The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 176 to 200 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #747
01/20/2021
​Building Practical Security Systems for the ​Post-App​ Smart Home

​Building Practical Security Systems for the ​Post-App​ Smart Home

Adwait Nadkarni - College of William and Mary

Episode #746
12/09/2020
Security and Privacy for Humans

Security and Privacy for Humans

Lorrie Cranor - Carnegie Mellon University, CyLab

Episode #745
12/02/2020
Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research

Episode #744
11/18/2020
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Sivaram Ramanathan - University of Southern California

Episode #743
11/11/2020
Fearless Computing

Fearless Computing

Abhilasha Bhargav-Spantzel - Intel Corporation

Episode #742
11/04/2020
Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Kelley Misata - Sightline Security

Episode #740
10/21/2020
Why Attack When You Can Defend

Why Attack When You Can Defend

Jeff Man - Online Business Systems

Episode #739
10/14/2020
The Pod People Campaign: Driving User Traffic via Social Networks

The Pod People Campaign: Driving User Traffic via Social Networks

Courtney Falk - GoDaddy

Episode #738
10/07/2020
From Machine Learning Threats to Machine Learning Protection Requirements

From Machine Learning Threats to Machine Learning Protection Requirements

Michael Clark - Riverside Research

Episode #736
09/23/2020
TCB: From Assumption to Assurance

TCB: From Assumption to Assurance

Osman Ismael - BedRock Systems

Episode #735
09/16/2020
Authentication: Behind The Scenes When You Click "Check Out"

Authentication: Behind The Scenes When You Click "Check Out"

Warda Zahid Khan - Mastercard

Episode #734
09/09/2020
EMP Threat & Protection

EMP Threat & Protection

Rich Banta - Lifeline Data Centers

Episode #733
09/02/2020
Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel

Dramatically Reducing Attack Surface Using Integrity MAC Security Kernel

Roger Schell - AESec Corporation

Episode #731
08/19/2020
Flexible and Adaptive Malware Identification Using Techniques from Biology

Flexible and Adaptive Malware Identification Using Techniques from Biology

Elena Peterson - Pacific Northwest National Laboratory

Episode #730
08/12/2020
Value of Cyber Threat Intelligence in Modern Security Operations

Value of Cyber Threat Intelligence in Modern Security Operations

Shimon Modi - Elastic

Episode #729
07/29/2020
Network Awareness and Predictive Cyber Analytics

Network Awareness and Predictive Cyber Analytics

Carter Bullard - QoSient

Episode #728
07/22/2020
The Ghost in the Machine: Reconciling AI and Trust in the Connected World

The Ghost in the Machine: Reconciling AI and Trust in the Connected World

Sam Curry and Alon Kaufman - Cybereason  / Duality Technologies

Episode #727
07/15/2020
Cyber Security of Control Systems: The Second Coming of the Maginot Line

Cyber Security of Control Systems: The Second Coming of the Maginot Line

Joe Weiss - Applied Control Systems, LLC

Episode #726
07/08/2020

Trusting Autonomous Cars

Ashish Kundu - Ciphense

Episode #724
06/24/2020
Using Machine Learning for Network Intrusion Detection

Using Machine Learning for Network Intrusion Detection

Nandi Leslie - Raytheon

Episode #723
06/17/2020
A Principled Approach to Cybersecurity Engineering

A Principled Approach to Cybersecurity Engineering

Sami Saydjari - Cyber Defense Agency, Inc.

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!