Home
Search
Filter
Sort by
Relevance
Upload date
View count
Rating
Upload date
Any
Last hour
Today
This week
This month
This year
Type
Any
Video
Channel
Playlist
Movie
Show
Duration
Any
Short (< 4 minutes)
Regular (> 4 - 20 minutes)
Long (> 20 minutes)
+Playlist
Blitz
Music
AA
DPI
Add to playlist
Clear selection
securitylectures
Just a rogue computer scientist, making sure good lectures remain accessible to everyone.
Videos
Shorts
Streams
Playlists
About
Search
139 videos
Sort by views
Sort by oldest
Sorted by newest
Sort by newest - no shorts
31:03
Greg Wilson's CUSEC 2010 Keynote
1.6K views
4 years ago
43:11
Hamming, "Foundations of the Digital (Discrete) Revolution" (March 30, 1995)
27K views
13 years ago
54:50
Bob Blakley, Digital Signatures (August 22, 2003)
438 views
13 years ago
28:21
Mark-Oliver Stehr, Formal Methods in the Dev. of HA Secure Systems (July 30, 2003)
508 views
13 years ago
1:01:58
William L. Tafoya, America's Critical Info. Infrastructure and Homeland Defense (April 18, 2002)
324 views
13 years ago
44:43
Sean Geddis and John Hurley, Mac OS X Security Features and Fundamentals (December 5, 2001)
344 views
13 years ago
55:51
Adam Young, Malicious Cryptography - Exposing Cryptovirology (February 27, 2004)
1.4K views
13 years ago
1:04:14
Dave M. Wennergren, 2001 - A Cyberspace Odyssey (October 31, 2001)
164 views
13 years ago
52:07
Drew Dean, Deconstructing Trust Management (September 05, 2001)
191 views
13 years ago
24:28
Jennifer Granick, Do You Need a Handle on the Law? (January 15, 2004)
638 views
13 years ago
49:13
Rob Beck and Dave Aitel, SHAREFUZZ - Security Related Stress Testing Tool (August 1, 2001)
370 views
13 years ago
55:02
Mark S. Miller, Immunity from Viruses, Safety from Geeks Bearing Gifts (May 9, 2002)
616 views
13 years ago
44:42
Arthur Pyster, A New Look at Cyber Defense (October 16, 2003)
142 views
13 years ago
52:20
Pat Riley, An Intelligent Internet (January 24, 2002)
122 views
13 years ago
14:43
Mark Heckman, Reducing IDS False Positives (July 21, 2003)
447 views
13 years ago
48:17
Edwin L. Armistead, Task Force Web (February 20, 2003)
208 views
13 years ago
52:36
William Crowell, The Compelling Business Case for Information Security (August 22, 2001)
233 views
13 years ago
56:57
Matt Bishop, Vulnerabilities Analysis (December 4, 2003)
1.3K views
13 years ago
1:13:52
Stuart McClure, Hacking Exposed (September 22, 2003)
352 views
13 years ago
48:57
Daniel Faigin, Overview of Common Criteria (September 10, 2003)
2.9K views
13 years ago
50:39
Todd Heberlein, Environment Aware Security (November 13, 2003)
88 views
13 years ago
47:38
Marcus Sachs, A National Strategy to Secure Cyberspace (November 14, 2002)
166 views
13 years ago
56:33
Yves Deswarte, Privacy enhanced Internet (November 19, 2002)
129 views
13 years ago
56:21
Roger Schell, Creating PKI You Can Trust (July 18, 2001)
332 views
13 years ago
1:07:43
William H. Murray, Use of System and Network Configuration for Security (August 14, 2001)
383 views
13 years ago
1:04:54
Chris Eagle, Interz0ne Panel Discussion (April 29, 2004)
135 views
13 years ago
1:13:59
Shawn Geddis, Tiger: How It Works for the DOD (June 14, 2005)
166 views
13 years ago
56:45
Rance DeLong, MLS with MILS? (March 2, 2006)
566 views
13 years ago
1:04:31
Jonathan K. Millen, Constraint Solving for Protocol Analysis (August 5, 2004)
227 views
13 years ago
51:40
Dan Ryan, Statistical Analysis in Information Assurance (January 6, 2005)
225 views
13 years ago
1:00:25
