The Art and Science of Security Research

Video thumbnail (Frame 0) Video thumbnail (Frame 1584) Video thumbnail (Frame 4835) Video thumbnail (Frame 6987) Video thumbnail (Frame 8412) Video thumbnail (Frame 9441) Video thumbnail (Frame 10486) Video thumbnail (Frame 11579) Video thumbnail (Frame 12933) Video thumbnail (Frame 13939) Video thumbnail (Frame 15734) Video thumbnail (Frame 16609) Video thumbnail (Frame 17770) Video thumbnail (Frame 18819) Video thumbnail (Frame 19690) Video thumbnail (Frame 20891) Video thumbnail (Frame 22102) Video thumbnail (Frame 22980) Video thumbnail (Frame 24068) Video thumbnail (Frame 25356) Video thumbnail (Frame 26505) Video thumbnail (Frame 27863) Video thumbnail (Frame 29101) Video thumbnail (Frame 29942) Video thumbnail (Frame 31091) Video thumbnail (Frame 32254) Video thumbnail (Frame 33452) Video thumbnail (Frame 34680) Video thumbnail (Frame 36030) Video thumbnail (Frame 37389) Video thumbnail (Frame 38689) Video thumbnail (Frame 40349) Video thumbnail (Frame 41223) Video thumbnail (Frame 43007) Video thumbnail (Frame 44622) Video thumbnail (Frame 47066) Video thumbnail (Frame 49905) Video thumbnail (Frame 51076) Video thumbnail (Frame 51946) Video thumbnail (Frame 54466) Video thumbnail (Frame 55389) Video thumbnail (Frame 57313) Video thumbnail (Frame 59164) Video thumbnail (Frame 60140) Video thumbnail (Frame 61460) Video thumbnail (Frame 62478) Video thumbnail (Frame 63999) Video thumbnail (Frame 64883)
Video in TIB AV-Portal: The Art and Science of Security Research

Formal Metadata

The Art and Science of Security Research
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
Research is a tricky thing, full of pitfalls, blind alleys, and rich rewards for the individual and humanity. This talk studies the art and science of conducting security research, from the genesis of your idea through experimentation and refinement to publication and beyond. In this talk you will learn how to generate and select powerful ideas, build upon the work of others, conduct groundbreaking work, and share your results for maximum desired effect. Whether you are a lone researcher or part of a large cabal you will take away ideas and techniques for maximizing the impact of your work, lest it lay dormant or have someone else rediscover your idea several years later. Greg Conti is an Academy Professor and Director of West Point's Cyber Security Research Center. He is the author of Security Data Visualization (No Starch Press) and Googling Security (Addison-Wesley) as well as over 40 articles and papers covering online privacy, usable security, security data visualization, and cyber warfare. His work can be found at and

Related Material

Video is accompanying material for the following resource
Line (geometry) Constraint (mathematics) Expert system Hacker (term)
Outlier Length Momentum Expert system
Computer hardware Software Communications protocol Chi-squared distribution
Maxima and minima
Error message Interface (computing) Exploit (computer security)
Interactive television File format
Function (mathematics) Video tracking Plastikkarte Multiplication
Structural load Googol Web page Computer-generated imagery Query language Videoconferencing
Execution unit Multitier architecture Arithmetic mean State of matter IRIS-T Lace Infinity Information security Spektrum <Mathematik> Wireless LAN Scalable Coherent Interface
Archaeological field survey Physical system
Source code Writing Degree (graph theory) Coding theory Computer hardware Data mining Theory Encryption Electronic mailing list Information Vector potential Audiovisualisierung
Software engineering Permanent Web page Simultaneous localization and mapping Row (database) Conservation law Plastikkarte Electronic signature
Video game Stress (mechanics) Parallel port Capability Maturity Model
Email Data management Pay television Sic Ariana TV Lie group Graph (mathematics) Moving average Stack (abstract data type)
Binary file
Googol Building Usability
Mathematics NP-hard Event horizon Lie group Video game Maize Mathematician Library (computing) Game theory
Mathematics NP-hard Manufacturing execution system Event horizon Video game Mathematician Game theory
Machine vision Decision theory String (computer science) Heat transfer Term (mathematics) ARPANET
Rule of inference Explosion Trail Cybersex Graphic design Software testing Information security Hacker (term) Hypothesis ARPANET Netiquette
Inclusion map Collision Spacetime Group action
Reading (process) Vulnerability (computing) Computer hardware Software Design by contract Information security Plastikkarte Scalable Coherent Interface
Inclusion map Online help Feedback Building Timestamp
Mechanism design Performance appraisal Electronic mailing list Mathematical analysis Implementation Abstraction Library (computing) Data structure
Hierarchy Explosion Information security Hand fan Game theory Area
Database normalization Point (geometry) File format Computer program Bit rate Maxwell's equations Scalable Coherent Interface
Hypermedia Calculation Copyright infringement Natural number Maxima and minima Term (mathematics)
Open set
Chemical equation Process (computing) output Hacker (term) Library (computing)
Execution unit Parsing Empennage Website
Hacker (term)
IRIS-T System programming Spacetime Demoscene