CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 176 to 200 of 699
01/23/2013

Differentially Private Publishing of Geospatial Data

Differentially Private Publishing of Geospatial Data


Wahbeh Qardaji - Purdue University
(168.8MB): Video Icon MP4 Video   Watch on Youtube
01/09/2013

Open



12/05/2012

You are Anonymous!!! Then you must be Lucky

You are Anonymous!!! Then you must be Lucky


Bilal Shebaro - Purdue University
(220.7MB): Video Icon MP4 Video   Watch on Youtube
11/28/2012

A New Class of Buffer Overflow Attacks

A New Class of Buffer Overflow Attacks


Ashish Kundu - IBM
(316.8MB): Video Icon MP4 Video   Watch on Youtube
11/07/2012

Publishing Microdata with a Robust Privacy Guarantee

Publishing Microdata with a Robust Privacy Guarantee


Jianneng Cao - Purdue University
(444.5MB): Video Icon MP4 Video   Watch on Youtube
10/31/2012

Risk perception of information security risks online

Risk perception of information security risks online


Vaibhav Garg - Indiana University
(446.6MB): Video Icon MP4 Video   Watch on Youtube
10/24/2012

Detecting Maliciousness Using Periodic Mobile Forensics

Detecting Maliciousness Using Periodic Mobile Forensics


Mark Guido - MITRE
(446.1MB): Video Icon MP4 Video   Watch on Youtube
10/17/2012

The Boeing Company

The Boeing Company


Edmund Jones - Boeing
(443.0MB): Video Icon MP4 Video   Watch on Youtube
10/10/2012

Understanding Spam Economics

Understanding Spam Economics


Chris Kanich - University of Illinois at Chicago
(445.1MB): Video Icon MP4 Video   Watch on Youtube
10/03/2012

 Defending Users Against Smartphone Apps: Techniques and Future Directions

Defending Users Against Smartphone Apps: Techniques and Future Directions


William Enck - North Carolina State University
(448.0MB): Video Icon MP4 Video   Watch on Youtube
09/12/2012

Trends in cyber security consulting

Trends in cyber security consulting


Sharon Chand & Chad Whitman - Deloitte & Touche
(442.5MB): Video Icon MP4 Video   Watch on Youtube
09/05/2012

The Inertia of Productivity

The Inertia of Productivity


Ed Lopez - Fortinet
(447.4MB): Video Icon MP4 Video   Watch on Youtube
08/29/2012

Challenges for R&D in the Security Field

Challenges for R&D in the Security Field


Lewis Shepherd - Microsoft
(445.2MB): Video Icon MP4 Video   Watch on Youtube
08/22/2012

The New Frontier, Welcome the Cloud Brokers

The New Frontier, Welcome the Cloud Brokers


Scott Andersen - Lockheed Martin
(443.9MB): Video Icon MP4 Video   Watch on Youtube
04/25/2012

A Practical Beginners' Guide to Differential Privacy

A Practical Beginners' Guide to Differential Privacy


Christine Task - Purdue University
(530.0MB): Video Icon MP4 Video  
04/11/2012

: K-Anonymity in Social Networks: A Clustering Approach

: K-Anonymity in Social Networks: A Clustering Approach


Traian Truta - Northern Kentucky University
(538.5MB): Video Icon MP4 Video   Watch on Youtube
04/04/2012

J.R. Rao, IBM Research


J.R. Rao - IBM
03/28/2012

Privacy preserving attribute based group key management

Privacy preserving attribute based group key management


Nabeel Mohamed - PhD Candidate, Purdue University
(536.8MB): Video Icon MP4 Video   Watch on Youtube
03/21/2012

Adding a Software Assurance Dimension to Supply Chain Practices

Adding a Software Assurance Dimension to Supply Chain Practices


Randall Brooks - Raytheon
(535.2MB): Video Icon MP4 Video   Watch on Youtube
03/07/2012

Privacy-Preserving Assessment of Location Data Trustworthiness

Privacy-Preserving Assessment of Location Data Trustworthiness


Chenyun Dai - Purdue University
(535.8MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.