The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 251 to 275 of 894

Affiliation shown is the affiliation at the time the talk was given.

02/22/2017
A2C: Self Destructing Exploit Executions via Input Perturbation

A2C: Self Destructing Exploit Executions via Input Perturbation

Yonghwi Kwon - Purdue University

02/15/2017
Behavioral and Computational Aspects of Network Security Games

Behavioral and Computational Aspects of Network Security Games

Ashish Hota - Purdue University

02/01/2017
Network Deception as a Threat Intelligence Platform

Network Deception as a Threat Intelligence Platform

Vincent Urias - Sandia

01/25/2017
Changing the Economics of the Network

Changing the Economics of the Network

Jean Camp - Indiana University

01/18/2017
Emerging Cyber Threats

Emerging Cyber Threats

Nick Sturgeon - IN-ISAC

11/30/2016
Digital Identity Protection

Digital Identity Protection

Abhilasha Bhargav-Spantzel - Intel

11/09/2016
A Science of Cyber Infrastructure Configuration

A Science of Cyber Infrastructure Configuration

Sanjai Narain - Vencore Labs

11/02/2016

Protecting Computer Systems by Eliminating Vulnerabilities

Byoungyoung Lee - Purdue University

10/26/2016
New Research and Resources in NL IAS at Purdue

New Research and Resources in NL IAS at Purdue

Victor Raskin - Purdue University

10/19/2016
Usable and Secure Human Authentication

Usable and Secure Human Authentication

Jeremiah Blocki - Purdue University

10/12/2016
Enforcing Least Privilege Memory Views for Multithreaded Applications

Enforcing Least Privilege Memory Views for Multithreaded Applications

Terry Ching-Hsiang Hsu - Purdue University

10/05/2016
Growing Up In Cyber, But Is Cyber Growing Up?

Growing Up In Cyber, But Is Cyber Growing Up?

Tony Sager - Center for Internet Security

09/28/2016
The role of cyber insurance in security and risk management

The role of cyber insurance in security and risk management

Nicholas Reuhs - Ice Miller LLP

09/21/2016
The Internet of Value: Privacy and Applications

The Internet of Value: Privacy and Applications

Aniket Kate - Purdue University

09/14/2016
General Motors Product Cybersecurity Overview

General Motors Product Cybersecurity Overview

Di Jin - General Motors

09/07/2016
Improving Outcomes with Services

Improving Outcomes with Services

Maria Andrews - Cisco

08/31/2016
Towards Safe In-memory Transactions

Towards Safe In-memory Transactions

Srivatsan Ravi - Purdue University

04/27/2016
ErsatzPasswords - Ending Password Cracking

ErsatzPasswords - Ending Password Cracking

Christopher N. Gutierrez - Purdue University

04/20/2016
Information Security: Through the Lens of Crisis Organizations

Information Security: Through the Lens of Crisis Organizations

Kelley Misata - Purdue University

04/20/2016
Life as a Target

Life as a Target

Richard M. (Dickie) George

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!