Skip Navigation
Search CERIAS
Site Navigation
About
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
People
Faculty & Professional Staff
Students
PhD Graduates
Visitors
Staff
CERIAS People Gallery
Awards
Partners
Strategic Partners
Donors
Purdue Campus Partners
Seminars
News
Research
Education
Tools & Resources
Reports & Papers Archive
ReAssure
Training Products
FTP Archive
BSD and Linux OS Mirrors
Cassandra Vulnerability Tracking System
NTP Time Server
Weblogs
Annual Symposium
Home
»
About CERIAS
» Frequently Asked Questions (FAQ)
Network Security
About CERIAS
Alumni/Other
Assured Identity and Privacy
Blogging
Call For Papers
Category 1
CERIAS Media Citings
Cloud Security
Donors
Education
Education
End System Security
Feature
General
General
Grad Students Seeking Permanent Positions
hardware
Human Centric Security
Infosec Education
Kudos, Opinions and Rants
Network Security
News
News
Partners
Personal
Personal/Home Information Security
Policies & Law
Policy, Law and Management
Prevention, Detection and Response
R&D
Reviews
SCADA
Secure IT Practices
Software
Sponsors
Static Page
Student Employment/Internships
Students Seeking Internships
Undergrad Students Seeking Permanent Positions
Questions:
Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoreti
Matching and Fairness in Threat-based Mobile Sensor Coverage
Performance Analysis of Stochastic Network Coverage with Limited Mobility
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
Secure Group Communication Over wired/wireless networks
Virtualization-Enabled Malware Research
The Poly^2 Project
Assurable Configuration of Security Policies in Enterprise Networks
Identifying Undesirable Behavior in P2P Systems
Secure Collaborative Services for Wireless Mesh Networks
Secure Networking Using Network Coding
Leveraging Social Trust in Building Secure Email Networks
Predictive Blacklisting for Detecting Phishing Attacks
Botnet Analysis
Detection and Filtering Spam over Internet Telephony: A User-behavior-aware Intermediate-network-bas
Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach
Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
Developing Attack Defense Ideas for Ad Hoc Wireless Networks
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
Automated Intrusion Response for Distributed Applications
Undetectable Covert Communication
VACCINE:Visual Analytics for Command, Control, Interoperability, National Security and Emergencies
A Systematic Defensive Framework for Combating Botnets
Customized Network Security Protocols
Machine Learning Techniques to Model the Impact of Relational Communication on Distributed Team Effe
Provably Assurable Ad Hoc Networks Under Arbitrary Malicious Behaviors
Learning Compositional Simulation Models
Router Models and Downscaling Tools
Purdue University Regional Visualization and Analytics Center (PURVAC)
An Abstraction Driven Approach to Characterizing and Designing Networks with Analyzable Prop
NETS-NOSS: Robust Sensor Network Architeture through Neighborhood Monitoring and Isolation
A High Assurance, High Capacity Platform for Information Operations
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
Accelerator-based High Performance Computing
A Testbed for Compiler-supported Scalable Error Monitoring and Diagnosis for Reliable and Secure Sen
Vulnerability Analysis and Threat Assessment/Avoidance
Development of a Safe, Virtual Imaging Instrument for Logically Destructive Experiments (ReAssure)
A Survivable Information Infrastructure for National Civilian BioDefense
Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks
Testing and Benchmarking Methodologies for Future Networking Security Mechanisms
Protecting TCP Congestion Control: Tools for Design, Analysis, and Emulation
A Testbed for Research and Development of Secure IP Multimedia Communication Services
Self-Managing Distributed Virtual Environments
H-Media - the Holistic-Multistream Environment for Distributed Immersive Applications
Enabling Detection of Elusive Malware by Going Out of the Box with Semantically Reconstructed View
Towards Trustworthy Peer-To-Peer Overlay Networks
Composing Large-Scale Synthetic Environments Through Self-Assembly of Heterogeneous Simulat
Collaborative Attacks In Wireless Networks
CSONET: A Distributed Wireless Networked Control System For Combined Sewer Overflow Abatement
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
Customized Intrusion Detection and Intrusion Prevention for Client-Server and Peer-to-Peer VOIP
Towards Virtual Distributed Environments
Scalable, Reliable Management of Sensor Information
