CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 201 to 225 of 669
03/02/2011


"Modeling DNS Security: Misconfiguration, Availability, and Visualization"


Casey Deccio - Sandia National Labs
(443.7MB): Video Icon MP4 Video   Watch on Youtube
02/23/2011

A couple of results about JavaScript

A couple of results about JavaScript


Jan Vitek - Purdue University
(443.1MB): Video Icon MP4 Video   Watch on Youtube
02/16/2011

Malware Trends and Techniques


Tom Ervin - MITRE
02/09/2011

Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *


Fariborz Farahmand - Purdue University
(442.2MB): Video Icon MP4 Video   Watch on Youtube
02/02/2011

Campus closed/snow



01/19/2011

Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security


Somesh Jha - University of Wisconsin
(446.4MB): Video Icon MP4 Video   Watch on Youtube
01/12/2011

Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud


Fariborz Farahmand - Purdue University
(444.7MB): Video Icon MP4 Video   Watch on Youtube
12/01/2010

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context


Matthew Hashim - Purdue University
(443.7MB): Video Icon MP4 Video   Watch on Youtube
11/17/2010

Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions


Michael Kirkpatrick - Purdue University
(447.9MB): Video Icon MP4 Video   Watch on Youtube
11/10/2010

Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis


Nikita Borisov - University of Illinois at Urbana-Champaign
(439.5MB): Video Icon MP4 Video   Watch on Youtube
11/03/2010

Tackling System-Wide Integrity

Tackling System-Wide Integrity


Trent Jaeger - Pennsylvania State
(444.9MB): Video Icon MP4 Video   Watch on Youtube
10/27/2010

The role of automata theory in software verification

The role of automata theory in software verification


P. Madhusudan - University of Illinois at Urbana-Champaign
(451.1MB): Video Icon MP4 Video   Watch on Youtube
10/20/2010

Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System


Sam King - University of Illinois
(451.0MB): Video Icon MP4 Video   Watch on Youtube
10/06/2010

Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations


Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University
(444.4MB): Video Icon MP4 Video   Watch on Youtube
09/29/2010

Assured Processing through Obfuscation

Assured Processing through Obfuscation


Sergey Panasyuk - Air Force Research Laboratory
(445.8MB): Video Icon MP4 Video   Watch on Youtube
09/22/2010

Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)


Petros Mouchtaris - Telcordia
(448.2MB): Video Icon MP4 Video   Watch on Youtube
09/15/2010

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses


Xiaofeng Wang - Indiana University
(445.1MB): Video Icon MP4 Video   Watch on Youtube
09/08/2010

Rootkits

Rootkits


Xeno Kovah - MITRE
(445.4MB): Video Icon MP4 Video   Watch on Youtube
09/01/2010

Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking


Ashish Kundu - Purdue University
(441.4MB): Video Icon MP4 Video   Watch on Youtube
08/25/2010

Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks


Cristina Nita-Rotaru - Purdue University
(443.7MB): Video Icon MP4 Video   Watch on Youtube
04/28/2010


"Ontological Semantic Technology for Detecting Insider Threat and Social Engineering"


Victor Raskin & Julia Taylor - Purdue University
(451.7MB): Video Icon MP4 Video   Watch on Youtube
04/21/2010

The role of System Security Engineering in the engineering lifecycle

The role of System Security Engineering in the engineering lifecycle


Stephen Dill - Lockheed Martin
(446.1MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.