Date | Time | Topic | Speaker | Host | Location |
---|---|---|---|---|---|
01/30/2009 | 3:00 PM | Sampling Attacks Against Hidden Web Databases | Prof. Nan Zhang | Songqing Chen | ST2, Room 430A |
02/13/2009 | 3:00 PM | Preventing SQL Injection Attacks: A Policy-based Data Type Checking Approach | Anyi Liu | Songqing Chen | ST2, Room 430A |
02/20/2009 | 2:00 PM | One Cell is Enough to Break Tor's Anonymity | Prof. Xinwen Fu | Songqing Chen | ST2, Room 430A |
03/03/2009 | 12:00 PM | Online Scheduling of Packets with Deadlines in a Bounded Buffer | Prof. Fei Li | Jyh-Ming Lien | ST2, Room 430A |
04/10/2009 | 3:00 PM | Defeating Anti-detection for Application-level Malware Analysis | Lei Liu | Songqing Chen | ST2, Room 430A |
04/24/2009 | 3:00 PM | Open Problems in Vehicular Ad Hoc Network Security | Eric Swankoski | Sanjeev Setia | Engineering Building, Room 4201 |
05/01/2009 | 3:00 PM | A Case Study of Traffic Locality in Internet P2P Live Streaming Systems | Yao Liu | Songqing Chen | Engineering Building, Room 4201 |
05/08/2009 | 3:00 PM | Towards Optimal Resource Utilization in Heterogeneous P2P Streaming | Dongyu Liu | Songqing Chen | Engineering Building, Room 4201 |