Invited Talks, Lectures, and Presentations


 
  • Neil F. Johnson Investigating Hidden Information: Steganography and Steganalysis, Invited talk at the conference "Crime... The Future Today, Looking to Tomorrow!" Nederlands Congres Centrum, The Hague, The Netherlands, 28-30 October 2002.

  • Neil F. Johnson. Steganography & Steganalysis: Investigating Hidden Information Regional Computer Forensic Group (RCFG) and Mid-Atlantic Chapter of High-Technology Crime Investigation Association (HTCIA) George Mason University Computer Forensics Symposium (GMU 2002), Fairfax, VA, August 12-16, 2002.

  • Neil F. Johnson. Digital Watermarking: Applications for Intellectual Property Protection & Digital Rights Management, Advanced Computing Technology Focus Group lecture, July, 2002.

  • Neil F. Johnson. Introduction to Information Hiding: Steganography, Watermarking - Attacks, and Countermeasures, SANS Forensics, Investigation, Response, and Education (SANSFIRE) Conference, Boston, MA, USA, June 27 - July 2, 2002.

  • Neil F. Johnson. Introduction Steganography, Attacks, and Countermeasures, Guest lecture for Understanding the Internet, George Mason University, June, 2002.

  • Neil F. Johnson. Intrusion Detection and Steganography, Statistical Intrusion Detection Lecture, May, 2002.

  • Neil F. Johnson. Digital Steganography and Watermarking, an Introduction, STG Information Security Training Conference, February, 2002.

  • Neil F. Johnson. Steganalysis of Audio Data: Looking for Hidden Information, December, 2001.

  • Neil F. Johnson. Steganalysis: Analysis of Hidden Information, DOD Seminar, November, 2001.

  • Neil F. Johnson. Steganalysis: Analysis of Hidden Information, Law Enforcement Seminar, November, 2001.

  • Neil F. Johnson, Steve Noel, Brian O’Berry, Bob Weirbach, Chuck Youman, Trends and Tools for Information Assurance, E-Gov Information Assurance Conference, September, 2001.

  • Neil F. Johnson. Public Key Infrastructure (PKI), Lecture, October, 2001.

  • Neil F. Johnson. Pretty Good Privacy (PGP): Example of a Public Key Application, Lecture, October, 2001.

  • Neil F. Johnson. X.509: Certificate Management and PKI, Lecture, October, 2001.

  • Neil F. Johnson. Steganalysis: Investigating Hidden Information, Regional Computer Forensic Group (RCFG) and Mid-Atlantic Chapter of High-Technology Crime Investigation Association (HTCIA) George Mason University Computer Forensics Symposium (GMU 2001), Fairfax, VA, August 13-17, 2001.

  • Neil F. Johnson and Thomas Rude. Introduction to Steganography: Hidden Information, Regional Computer Forensic Group (RCFG) and Mid-Atlantic Chapter of High-Technology Crime Investigation Association (HTCIA) George Mason University Computer Forensics Symposium (GMU 2001), Fairfax, VA, August 13-17, 2001.

  • Neil F. Johnson. Investigating Hidden Information: Steganography and Issues in Computer Forensics, SANS Forensics, Investigation, Response, and Education (SANSFIRE) Conference, Washington, DC, USA, July, 2001.

  • Neil F. Johnson. Steganalysis: Investigating Hidden Information, June, 2001.

  • Neil F. Johnson. Steganography, Attacks, and Countermeasures, Optical and Protocol Vulnerability Assessment in Fiber Optic Communication Networks, Washington, DC metropolitan area, May 15-17, 2001.

  • Neil F. Johnson. Introduction to Cryptography for Information Security and Assurance, May, 2001.

  • Neil F. Johnson. Steganalysis: Looking for Hidden Information, MITRE Seminar, March, 2001.

  • Neil F. Johnson. Internet Government: Security Trends, Threats, and Tactics in the World Wide Web, E-Gov Web-Enabled Government Conference, February, 2001.

