Marvin's Underground Lectures
Welcome
Login / Register

Security Technologies


  • 1:05:45 C10M: Defending the Internet at scale by Robert David Graham

    C10M: Defending the Internet at scale by Robert David Graham

    by Admin Added 52 Views / 0 Likes

    C10M: Defending the Internet at scale. At talk given at Dartmouth College by Robert David Graham. March 4, 2013

  • 1:25:44 SITH3 - Panel 2: Evolving Business Models in mHealth

    SITH3 - Panel 2: Evolving Business Models in mHealth

    by Admin Added 44 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 2: Evolving Business Models in mHealthPanel AbstractHow are device manufacturers, new service providers, and existing EHR players building business models for mHealth? What are the opportunities for hom

  • 1:03:05 Mobile Measurement of Behavioral and Social Health at Population Scale

    Mobile Measurement of Behavioral and Social Health at Population Scale

    by Admin Added 42 Views / 0 Likes

    Given by Santosh Kumar, University of MemphisCo-Sponsored by ISTS, the CS Colloquium, and the Psychiatric Research Center's (PRC) Center for Technology and Behavioral Health (CTBH)Wednesday May 23, 2012 Dartmouth College

  • 1:13:47 Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    by Admin Added 42 Views / 0 Likes

    A talk given at Dartmouth College by Jeff Dagle of Pacific Northwest National Laboratory Wednesday January 23, 2013Co-sponsored by the Institute for Security, Technology, and Society and the CS ColloquiumAbstract:The interconnected electric power grid was

  • 1:20:17 SITH3 - Panel 1: Intersection of mHealth and Behavioral Health

    SITH3 - Panel 1: Intersection of mHealth and Behavioral Health

    by Admin Added 42 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 1: Intersection of mHealth and Behavioral HealthPanel AbstractThis panel discussed the potential for mHealth in an evolving healthcare context in the U.S., with a particular focus on the role that mHeal

  • 26:49 DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal.  Feb. 28, 2010

    DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal. Feb. 28, 2010

    by Admin Added 42 Views / 0 Likes

    Chinese hackers recently attacked Google, but no one knows for sure who did it. Cyber- warfare represents a real threat to the Nations interests. What are the attackers motives? Must we heighten our state of readiness? National Security expert and China h

  • 1:06:45 Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    by Admin Added 41 Views / 0 Likes

    Real-Time Crowd Support for People with DisabilitiesTuesday, November 15, 2011Jeffrey BighamUniversity of RochesterCo-sponsored by the CS Colloquium and ISTS AbstractJeffrey BighamUniversity of Rochester The past few decades have seen the development of w

  • 26:03 "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata

    "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata

    by Admin Added 41 Views / 0 Likes

    Rebecca Shapiro, Sergey Bratus, and Sean W. Smith, Dartmouth CollegePresented at the 7th USENIX Workshop on Offensive Technologies (WOOT '13)Although software exploitation historically started as an exercise in coaxing the target's execution into attacker

  • 21:35 Capability Exchange: Improving Access Control Usability in Health IT

    Capability Exchange: Improving Access Control Usability in Health IT

    by Admin Added 40 Views / 0 Likes

    Chen Qin, Emily Freebairn, and Sean Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesClinicians report usability problems in modern health IT systems in part because the strictness of computerization eliminat

  • 1:27:33 SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    by Admin Added 39 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 3: Opportunities for mHealth in the Developing WorldPanel AbstractMobile technology provides tremendous opportunities to make health and wellness more accessible to billions of people in developing coun

  • 53:33 SITH3 - Keynote Wendy Nilsen

    SITH3 - Keynote Wendy Nilsen

    by Admin Added 39 Views / 0 Likes

    Securing IT in Healthcare: Part IIIKEYNOTE- May 17, 2013Wendy NilsenWendy Nilsen, Ph.D. is a Health Scientist Administrator at the NIH Office of Behavioral and Social Sciences Research (OBSSR). Wendy's scientific focus is on the science of human behavior

  • 1:24:05 SITH3 - Panel 4: Challenges in Securing mHealth Infrastructure

    SITH3 - Panel 4: Challenges in Securing mHealth Infrastructure

    by Admin Added 38 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 4: Challenges in Securing mHealth InfrastructurePanel AbstractWhen developing mobile health technology, who is the adversary? What are the most important concerns in developing mHealth technology that c

  • 48:12 SITH3 - Keynote Patty Mechael

    SITH3 - Keynote Patty Mechael

    by Admin Added 38 Views / 0 Likes

    Securing IT in Healthcare: Part IIIKEYNOTE- May 16, 2013Patricia MechaelPatty MechaelDr. Patricia Mechael is the Executive Director of the mHealth Alliance, which is hosted by the United Nations Foundation. Patty has been actively involved in global healt

