ABC
1
ReadingPresenterScribe
2
Authentication and Access Control
3
PasswordsOctavian SuciuEvripidis Paraskevas
4
BiometricsYupeng ZhangCarl Sabottke
5
Scalable authenticationBumJun KwonOctavian Suciu
6
Authorization logicZikai WenBumJun Kwon
7
Usable access controlWei BaiZiyun Zhu
8
Network Security
9
Security of Internet protocols - IP, UDP, TCPYupeng ZhangBumJun Kwon
10
Security of Internet protocols - BGP, DNSEvripidis ParaskevasOctavian Suciu
11
Web authenticationWei BaiBumJun Kwon
12
Web securityJohn McGahaganOctavian Suciu
13
SSL/TLSAhmed KosbaYupeng Zhang
14
Patch deployment & certificate revocationZiyun ZhuBumJun Kwon
15
Distributed Infrastructures Supporting Cybercrime
16
Memory corruptionJohn McGahaganOctavian Suciu
17
Worms & infection spreadingEvripidis ParaskevasBumJun Kwon
18
DDoS - mechansmsAhmed KosbaWei Bai
19
DDoS - detection and protectionZikai WenBumJun Kwon
20
BotnetsCarl SabottkeOctavian Suciu
21
SpamCarl SabottkeAhmed Kosba
22
Reputation based securityZiyun ZhuOctavian Suciu
23
24