USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
Published 2018-08-16Download video
Recommendations
-
21:34 USENIX Security '18 - Fear the Reaper: Characterization and Fast Detection of Card Skimmers
-
31:51 LISA15 - It Was Never Going to Work, So Let’s Have Some Tea
-
57:15 HiPEAC 2020 keynote 1: James Mickens on software-defined microarchitecture
-
58:14 Analogue Evolution, Digital Revolution: Tipping Points in Technology • Dylan Beattie • YOW! 2023
-
20:29 Why I changed my mind about nuclear power | Michael Shellenberger | TEDxBerlin
-
22:02 What Is an AI Anyway? | Mustafa Suleyman | TED
-
16:45 The magical science of storytelling | David JP Phillips | TEDxStockholm
-
44:56 I'll Let Myself In: Tactics of Physical Pen Testers
-
37:03 Something Strange Happens When You Follow Einstein's Math
-
12:55 How AI Will Step Off the Screen and into the Real World | Daniela Rus | TED
-
54:56 Justice: What's The Right Thing To Do? Episode 01 "THE MORAL SIDE OF MURDER"
-
16:34 Why Cybersecurity is Important! | Romeo Farinacci | TEDxGrandCanyonUniversity
-
30:10 The Inside Story of ChatGPT’s Astonishing Potential | Greg Brockman | TED
-
08:41 Best OS for programming? Mac vs Windows vs Linux debate settled
-
14:03 GÜNEŞ KREMİNİ UNUTMA! | Zehra İnşallah | TEDxBMC Youth
-
45:05 DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris
-
18:47 The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity
-
11:17 How to Govern AI — Even If It’s Hard to Predict | Helen Toner | TED
-
1:03:43 How to Speak
-
46:25 The Best Way to Win a Negotiation, According to a Harvard Business Professor | Inc.
Similar videos
-
49:27 USENIX Security '18 - Solving the Next Billion-People Privacy Problem
-
48:49 USENIX Security '18 - The Second Crypto War—What's Different Now
-
25:24 USENIX Security '18 - The Rewards and Costs of Stronger Passwords in a University...
-
26:44 USENIX Security '18 - When Does Machine Learning FAIL?...
-
23:27 USENIX Security '18 - How Do Tor Users Interact With Onion Services?
-
25:02 USENIX Security '18 - Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data...
-
43:06 LISA15 - It Was Never Going to Work, So Let’s Have Some Tea (with Q&A)
-
27:06 USENIX Security '18 - Translation Leak-aside Buffer: Defeating Cache Side-channel Protections
-
02:13 The Night Watch
-
22:22 USENIX Security '18 - Guarder: A Tunable Secure Allocator
-
23:46 PoCSci 2014 Keynote: James Mickens
-
01:01 usenix security 2018 tlbleed teaser video
-
19:44 USENIX Enigma 2019 - Something You Have and Someone You Know—Designing for Interpersonal Security
-
22:04 SOUPS 2019 - Monday Lightning Talks
-
31:43 Browser history re:visited [talk @ USENIX WOOT 2018]
-
19:55 USENIX Enigma 2018 - What Would You Do With a Nation-State Cyber Army?
-
28:21 Not Even Close The State of Computer Security
-
21:01 USENIX Enigma 2022 - Can the Fight against Disinformation Really Scale?