CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 176 to 200 of 669
01/25/2012

A Flexible System for Access Control

A Flexible System for Access Control


Frank Tompa - University of Waterloo
(543.0MB): Video Icon MP4 Video   Watch on Youtube
01/18/2012

 Secure Provenance Transmission for Data Streams

Secure Provenance Transmission for Data Streams


Salmin Sultana - Purdue University
(517.4MB): Video Icon MP4 Video   Watch on Youtube
01/11/2012


"Introduction to Biometrics"


Stephen Elliott - Purdue University
(442.4MB): Video Icon MP4 Video   Watch on Youtube
12/07/2011

No Seminar



11/30/2011

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones


Apu Kapadia - Indiana University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
11/16/2011

Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers


Loukas Lazos - University of Arizona
(443.7MB): Video Icon MP4 Video   Watch on Youtube
11/09/2011

Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization


Zhongshu Gu - Purdue University
(445.3MB): Video Icon MP4 Video   Watch on Youtube
10/26/2011

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack


Sheila Becker - University of Luxembourgh
(446.8MB): Video Icon MP4 Video   Watch on Youtube
10/19/2011

Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing


Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University
(446.3MB): Video Icon MP4 Video   Watch on Youtube
10/12/2011

Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats


Dan McWhorter and Steve Surdu - Mandiant Corporation
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/05/2011

Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems


Hal Aldridge - Sypris Electronics
(445.0MB): Video Icon MP4 Video   Watch on Youtube
09/28/2011

Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing


Xukai Zou - Indiana University-Purdue University Indianapolis
(449.7MB): Video Icon MP4 Video   Watch on Youtube
09/21/2011

 Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire


Joe Leonard - Global Velocity
(444.0MB): Video Icon MP4 Video   Watch on Youtube
09/07/2011

Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs


Steven Gianvecchio - MITRE
(445.0MB): Video Icon MP4 Video   Watch on Youtube
08/31/2011

Non-homogeneous anonymizations

Non-homogeneous anonymizations


Tamir Tassa - The Open University, Israel
(447.7MB): Video Icon MP4 Video   Watch on Youtube
08/24/2011

Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion


Scott Hollenbeck - Verisign
(443.6MB): Video Icon MP4 Video   Watch on Youtube
04/27/2011

Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation


Eric Katz - Purdue University
(447.7MB): Video Icon MP4 Video   Watch on Youtube
04/20/2011


"Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet"


Jose Fernandez - Montreal Polytechnic
(445.8MB): Video Icon MP4 Video   Watch on Youtube
04/13/2011

FuzzyFusion™, an application architecture for multisource information fusion

FuzzyFusion™, an application architecture for multisource information fusion


Ronda R. Henning - Harris Corporation
(446.7MB): Video Icon MP4 Video   Watch on Youtube
04/06/2011

Society, Law Enforcement and the Internet:  Models for Give and Take

Society, Law Enforcement and the Internet: Models for Give and Take


Carter Bullard - QoSient, LLC
(451.8MB): Video Icon MP4 Video   Watch on Youtube
03/23/2011

Wireless Technologies and how it relates to cyber security research

Wireless Technologies and how it relates to cyber security research


Kim Trieu - Lockheed Martin
(442.4MB): Video Icon MP4 Video   Watch on Youtube
03/09/2011

Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits


Michael Schearer - Booz Allen Hamilton
(446.7MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.