Donn B. Parker, What's Wrong With Information Security And How To Fix It (April 28, 2005)
2K views
13 years ago
48:38
Carol Taylor, MILS: A High Assurance Architecture (May 11, 2006)
373 views
13 years ago
1:03:47
Arthur Berger, Comparison of Performance over IPv6 versus IPv4 (September 29, 2011)
528 views
13 years ago
53:48
Simson Garfinkel, Disk Sanitization and Cross Drive Forensics (September 8, 2005)
406 views
13 years ago
1:00:04
Tim Sherwood, A Real time Packet Scan Architecture (July 14, 2005)
201 views
13 years ago
59:18
Nicholas Weaver, Serendipity and Spam (October 6, 2011)
391 views
13 years ago
59:38
John Launchbury, Cryptol in Future Cryptographic Evaluations (February 16, 2006)
638 views
13 years ago
34:30
Bora Akyol, Does IPSEC Secure Networks? (March 11, 2004)
136 views
13 years ago
57:38
Jennifer Granick, The State of Cyber Law (May 18, 2006)
1.4K views
13 years ago
56:06
Debra Cook, Elastic Block Ciphers (February 9, 2006)
55 views
13 years ago
52:32
Craig Partridge, Realizing the Future of Wireless Data Communications (October 19, 2010)
364 views
13 years ago
59:44
Ryan Kastner, Reconfigurable Hardware Security (August 11, 2005)
754 views
13 years ago
1:03:50
Kang G. Shin, E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks (February 3, 2012)
735 views
13 years ago
56:42
Sean Peisert, A Model of Computer Forensic Logging and Analysis (August 28, 2008)
660 views
13 years ago
53:13
Luther Martin, Identity Based Encryption vs. PKI (May 27, 2004)
1.7K views
13 years ago
1:03:48
Ruby B. Lee, Protecting Critical Secrets with SP Processors (September 7, 2006)
677 views
13 years ago
51:51
David A. McGrew, Scalable Efficient Cryptography for Multiple Security Services (July 29, 2004)
559 views
13 years ago
45:43
Hamming, "Systems Engineering" (May 30, 1995)
7.1K views
13 years ago
41:53
Dr. Hamming's 1990 NPS SGL Lecture
7K views
13 years ago
47:20
Hamming, Intro to The Art of Doing Science and Engineering: Learning to Learn (March 28, 1995)
138K views
13 years ago
39:18
Hamming, "Simulation, Part II" (May 9, 1995)
2.1K views
13 years ago
44:31
Hamming, "Experts" (May 25, 1995)
12K views
13 years ago
45:35
Hamming, "Mathematics" (May 18, 1995)
13K views
13 years ago
50:49
Hamming, "You Get What You Measure" (June 1, 1995)
9.8K views
13 years ago
36:27
Hamming, "Unreliable Data" (May 26, 1995)
4.8K views
13 years ago
40:38
Hamming, "How Do We Know What We Know" (June 2, 1995)
11K views
13 years ago
44:19
Hamming, "You and Your Research" (June 6, 1995)
292K views
13 years ago
48:02
Hamming, "Simulation, Part III" (May 11, 1995)
2.1K views
13 years ago
47:22
Hamming, "Computer Aided Instruction" (May 16, 1995)
1.9K views
13 years ago
44:20
Hamming, "Coding Theory - The Representation of Information, Part II" (April 20, 1995)
4.3K views
13 years ago
45:05
Hamming, "Artificial Intelligence - Part II" (April 11, 1995)
7.2K views
13 years ago
59:06
Danilo Bruschi, Bounding System Offensiveness (February 21, 2001)
503 views
13 years ago
56:44
Paul Fredrichs, DoD Class 3 PKI (March 3, 2000)
192 views
13 years ago
1:05:42
Emilia Rosti, A Performance Evaluation Study of an X.509 Compliant PKI (February 22, 2001)
386 views
13 years ago
35:02
Scott Heller, Multilevel Data Sharing the Coalition Data Server CoDS (February 26, 2001)
125 views
13 years ago
56:58
Thomas Berson, Potential of C4I The Challenge of Information Security (June 1, 2000)
429 views
13 years ago
1:14:49
William H. Murray, Everything I Needed to Know About Network Security... (July 20, 2000)
690 views
13 years ago
57:00
