Skip Navigation
Search CERIAS
Site Navigation
About
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
People
Faculty & Professional Staff
Students
PhD Graduates
Visitors
Staff
CERIAS People Gallery
Awards
Partners
Strategic Partners
Donors
Purdue Campus Partners
Seminars
News
Research
Education
Tools & Resources
Reports & Papers Archive
ReAssure
Training Products
FTP Archive
BSD and Linux OS Mirrors
Cassandra Vulnerability Tracking System
NTP Time Server
Weblogs
Annual Symposium
Home
»
About CERIAS
» Frequently Asked Questions (FAQ)
Prevention, Detection and Response
About CERIAS
Alumni/Other
Assured Identity and Privacy
Blogging
Call For Papers
Category 1
CERIAS Media Citings
Cloud Security
Donors
Education
Education
End System Security
Feature
General
General
Grad Students Seeking Permanent Positions
hardware
Human Centric Security
Infosec Education
Kudos, Opinions and Rants
Network Security
News
News
Partners
Personal
Personal/Home Information Security
Policies & Law
Policy, Law and Management
Prevention, Detection and Response
R&D
Reviews
SCADA
Secure IT Practices
Software
Sponsors
Static Page
Student Employment/Internships
Students Seeking Internships
Undergrad Students Seeking Permanent Positions
Questions:
Precise Calling Context Encoding
Virtual Law Enforcement Machine Network (VLEMN)
Assessing the Relationship between Hacking and Various Personality Traits
Categorization of Various Types of Online Pornography Users & Personality Assessments
Direct Commander
Unusual Sources of Digital Evidence
Purdue Phone Phorensics
Small Scale Digital Device Forensics
Botnet Analysis
Malware Reverse Engineering, Code Analysis, & Development
Malware Identification and Behavior Analysis
Steganography on Criminal Suspect Computers Project
Image Hashing and Comparison Project
Image Forensics
A Welfare Economic Analysis of Data Breach Disclosure Policy in the United States
Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermark
Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity
Purdue University Regional Visualization and Analytics Center (PURVAC)
Compiler-enabled Adaptive Security Monitoring on Networked Embedded Systems
Casual Analysis of Collaborative Attacks and Experiments
Purdue University Regional Visualization and Analytics Center
Printer and Sensor Forensics
C4ISR Testbed Support for Muscatatuck Urban Warfare
Remote Examination and Manipulation of Electric and Electronic Devices Using Inverse Evaluation of S
Purdue Univ. Program for Homeland Security - STEM Career Development
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation
Rural Law Enforcement Technology Center
Research into Abnormal Malicious Remote Control Detection
File Hound: a Law Enforcement Contraband Images Investigative Tool
FREEK: Forensic Rapid Evidence Extraction and Analysis Kit
The Use of HDTV for In Vehicle Cameras
Cyber Forensics Investigative Services for State of Indiana Office
Fiscal Year 2005 Competitive Training Grants Program
Cooperative Computer Incident Response (CCIR)
Q:
Precise Calling Context Encoding
A:
Q:
Virtual Law Enforcement Machine Network (VLEMN)
A:
Q:
Assessing the Relationship between Hacking and Various Personality Traits
A:
Q:
Categorization of Various Types of Online Pornography Users & Personality Assessments
A:
Q:
Direct Commander
A:
Q:
Unusual Sources of Digital Evidence
A:
Q:
Purdue Phone Phorensics
A:
Q:
Small Scale Digital Device Forensics
A:
Q:
Botnet Analysis
A:
Q:
Malware Reverse Engineering, Code Analysis, & Development
A:
Q:
Malware Identification and Behavior Analysis
A:
Q:
Steganography on Criminal Suspect Computers Project
A:
Q:
Image Hashing and Comparison Project
A:
Q:
Image Forensics
A:
Q:
A Welfare Economic Analysis of Data Breach Disclosure Policy in the United States
A:
Q:
Invisible Watermarking Based on Creation and Robust Insertion-Extraction of Image Adaptive Watermark
A:
Q:
Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity
A:
Q:
Purdue University Regional Visualization and Analytics Center (PURVAC)
A:
Q:
Compiler-enabled Adaptive Security Monitoring on Networked Embedded Systems
A:
Q:
Casual Analysis of Collaborative Attacks and Experiments
A:
Q:
Purdue University Regional Visualization and Analytics Center
A:
Q:
Printer and Sensor Forensics
A:
Q:
C4ISR Testbed Support for Muscatatuck Urban Warfare
A:
Q:
Remote Examination and Manipulation of Electric and Electronic Devices Using Inverse Evaluation of S
A:
Q:
Purdue Univ. Program for Homeland Security - STEM Career Development
A:
Q:
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation
A:
Q:
Rural Law Enforcement Technology Center
A:
Q:
Research into Abnormal Malicious Remote Control Detection
A:
Q:
File Hound: a Law Enforcement Contraband Images Investigative Tool
A:
Q:
FREEK: Forensic Rapid Evidence Extraction and Analysis Kit
A:
Q:
The Use of HDTV for In Vehicle Cameras
A:
Q:
Cyber Forensics Investigative Services for State of Indiana Office
A:
Q:
Fiscal Year 2005 Competitive Training Grants Program
A:
Q:
Cooperative Computer Incident Response (CCIR)
A:
Current News
FBI Hopes Hard Drive Will Shine Light on Conn. Shooter’s Motive
Two CERIAS Faculty Named as ACM Distinguished Members
More News »
CERIAS Weblogs
On Student Projects, Phoenix, and Improving Your IT Operations
Login with Facebook, Google and LinkedIn
More Posts »
Upcoming Events
2013-02-06 Chris Gates, Purdue University
2013-02-13 Security Seminar
Events