Home
Search
Filter
Sort by
Relevance
Upload date
View count
Rating
Upload date
Any
Last hour
Today
This week
This month
This year
Type
Any
Video
Channel
Playlist
Movie
Show
Duration
Any
Short (< 4 minutes)
Regular (> 4 - 20 minutes)
Long (> 20 minutes)
+Playlist
Blitz
Music
AA
DPI
Add to playlist
Clear selection
Lecture Series @ NPS / CISR
None
videos
views
Last updated
Invited Lectures, Candidate Talks, etc in the CS Department at NPS and CISR
53:19
Paul Karger, Network Security: Threats and Solutions (1997)
By
securitylectures
889 views
13 years ago
50:42
Peter G. Neumann, A System-Oriented Perspective of Computer-Related Risk (April 3, 1997)
By
securitylectures
665 views
13 years ago
53:37
James P. Anderson, Multilevel Security - The Neglected Area of Computer Science (April 17, 1997)
By
securitylectures
656 views
13 years ago
45:32
Sylvan Pinsky, The Secure Composition Problem (May 1, 1997)
By
securitylectures
257 views
13 years ago
42:41
Terry Benzel, CORBA Security Services and the Sigma Project (June 5, 1997)
By
securitylectures
1.2K views
13 years ago
58:01
Thomas A. Berson, Sun Tzu in Cyberspace (April 9, 1998)
By
securitylectures
303 views
13 years ago
1:01:34
LCDR Mark Rohrbach, Achieving a Public Key Infrastructure for the U.S. Navy (April 2, 1998)
By
securitylectures
592 views
13 years ago
1:14:42
Klayton Monroe, NT (In)Security: Data Driven Attacks and Forensics (July 20, 1998)
By
securitylectures
258 views
13 years ago
1:22:20
Marvin Schaefer, The Multilevel Policy Model for the Trusted ONTOS Prototype (July 22, 1998)
By
securitylectures
258 views
13 years ago
24:33
William Shockley, An Axiomatic Specification of Mandatory Security Policies (July 29, 1998)
By
securitylectures
434 views
13 years ago
51:24
John McHugh, Policy Considerations for Mobile Nodes (August 19, 1998)
By
securitylectures
51 views
13 years ago
57:10
Karen Burke, DOD Certification and Accreditation C&A Process (September 9, 1998)
By
securitylectures
1.4K views
13 years ago
48:43
Skip Thaeler, Jack Stawiski, Integrating Protect, Attack, and Exploit in Systems (October 19, 1998)
By
securitylectures
234 views
13 years ago
55:57
Steven Lipner, On the Technology and Market for Secure Systems (December 7, 1998)
By
securitylectures
122 views
13 years ago
54:23
David A. Fisher, Survivability and Security in Unbounded Networks (March 18, 1999)
By
securitylectures
195 views
13 years ago
47:29
William A. Arbaugh, Chaining Layered Integrity Checks (May 19, 1999)
By
securitylectures
233 views
13 years ago
54:45
James Anderson, High Assurance Systems Supporting Labeling High Volume Archives (2000)
By
securitylectures
272 views
13 years ago
52:33
Eugene Miya, Digital Libraries Initiative, Phase 2 (April 26, 2000)
By
securitylectures
566 views
13 years ago
57:00
Gus Lott, Systems Development Information Assurance (April 6, 2000)
By
securitylectures
131 views
13 years ago
56:44
Paul Fredrichs, DoD Class 3 PKI (March 3, 2000)
By
securitylectures
192 views
13 years ago
56:58
Thomas Berson, Potential of C4I The Challenge of Information Security (June 1, 2000)
By
securitylectures
429 views
13 years ago
1:14:49
William H. Murray, Everything I Needed to Know About Network Security... (July 20, 2000)
By
securitylectures
690 views
13 years ago
59:06
Danilo Bruschi, Bounding System Offensiveness (February 21, 2001)
By
securitylectures
503 views
13 years ago
1:05:42
Emilia Rosti, A Performance Evaluation Study of an X.509 Compliant PKI (February 22, 2001)
By
securitylectures
386 views
13 years ago
35:02
Scott Heller, Multilevel Data Sharing the Coalition Data Server CoDS (February 26, 2001)
By
securitylectures
125 views
13 years ago
49:13
Rob Beck and Dave Aitel, SHAREFUZZ - Security Related Stress Testing Tool (August 1, 2001)
By
securitylectures
370 views
13 years ago
1:07:43
William H. Murray, Use of System and Network Configuration for Security (August 14, 2001)
By
securitylectures
383 views
13 years ago
52:36
William Crowell, The Compelling Business Case for Information Security (August 22, 2001)
By
securitylectures
233 views
13 years ago
56:21
Roger Schell, Creating PKI You Can Trust (July 18, 2001)
By
securitylectures
332 views
13 years ago
1:04:14
Dave M. Wennergren, 2001 - A Cyberspace Odyssey (October 31, 2001)
By
securitylectures
164 views
13 years ago
52:07
Drew Dean, Deconstructing Trust Management (September 05, 2001)
By
securitylectures
191 views
13 years ago
44:43
Sean Geddis and John Hurley, Mac OS X Security Features and Fundamentals (December 5, 2001)
By
securitylectures
344 views
13 years ago