Gus Lott, Systems Development Information Assurance (April 6, 2000)
131 views
13 years ago
52:33
Eugene Miya, Digital Libraries Initiative, Phase 2 (April 26, 2000)
566 views
13 years ago
54:45
James Anderson, High Assurance Systems Supporting Labeling High Volume Archives (2000)
272 views
13 years ago
47:29
William A. Arbaugh, Chaining Layered Integrity Checks (May 19, 1999)
233 views
13 years ago
54:23
David A. Fisher, Survivability and Security in Unbounded Networks (March 18, 1999)
195 views
13 years ago
55:57
Steven Lipner, On the Technology and Market for Secure Systems (December 7, 1998)
122 views
13 years ago
53:37
James P. Anderson, Multilevel Security - The Neglected Area of Computer Science (April 17, 1997)
656 views
13 years ago
58:01
Thomas A. Berson, Sun Tzu in Cyberspace (April 9, 1998)
303 views
13 years ago
42:41
Terry Benzel, CORBA Security Services and the Sigma Project (June 5, 1997)
1.2K views
13 years ago
50:42
Peter G. Neumann, A System-Oriented Perspective of Computer-Related Risk (April 3, 1997)
665 views
13 years ago
45:32
Sylvan Pinsky, The Secure Composition Problem (May 1, 1997)
257 views
13 years ago
1:01:34
LCDR Mark Rohrbach, Achieving a Public Key Infrastructure for the U.S. Navy (April 2, 1998)
592 views
13 years ago
57:10
Karen Burke, DOD Certification and Accreditation C&A Process (September 9, 1998)
1.4K views
13 years ago
48:43
Skip Thaeler, Jack Stawiski, Integrating Protect, Attack, and Exploit in Systems (October 19, 1998)
234 views
13 years ago
53:19
Paul Karger, Network Security: Threats and Solutions (1997)
889 views
13 years ago
51:24
John McHugh, Policy Considerations for Mobile Nodes (August 19, 1998)
51 views
13 years ago
1:14:42
Klayton Monroe, NT (In)Security: Data Driven Attacks and Forensics (July 20, 1998)
258 views
13 years ago
24:33
William Shockley, An Axiomatic Specification of Mandatory Security Policies (July 29, 1998)
434 views
13 years ago
1:22:20
Marvin Schaefer, The Multilevel Policy Model for the Trusted ONTOS Prototype (July 22, 1998)
258 views
13 years ago
28:45
Per Oscarson, Graphical Conceptualisations of Fundamental Concepts in INFOSEC (June 26, 2003)
22 views
13 years ago
29:38
Helen Armstrong, Competitive Intelligence using Scenarios in the Classroom (June 27, 2003)
158 views
13 years ago
31:02
Jaroslave Dockal, Security Education in Time of Peace and Information War (June 28, 2003)
23 views
13 years ago
19:40
Daniel Ragsdale, A Comprehensive Undergrad IA Program (June 27, 2003)
43 views
13 years ago
14:28
Michael O'Leary, A Dedicated Undergraduate Track in Computer Security Education (June 28, 2003)
220 views
13 years ago
26:10
Matthew Warren, Australia: National Strategy for Security Education (June 26, 2003)
84 views
13 years ago
32:37
Keith Martin, 10 Years of INFOSEC Masters Programmes (June 27, 2003)
144 views
13 years ago
26:43
William Hutchinson, Integrating INFOSEC and Intelligence Courses (June 26, 2003)
39 views
13 years ago
28:19
Scott Lathrop, INFOWAR in the Trenches (June 26, 2003)
115 views
13 years ago
19:09
Natalia Miloslavskaya, Network Security Scientific and Research Laboratory (June 27, 2003)
44 views
13 years ago
15:09
Teemupekka Virtanen, Changes in the Profile of Security Managers (June 26, 2003)
38 views
13 years ago
21:40
Repickius Casmir, IT Readiness in Developing Countries: Tanzania (June 27, 2003)
20 views
13 years ago
27:24
Colin Armstrong, Mastering Computer Forensics (June 27, 2003)
96 views
13 years ago
26:27
Scott Cote, Training the Cyber Warrior (June 28, 2003)
166 views
13 years ago
1
2