CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 1 to 25 of 651
03/22/2017

CIO Risk Appetite and Information Security Management


Tawei (David) Wang - DePaul University
03/08/2017

The Rise of Cyber-Crime: A Legal Perspective

The Rise of Cyber-Crime: A Legal Perspective


Stephen Reynolds - Ice Miller
(140.0MB): Video Icon MP4 Video   Watch on Youtube
03/01/2017

Cancelled



02/22/2017

A2C: Self Destructing Exploit Executions via Input Perturbation

A2C: Self Destructing Exploit Executions via Input Perturbation


Yonghwi Kwon - Purdue University
(121.4MB): Video Icon MP4 Video   Watch on Youtube
02/15/2017

Behavioral and Computational Aspects of Network Security Games

Behavioral and Computational Aspects of Network Security Games


Ashish Hota - Purdue University
(81.3MB): Video Icon MP4 Video   Watch on Youtube
02/08/2017

Cyber Security in Large Complex Corporations

Cyber Security in Large Complex Corporations


Neil Cassidy
(289.9MB): Video Icon MP4 Video   Watch on Youtube
02/01/2017

Network Deception as a Threat Intelligence Platform

Network Deception as a Threat Intelligence Platform


Vincent Urias - Sandia
(242.1MB): Video Icon MP4 Video   Watch on Youtube
01/25/2017

Changing the Economics of the Network

Changing the Economics of the Network


Jean Camp - Indiana University
(171.4MB): Video Icon MP4 Video   Watch on Youtube
01/18/2017

Emerging Cyber Threats

Emerging Cyber Threats


Nick Sturgeon - IN-ISAC
(347.8MB): Video Icon MP4 Video   Watch on Youtube
12/07/2016

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices

When Side Channel Meets Row Hammer: Cache-Memory Attacks in Clouds and Mobile Devices


Yinqian Zhang - The Ohio State University
(168.8MB): Video Icon MP4 Video   Watch on Youtube
11/30/2016

Digital Identity Protection

Digital Identity Protection


Abhilasha Bhargav-Spantzel - Intel
(157.6MB): Video Icon MP4 Video   Watch on Youtube
11/09/2016

A Science of Cyber Infrastructure Configuration

A Science of Cyber Infrastructure Configuration


Sanjai Narain - Vencore Labs
(256.9MB): Video Icon MP4 Video   Watch on Youtube
11/02/2016

Protecting Computer Systems by Eliminating Vulnerabilities


Byoungyoung Lee - Purdue University
10/26/2016

New Research and Resources in NL IAS at Purdue

New Research and Resources in NL IAS at Purdue


Victor Raskin - Purdue University
(315.9MB): Video Icon MP4 Video   Watch on Youtube
10/19/2016

Usable and Secure Human Authentication

Usable and Secure Human Authentication


Jeremiah Blocki - Purdue University
(246.9MB): Video Icon MP4 Video   Watch on Youtube
10/12/2016

Enforcing Least Privilege Memory Views for Multithreaded Applications

Enforcing Least Privilege Memory Views for Multithreaded Applications


Terry Ching-Hsiang Hsu - Purdue University
(39.0MB): Video Icon MP4 Video   Watch on Youtube
10/05/2016

Growing Up In Cyber, But Is Cyber Growing Up?

Growing Up In Cyber, But Is Cyber Growing Up?


Tony Sager - Center for Internet Security
(367.2MB): Video Icon MP4 Video   Watch on Youtube
09/28/2016

The role of cyber insurance in security and risk management

The role of cyber insurance in security and risk management


Nicholas Reuhs - Ice Miller LLP
(440.9MB): Video Icon MP4 Video   Watch on Youtube
09/21/2016

The Internet of Value: Privacy and Applications

The Internet of Value: Privacy and Applications


Aniket Kate - Purdue University
(221.9MB): Video Icon MP4 Video   Watch on Youtube
09/14/2016

General Motors Product Cybersecurity Overview

General Motors Product Cybersecurity Overview


Di Jin - General Motors
(402.8MB): Video Icon MP4 Video   Watch on Youtube
09/07/2016

Improving Outcomes with Services

Improving Outcomes with Services


Maria Andrews - Cisco
(274.5MB): Video Icon MP4 Video   Watch on Youtube
08/31/2016

Towards Safe In-memory Transactions

Towards Safe In-memory Transactions


Srivatsan Ravi - Purdue University
(198.4MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.