  • 25:55 Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    by Admin Added 37 Views / 0 Likes

    Samuel Tan, Rebecca Shapiro, and Sean W. Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesThe Electronic Prescription for Controlled Substances (EPCS) is a set of rules published by the Drug Enforcement Admin

  • 36:11 The Page-Fault Weird Machine: Lessons in Instruction-less Computation

    The Page-Fault Weird Machine: Lessons in Instruction-less Computation

    by Admin Added 37 Views / 0 Likes

    Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith, Dartmouth CollegePresented at the 7th USENIX Workshop on Offensive Technologies (WOOT '13)Trust Analysis, i.e. determining that a system will not execute some class of computations, typica

  • 57:49 Cryptography is a systems problem (or) 'Should we deploy TLS'

    Cryptography is a systems problem (or) 'Should we deploy TLS'

    by Admin Added 35 Views / 0 Likes

    Cryptography is a systems problem (or) 'Should we deploy TLS'Given by Matthew Green, Johns Hopkins University

  • 1:19:31 Gary McGraw: Cyber War, Cyber Peace, Stones, and Glass Houses

    Gary McGraw: Cyber War, Cyber Peace, Stones, and Glass Houses

    by Admin Added 33 Views / 0 Likes

    Co-sponsored by ISTS and the Dickey Center at Dartmouth CollegeWashington has become transfixed by cyber security and with good reason. Cyber threats cost Americans billions of dollars each year and put U.S. troops at risk. Yet, too much of the discussion

  • 59:36 Sam Gustman - "Cloud Archives" at the University of Southern California

    Sam Gustman - "Cloud Archives" at the University of Southern California

    by Admin Added 33 Views / 0 Likes

    "Cloud Archives" at the University of Southern California: The USC Shoah Foundation and the USC Digital Repository.Friday, October 26, 2012 at 4:00pmThe Loew Auditorium - Black Family Visual Arts CenterSam GustmanCTO Shoah FoundationAssociate Dean, Univer

  • 1:29:27 Christena Nippert-Eng  "Privacy:  how we do it and when it matters most"

    Christena Nippert-Eng "Privacy: how we do it and when it matters most"

    by Admin Added 32 Views / 0 Likes

    How do we think about privacy? How do we actually do it? What, exactly, is the anatomy of a privacy violation and how does technology give us a useful entry point to understanding when privacy really matters? Dr. Nippert-Eng will address these issues and

  • 1:14:42 Explore the Cyber Threat Evolution

    Explore the Cyber Threat Evolution

    by Admin Added 32 Views / 0 Likes

    Solera Networks Luncheon Event with General Michael V. Hayden

  • 1:12:17 Towards a formal theory of computer insecurity: a language-theoretic approach

    Towards a formal theory of computer insecurity: a language-theoretic approach

    by Admin Added 31 Views / 0 Likes

    The Institute for Security, Technology, and SocietypresentsTowards a formal theory of computer insecurity:a language-theoretic approachPresented by:Len Sassaman, Katholieke Universiteit LeuvenMeredith L. Patterson, Independent researcherThursday, February

  • 49:23 Special Needs Offenders: Introduction To Cyber Crime (Part 2)

    Special Needs Offenders: Introduction To Cyber Crime (Part 2)

    by Admin Added 30 Views / 0 Likes

    Federal Judicial Center Special Needs Offenders: Introduction to Cyber Crime (Part 2) AVA20958VNB2, 2000 This program examines the investigation and supervis...

  • 1:30:14 Special Needs Offenders: Cyber Crime And Cyber Terrorism

    Special Needs Offenders: Cyber Crime And Cyber Terrorism

    by Admin Added 29 Views / 0 Likes

    2002 Federal Judicial Center gov.ntis.ava21130vnb1 4328-V/02 Federal Judicial Center - This follow-up to Special Needs Offenders: Introduction to Cyber Crime...

  • 1:15:14 Policing Cybercrimes: responding to the transnational challenges of cybercrime

    Policing Cybercrimes: responding to the transnational challenges of cybercrime

    by Admin Added 28 Views / 0 Likes

    Presented by Professor Dr. David S. Wall, Criminology, SASS, Durham University, UKCo-sponsored by the Institute for Security, Technology, and Society and the Institute for Information Infrastructure Protectionhttp://www.ists.dartmouth.edu/events/abstract-

Categories

| Kids Playground | Events Schedule |Image Galleries | Games | Radios |Animations | Chat | Classifieds | Blog Post | Free Content | News
Copyright @ 2005-2006 Marvin A. Hendricks Inc. All Rights Reserved