The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 126 to 150 of 891

Affiliation shown is the affiliation at the time the talk was given.

01/27/2021
The Internet of Things: What Everyone Needs to Know

The Internet of Things: What Everyone Needs to Know

Scott Shackelford - Indiana University

01/20/2021
​Building Practical Security Systems for the ​Post-App​ Smart Home

​Building Practical Security Systems for the ​Post-App​ Smart Home

Adwait Nadkarni - College of William and Mary

12/09/2020
Security and Privacy for Humans

Security and Privacy for Humans

Lorrie Cranor - Carnegie Mellon University, CyLab

12/02/2020
Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research

11/18/2020
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Sivaram Ramanathan - University of Southern California

11/11/2020
Fearless Computing

Fearless Computing

Abhilasha Bhargav-Spantzel - Intel Corporation

11/04/2020
Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Kelley Misata - Sightline Security

10/21/2020
Why Attack When You Can Defend

Why Attack When You Can Defend

Jeff Man - Online Business Systems

09/23/2020
TCB: From Assumption to Assurance

TCB: From Assumption to Assurance

Osman Ismael - BedRock Systems

09/16/2020
Authentication: Behind The Scenes When You Click "Check Out"

Authentication: Behind The Scenes When You Click "Check Out"

Warda Zahid Khan - Mastercard

09/09/2020
EMP Threat & Protection

EMP Threat & Protection

Rich Banta - Lifeline Data Centers

08/19/2020
Flexible and Adaptive Malware Identification Using Techniques from Biology

Flexible and Adaptive Malware Identification Using Techniques from Biology

Elena Peterson - Pacific Northwest National Laboratory

07/29/2020
Network Awareness and Predictive Cyber Analytics

Network Awareness and Predictive Cyber Analytics

Carter Bullard - QoSient

07/22/2020
The Ghost in the Machine: Reconciling AI and Trust in the Connected World

The Ghost in the Machine: Reconciling AI and Trust in the Connected World

Sam Curry and Alon Kaufman - Cybereason  / Duality Technologies

07/15/2020
Cyber Security of Control Systems: The Second Coming of the Maginot Line

Cyber Security of Control Systems: The Second Coming of the Maginot Line

Joe Weiss - Applied Control Systems, LLC

07/08/2020

Trusting Autonomous Cars

Ashish Kundu - Ciphense

06/24/2020
Using Machine Learning for Network Intrusion Detection

Using Machine Learning for Network Intrusion Detection

Nandi Leslie - Raytheon

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!