52:20
Pat Riley, An Intelligent Internet (January 24, 2002)
By
securitylectures
122 views
13 years ago
1:01:58
William L. Tafoya, America's Critical Info. Infrastructure and Homeland Defense (April 18, 2002)
By
securitylectures
324 views
13 years ago
55:02
Mark S. Miller, Immunity from Viruses, Safety from Geeks Bearing Gifts (May 9, 2002)
By
securitylectures
616 views
13 years ago
47:38
Marcus Sachs, A National Strategy to Secure Cyberspace (November 14, 2002)
By
securitylectures
166 views
13 years ago
56:33
Yves Deswarte, Privacy enhanced Internet (November 19, 2002)
By
securitylectures
129 views
13 years ago
48:17
Edwin L. Armistead, Task Force Web (February 20, 2003)
By
securitylectures
208 views
13 years ago
14:43
Mark Heckman, Reducing IDS False Positives (July 21, 2003)
By
securitylectures
447 views
13 years ago
28:21
Mark-Oliver Stehr, Formal Methods in the Dev. of HA Secure Systems (July 30, 2003)
By
securitylectures
508 views
13 years ago
48:57
Daniel Faigin, Overview of Common Criteria (September 10, 2003)
By
securitylectures
2.9K views
13 years ago
54:50
Bob Blakley, Digital Signatures (August 22, 2003)
By
securitylectures
438 views
13 years ago
1:13:52
Stuart McClure, Hacking Exposed (September 22, 2003)
By
securitylectures
352 views
13 years ago
44:42
Arthur Pyster, A New Look at Cyber Defense (October 16, 2003)
By
securitylectures
142 views
13 years ago
50:39
Todd Heberlein, Environment Aware Security (November 13, 2003)
By
securitylectures
88 views
13 years ago
56:57
Matt Bishop, Vulnerabilities Analysis (December 4, 2003)
By
securitylectures
1.3K views
13 years ago
24:28
Jennifer Granick, Do You Need a Handle on the Law? (January 15, 2004)
By
securitylectures
638 views
13 years ago
55:51
Adam Young, Malicious Cryptography - Exposing Cryptovirology (February 27, 2004)
By
securitylectures
1.4K views
13 years ago
34:30
Bora Akyol, Does IPSEC Secure Networks? (March 11, 2004)
By
securitylectures
136 views
13 years ago
1:04:54
Chris Eagle, Interz0ne Panel Discussion (April 29, 2004)
By
securitylectures
135 views
13 years ago
53:13
Luther Martin, Identity Based Encryption vs. PKI (May 27, 2004)
By
securitylectures
1.7K views
13 years ago
51:51
David A. McGrew, Scalable Efficient Cryptography for Multiple Security Services (July 29, 2004)
By
securitylectures
559 views
13 years ago
1:04:31
Jonathan K. Millen, Constraint Solving for Protocol Analysis (August 5, 2004)
By
securitylectures
227 views
13 years ago
51:40
Dan Ryan, Statistical Analysis in Information Assurance (January 6, 2005)
By
securitylectures
225 views
13 years ago
1:00:25
Donn B. Parker, What's Wrong With Information Security And How To Fix It (April 28, 2005)
By
securitylectures
2K views
13 years ago
1:13:59
Shawn Geddis, Tiger: How It Works for the DOD (June 14, 2005)
By
securitylectures
166 views
13 years ago
1:00:04
Tim Sherwood, A Real time Packet Scan Architecture (July 14, 2005)
By
securitylectures
201 views
13 years ago
59:44
Ryan Kastner, Reconfigurable Hardware Security (August 11, 2005)
By
securitylectures
754 views
13 years ago
53:48
Simson Garfinkel, Disk Sanitization and Cross Drive Forensics (September 8, 2005)
By
securitylectures
406 views
13 years ago
59:38
John Launchbury, Cryptol in Future Cryptographic Evaluations (February 16, 2006)
By
securitylectures
638 views
13 years ago
56:45
Rance DeLong, MLS with MILS? (March 2, 2006)
By
securitylectures
566 views
13 years ago
48:38
Carol Taylor, MILS: A High Assurance Architecture (May 11, 2006)
By
securitylectures
373 views
13 years ago
57:38
Jennifer Granick, The State of Cyber Law (May 18, 2006)
By
securitylectures
1.4K views
13 years ago
1:03:48
Ruby B. Lee, Protecting Critical Secrets with SP Processors (September 7, 2006)
By
securitylectures
677 views
13 years ago
56:06
Debra Cook, Elastic Block Ciphers (February 9, 2006)
By
securitylectures
55 views
13 years ago
56:42
Sean Peisert, A Model of Computer Forensic Logging and Analysis (August 28, 2008)
By
securitylectures
660 views
13 years ago
52:32
Craig Partridge, Realizing the Future of Wireless Data Communications (October 19, 2010)
By
securitylectures
364 views
13 years ago
1:03:47
Arthur Berger, Comparison of Performance over IPv6 versus IPv4 (September 29, 2011)
By
securitylectures
528 views
13 years ago
59:18
Nicholas Weaver, Serendipity and Spam (October 6, 2011)
By
securitylectures
391 views
13 years ago
1:03:50
Kang G. Shin, E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks (February 3, 2012)
By
securitylectures
735 views
13 years ago
1
2
3
4
5
6
7
8
9