  • Neil F. Johnson. Steganalysis: Attacks on Hidden Information, Economic Crime Investigation Institute Conference on the Dark Side of E-Commerce: Risks & Solutions McLean, VA, October 30-31, 2000

  • Neil F. Johnson. Fundamentals of Public Key Infrastructure (PKI), Veridian Seminar, October, 2000.

  • Neil F. Johnson. Public Key Infrastructure (PKI), Lecture, October, 2000.

  • Neil F. Johnson. Pretty Good Privacy (PGP): Example of a Public Key Application, Lecture, October, 2000.

  • Neil F. Johnson. X.509: Certificate Management and PKI Lecture, October, 2000.

  • Neil F. Johnson. State of the World Wild Web: Security Trends, Threats, and Tactics, E-Gov Information Assurance Conference, September, 2000.

  • Neil F. Johnson. Steganography: Seeing the Unseen, IRM Conference, Willamsburg, VA, August 2000.

  • Neil F. Johnson. Information Hiding: The Art of Steganography, Attacks and Countermeasures, Global Technology Summit, George Mason University, 2000.

  • Neil F. Johnson. Countermeasures to Attacks Against Digital Watermarks in Images, Tutorial for the 15th Annual Computer Security Applications Conference (ACSAC), Issues 1999: Multimedia and Security Special Workshop, Phoenix, Arizona, December 6-10, 1999

  • Neil F. Johnson. Public Key Infrastructure (PKI): Putting It All Together, Public Key Applications and Examples of PKI, Lecture for Dr. Sushil Jajodia's Systems Security Class at George Mason University, November 1999.

  • Neil F. Johnson. Pretty Good Privacy (PGP): Example of a Public Key Application, Lecture, November, 1999.

  • Neil F. Johnson. X.509: Certificate Management and PKI, Lecture, November, 1999.

  • Neil F. Johnson. Steganography, Attacks, and Countermeasures, Short Course, Naval Surface Warfare Center, 1999.

  • Neil F. Johnson. Electronic Mail Security, Lecture, May 1999.

  • Neil F. Johnson. Steganography, Attacks, and Countermeasures, Lecture for Dr. Dorothy Denning's Cryptography Class at George Washington University, 1999.

  • Neil F. Johnson. An Introduction to Watermark Recovery from Images, SANS Intrusion Detection and Response (ID'99), Proceedings. San Diego, CA, February 9-13, 1999.

  • Neil F. Johnson. Introduction to Cryptography, Lecture, SANS Intrusion Detection and Response (ID'99). San Diego, CA, February 9-13, 1999.

  • Neil F. Johnson. Introduction to Cryptography, Short Course, Practical Security for Sensitive Systems 1998: Information Systems Security Training Program. Richmond, Virginia, November 1-6, 1998.

  • Neil F. Johnson. Cryptography and its Applications, Lecture for Dr. Sushil Jajodia's Systems Security Class at George Mason University, 1998.

  • Neil F. Johnson. Steganalysis: The Investigation of Hidden Information, Invited Talk, IEEE Information Technology Conference , Syracuse, New York, USA, September 1-3, 1998.

  • Neil F. Johnson. Introduction to Steganography and Steganalysis, Lecture for Dr. Dorothy Denning's Cryptography Class at George Washington University, 1998.

  • Neil F. Johnson. Intellectual Property and Copyright Protection: The Role of Digital Watermarking, Short Lecture for Dr. Ravi Sandhu's Secure Electronic Commerce Class at George Mason University, April 1998.

  • Neil F. Johnson. Overview of Steganalysis, Short Lecture, 1998.

  • Neil F. Johnson. Overview of Steganography and Steganalysis, Computer Sciences Corporation (CSC) Seminar, January 1998.

  • Neil F. Johnson. Electronic Mail Security, Lecture, November 1997.

  • Neil F. Johnson. Overview of Steganography, Short Lecture, 1997.



Send comments to nfj(at)jjtc(dot)com.
Copyright, ©1995-2012, Neil F. Johnson. All Rights Reserved.

In Association with Amazon.com