CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 151 to 175 of 660
09/12/2012

Trends in cyber security consulting

Trends in cyber security consulting


Sharon Chand & Chad Whitman - Deloitte & Touche
(442.5MB): Video Icon MP4 Video   Watch on Youtube
09/05/2012

The Inertia of Productivity

The Inertia of Productivity


Ed Lopez - Fortinet
(447.4MB): Video Icon MP4 Video   Watch on Youtube
08/29/2012

Challenges for R&D in the Security Field

Challenges for R&D in the Security Field


Lewis Shepherd - Microsoft
(445.2MB): Video Icon MP4 Video   Watch on Youtube
08/22/2012

The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers


Scott Andersen - Lockheed Martin
(443.9MB): Video Icon MP4 Video   Watch on Youtube
04/25/2012

A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy


Christine Task - Purdue University
(530.0MB): Video Icon MP4 Video  
04/11/2012

: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach


Traian Truta - Northern Kentucky University
(538.5MB): Video Icon MP4 Video   Watch on Youtube
04/04/2012

J.R. Rao, IBM Research


J.R. Rao - IBM
03/28/2012

Privacy preserving attribute based group key management

Privacy preserving attribute based group key management


Nabeel Mohamed - PhD Candidate, Purdue University
(536.8MB): Video Icon MP4 Video   Watch on Youtube
03/21/2012

Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices


Randall Brooks - Raytheon
(535.2MB): Video Icon MP4 Video   Watch on Youtube
03/07/2012

Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness


Chenyun Dai - Purdue University
(535.8MB): Video Icon MP4 Video   Watch on Youtube
02/29/2012

Cryptographic protocols in the era of cloud computing

Cryptographic protocols in the era of cloud computing


Nishanth Chandran - Microsoft Research
(552.9MB): Video Icon MP4 Video   Watch on Youtube
02/22/2012

Vulnerability Path and Assessment

Vulnerability Path and Assessment


Ben Calloni - Lockheed Martin
(537.9MB): Video Icon MP4 Video   Watch on Youtube
02/15/2012

Forensic Carving of Network Packets with bulk_extractor and tcpflow

Forensic Carving of Network Packets with bulk_extractor and tcpflow


Simson Garfinkel - Naval Postgraduate School
(532.8MB): Video Icon MP4 Video   Watch on Youtube
02/08/2012

Digital Citizenship:  A Target's View of Security and Life Online

Digital Citizenship: A Target's View of Security and Life Online


Kelley Misata - PhD Candidate, Purdue University
(544.4MB): Video Icon MP4 Video   Watch on Youtube
02/01/2012

Is it time to add Trust to the Future Internet/Web?

Is it time to add Trust to the Future Internet/Web?


George Vanecek - Futurewei Technologies
(547.3MB): Video Icon MP4 Video   Watch on Youtube
01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control


Frank Tompa - University of Waterloo
(543.0MB): Video Icon MP4 Video   Watch on Youtube
01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams


Salmin Sultana - Purdue University
(517.4MB): Video Icon MP4 Video   Watch on Youtube
01/11/2012


"Introduction to Biometrics"


Stephen Elliott - Purdue University
(442.4MB): Video Icon MP4 Video   Watch on Youtube
12/07/2011

No Seminar



11/30/2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones


Apu Kapadia - Indiana University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
11/16/2011

Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers


Loukas Lazos - University of Arizona
(443.7MB): Video Icon MP4 Video   Watch on Youtube
11/09/2011

Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization


Zhongshu Gu - Purdue University
(445.3MB): Video Icon MP4 Video   Watch on Youtube
10/26/2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack


Sheila Becker - University of Luxembourgh
(446.8MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.