Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1969 |

Results

Showing: 26 to 50 of 810
03/31/2021
Cybercrime: A Proposed Solution

Cybercrime: A Proposed Solution

Frederick Scholl - Quinnipiac University

03/24/2021
The Shoulders of InfoSec

The Shoulders of InfoSec

Jack Daniel - Tenable

03/17/2021
Practical software Supply Chain Security and Transparency

Practical software Supply Chain Security and Transparency

Santiago Torres-Arias - Purdue University

03/10/2021
SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool

SDN/NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool

Greg Akers - Executive Technology Consultant

02/24/2021
Security Industry Context

Security Industry Context

Caroline Wong - Cobalt

02/17/2021
Technology, Self-Determination, and the Future of the Future

Technology, Self-Determination, and the Future of the Future

Cory Doctorow - Electronic Frontier Foundation

02/10/2021
Securing the Software Supply Chain

Securing the Software Supply Chain

Levi Lloyd - Lawrence Livermore National Laboratory

01/27/2021
The Internet of Things: What Everyone Needs to Know

The Internet of Things: What Everyone Needs to Know

Scott Shackelford - Indiana University

01/20/2021
​Building Practical Security Systems for the ​Post-App​ Smart Home

​Building Practical Security Systems for the ​Post-App​ Smart Home

Adwait Nadkarni - College of William and Mary

12/09/2020
Security and Privacy for Humans

Security and Privacy for Humans

Lorrie Cranor - Carnegie Mellon University, CyLab

12/02/2020
Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research

11/18/2020
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Sivaram Ramanathan - University of Southern California

11/11/2020
Fearless Computing

Fearless Computing

Abhilasha Bhargav-Spantzel - Intel Corporation

11/04/2020
Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Kelley Misata - Sightline Security

10/21/2020
Why Attack When You Can Defend

Why Attack When You Can Defend

Jeff Man - Online Business Systems

09/23/2020
TCB: From Assumption to Assurance

TCB: From Assumption to Assurance

Osman Ismael - BedRock Systems

09/16/2020
Authentication: Behind The Scenes When You Click “Check Out”

Authentication: Behind The Scenes When You Click “Check Out”

Warda Zahid Khan - Mastercard

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!