5 MiB | 2021 May 17 04:19 |
Automatically Recovering Human-Understandable Evidence from Memory Images.en.srt | 54.1 KiB | 2020 May 06 07:25 |
Automatically Recovering Human-Understandable Evidence from Memory Images.mp4 | 41.7 MiB | 2021 May 17 04:19 |
Batch Techniques for Practical Private Information Retrieval.en.srt | 107.4 KiB | 2020 May 06 07:25 |
Batch Techniques for Practical Private Information Retrieval.mp4 | 78.3 MiB | 2021 May 17 04:19 |
Big Data Security and Privacy.mp4 | 64.6 MiB | 2021 May 17 04:19 |
Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.en.srt | 91.3 KiB | 2020 May 06 07:25 |
Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.mp4 | 48.2 MiB | 2021 May 17 04:19 |
CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.en.srt | 54.5 KiB | 2020 May 06 07:25 |
CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.mp4 | 44.2 MiB | 2021 May 17 04:19 |
Context Aware, Policy based approaches to Security.en.srt | 90.6 KiB | 2020 May 06 09:26 |
Context Aware, Policy based approaches to Security.mp4 | 67.7 MiB | 2021 May 17 04:19 |
Digital Identity Protection.en.srt | 70.5 KiB | 2020 May 06 09:40 |
Digital Identity Protection.mp4 | 41.9 MiB | 2021 May 17 04:19 |
Enforcing Least Privilege Memory Views for Multithreaded Applications.en.srt | 40.9 KiB | 2020 May 06 19:38 |
Enforcing Least Privilege Memory Views for Multithreaded Applications.mp4 | 27.2 MiB | 2021 May 17 04:19 |
ErsatzPasswords - Ending Password Cracking.en.srt | 47.7 KiB | 2020 May 06 07:25 |
ErsatzPasswords - Ending Password Cracking.mp4 | 30.1 MiB | 2021 May 17 04:19 |
Finding Specification Noncompliance and Attacks in Wireless Network..en.srt | 82.1 KiB | 2020 May 06 07:24 |
Finding Specification Noncompliance and Attacks in Wireless Network..mp4 | 52.9 MiB | 2021 May 17 04:19 |
General Motors Product Cybersecurity Overview.en.srt | 69.9 KiB | 2020 May 06 09:56 |
General Motors Product Cybersecurity Overview.mp4 | 59.8 MiB | 2021 May 17 04:19 |
Growing Up In Cyber, But Is Cyber Growing Up.en.srt | 118.7 KiB | 2020 May 06 07:25 |
Growing Up In Cyber, But Is Cyber Growing Up.mp4 | 55.2 MiB | 2021 May 17 04:19 |
IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.en.srt | 42.0 KiB | 2020 May 06 07:25 |
IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.mp4 | 31.6 MiB | 2021 May 17 04:19 |
IN-ISAC SOC, Security Awareness and More.mp4 | 71.8 MiB | 2021 May 17 04:19 |
Improving Outcomes with Services.en.srt | 65.9 KiB | 2020 May 06 07:25 |
Improving Outcomes with Services.mp4 | 45.7 MiB | 2021 May 17 04:19 |
Information Security Through the Lens of Crisis Organizations.mp4 | 31.3 MiB | 2021 May 17 04:19 |
Life as a Target.en.srt | 85.1 KiB | 2020 May 06 07:24 |
Life as a Target.mp4 | 71.7 MiB | 2021 May 17 04:19 |
New Research and Resources in NL IAS at Purdue.mp4 | 45.9 MiB | 2021 May 17 04:19 |
Predicting What Users Will do Next.en.srt | 59.6 KiB | 2020 May 06 07:25 |
Predicting What Users Will do Next.mp4 | 43.7 MiB | 2021 May 17 04:19 |
Privacy-preserving payments in credit networks.mp4 | 42.3 MiB | 2021 May 17 04:19 |
Robust Secure Computation.mp4 | 44.3 MiB | 2021 May 17 04:19 |
Secure Coding - Patterns and anti-patterns in the design and architecture of ..en.srt | 87.5 KiB | 2020 May 06 07:25 |
Secure Coding - Patterns and anti-patterns in the design and architecture of ..mp4 | 73.5 MiB | 2021 May 17 04:19 |
The Application of Natural Language Processing to Open Source Intelligence fo..en.srt | 59.4 KiB | 2020 May 06 19:39 |
The Application of Natural Language Processing to Open Source Intelligence fo..mp4 | 33.9 MiB | 2021 May 17 04:19 |
The Internet of Value Privacy and Applications.mp4 | 40.3 MiB | 2021 May 17 04:19 |
The Role of the NSA in the Development of DES.en.srt | 92.7 KiB | 2020 May 06 11:08 |
The Role of the NSA in the Development of DES.mp4 | 72.4 MiB | 2021 May 17 04:19 |
The role of cyber insurance in security and risk management.en.srt | 103.7 KiB | 2020 May 06 09:48 |
The role of cyber insurance in security and risk management.mp4 | 61.9 MiB | 2021 May 17 04:19 |
Towards Safe In-memory Transactions.en.srt | 99.5 KiB | 2020 May 06 07:25 |
Towards Safe In-memory Transactions.mp4 | 40.2 MiB | 2021 May 17 04:19 |
Usable Secure Webmail for Grassroots Adoption.mp4 | 55.4 MiB | 2021 May 17 04:19 |
Usable and Secure Human Authentication.en.srt | 89.7 KiB | 2020 May 06 19:38 |
Usable and Secure Human Authentication.mp4 | 44.2 MiB | 2021 May 17 04:19 |
Xukai Zou - Indiana University-Purdue University Indianapolis.mp4 | 69.1 MiB | 2021 May 17 04:19 |
nesCheck Memory Safety for Embedded Devices.en.srt | 57.0 KiB | 2020 May 06 07:25 |
nesCheck Memory Safety for Embedded Devices.mp4 | 37.7 MiB | 2021 May 17 04:19 |