Predictable, Scalable QoS Routing for Ad-Hoc Wireless Networks Based on Heavy-Tailed Statistics
Research into Abnormal Malicious Remote Control Detection
System Support for Detection, Identification, and Tracking Tasks in Sensor-Cyber Networks
Security of Large Scale Systems
Q:
Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoreti
A:
Q:
Matching and Fairness in Threat-based Mobile Sensor Coverage
A:
Q:
Performance Analysis of Stochastic Network Coverage with Limited Mobility
A:
Q:
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:
Q:
Secure Group Communication Over wired/wireless networks
A:
Q:
Virtualization-Enabled Malware Research
A:
Q:
The Poly^2 Project
A:
Q:
Assurable Configuration of Security Policies in Enterprise Networks
A:
Q:
Identifying Undesirable Behavior in P2P Systems
A:
Q:
Secure Collaborative Services for Wireless Mesh Networks
A:
Q:
Secure Networking Using Network Coding
A:
Q:
Leveraging Social Trust in Building Secure Email Networks
A:
Q:
Predictive Blacklisting for Detecting Phishing Attacks
A:
Q:
Botnet Analysis
A:
Q:
Detection and Filtering Spam over Internet Telephony: A User-behavior-aware Intermediate-network-bas
A:
Q:
Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach
A:
Q:
Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
A:
Q:
Developing Attack Defense Ideas for Ad Hoc Wireless Networks
A:
Q:
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
A:
Q:
Automated Intrusion Response for Distributed Applications
A:
Q:
Undetectable Covert Communication
A:
Q:
VACCINE:Visual Analytics for Command, Control, Interoperability, National Security and Emergencies
A:
Q:
A Systematic Defensive Framework for Combating Botnets
A:
Q:
Customized Network Security Protocols
A:
Q:
Machine Learning Techniques to Model the Impact of Relational Communication on Distributed Team Effe
A:
Q:
Provably Assurable Ad Hoc Networks Under Arbitrary Malicious Behaviors
A:
Q:
Learning Compositional Simulation Models
A:
Q:
Router Models and Downscaling Tools
A:
Q:
Purdue University Regional Visualization and Analytics Center (PURVAC)
A:
Q:
An Abstraction Driven Approach to Characterizing and Designing Networks with Analyzable Prop
A:
Q:
NETS-NOSS: Robust Sensor Network Architeture through Neighborhood Monitoring and Isolation
A:
Q:
A High Assurance, High Capacity Platform for Information Operations
A:
Q:
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:
Q:
Accelerator-based High Performance Computing
A:
Q:
A Testbed for Compiler-supported Scalable Error Monitoring and Diagnosis for Reliable and Secure Sen
A:
Q:
Vulnerability Analysis and Threat Assessment/Avoidance
A:
Q:
Development of a Safe, Virtual Imaging Instrument for Logically Destructive Experiments (ReAssure)
A:
Q:
A Survivable Information Infrastructure for National Civilian BioDefense
A:
Q:
Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks
A:
Q:
Testing and Benchmarking Methodologies for Future Networking Security Mechanisms
A:
Q:
Protecting TCP Congestion Control: Tools for Design, Analysis, and Emulation
A:
Q:
A Testbed for Research and Development of Secure IP Multimedia Communication Services
A:
Q:
Self-Managing Distributed Virtual Environments
A:
Q:
H-Media - the Holistic-Multistream Environment for Distributed Immersive Applications
A:
Q:
Enabling Detection of Elusive Malware by Going Out of the Box with Semantically Reconstructed View
A:
Q:
Towards Trustworthy Peer-To-Peer Overlay Networks
A:
Q:
Composing Large-Scale Synthetic Environments Through Self-Assembly of Heterogeneous Simulat
A:
Q:
Collaborative Attacks In Wireless Networks
A:
Q:
CSONET: A Distributed Wireless Networked Control System For Combined Sewer Overflow Abatement
A:
Q:
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:
Q:
Customized Intrusion Detection and Intrusion Prevention for Client-Server and Peer-to-Peer VOIP
A:
Q:
Towards Virtual Distributed Environments
A:
Q:
Scalable, Reliable Management of Sensor Information
A:
Q:
Predictable, Scalable QoS Routing for Ad-Hoc Wireless Networks Based on Heavy-Tailed Statistics
A:
Q:
Research into Abnormal Malicious Remote Control Detection
A:
Q:
System Support for Detection, Identification, and Tracking Tasks in Sensor-Cyber Networks
A:
Q:
Security of Large Scale Systems
A:
Current News
FBI Hopes Hard Drive Will Shine Light on Conn. Shooter’s Motive
Two CERIAS Faculty Named as ACM Distinguished Members
More News »
CERIAS Weblogs
On Student Projects, Phoenix, and Improving Your IT Operations
Login with Facebook, Google and LinkedIn
More Posts »
Upcoming Events
2013-02-06 Chris Gates, Purdue University
2013-02-13 Security Seminar
Events