CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 276 to 300 of 686
03/25/2009

Rick Clark, Ontario Systems

Rick Clark, Ontario Systems



(582.4MB): Video Icon MP4 Video   Watch on Youtube
03/11/2009

Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments


Arjan Durresi - Indiana University Purdue University at Indianapolis
(635.0MB): Video Icon MP4 Video   Watch on Youtube
03/04/2009

The Best Defense is Information

The Best Defense is Information


Jeremy Rasmussen - Sypris Electronics
(559.2MB): Video Icon MP4 Video   Watch on Youtube
02/25/2009

Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search


Mummoorthy Murugesan - Purdue University
(248.5MB): Video Icon MP4 Video   Watch on Youtube
02/11/2009

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory


Mehmet Sahinoglu - Auburn University at Montgomery, AL
(873.3MB): Video Icon MP4 Video   Watch on Youtube
02/04/2009

The dark side of software engineering and how to defend against it

The dark side of software engineering and how to defend against it


Cassio Goldschmidt - Symantec
(332.0MB): Video Icon MP4 Video   Watch on Youtube
01/28/2009

An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention


Ryan Riley - Purdue University
(224.6MB): Video Icon MP4 Video   Watch on Youtube
01/21/2009

A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection


Paul Kidwell - Purdue University
(358.8MB): Video Icon MP4 Video   Watch on Youtube
01/14/2009

Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach


Chris Clifton - Purdue University
(236.2MB): Video Icon MP4 Video   Watch on Youtube
12/03/2008

Automatic Signature Generation for Unknown Vulnerabilities

Automatic Signature Generation for Unknown Vulnerabilities


Weidong Cui - Microsoft
(564.8MB): Video Icon MP4 Video   Watch on Youtube
11/19/2008

The Role Graph Model and its Extensions

The Role Graph Model and its Extensions


Sylvia Osborn - University of Western Ontario
(577.3MB): Video Icon MP4 Video   Watch on Youtube
11/12/2008

John Oritz, SRA International

John Oritz, SRA International


John Oritz - SRA International
(687.6MB): Video Icon MP4 Video   Watch on Youtube
10/29/2008

Trends in Identity Management

Trends in Identity Management


Kenji Takahashi - ITT Information Sharing Platform Laboratories
(612.4MB): Video Icon MP4 Video   Watch on Youtube
10/22/2008

Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL


Federica Paci - Purdue University
(362.7MB): Video Icon MP4 Video   Watch on Youtube
10/08/2008

Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems


Yuecel Karabulut - SAP Research
(600.7MB): Video Icon MP4 Video   Watch on Youtube
10/01/2008

Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance


Dave Keppler - MITRE
(437.5MB): Video Icon MP4 Video   Watch on Youtube
09/24/2008

Responding to Anomalous Database Requests

Responding to Anomalous Database Requests


Ashish Kamra - Purdue University
(393.1MB): Video Icon MP4 Video   Watch on Youtube
09/10/2008

Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack


Dennis Moreau - Configuresoft
(554.3MB): Video Icon MP4 Video   Watch on Youtube
09/03/2008

Private Queries in Location Based Services:  Anonymizers are not Necessary

Private Queries in Location Based Services: Anonymizers are not Necessary


Gabriel Ghinita - Purdue University
(531.7MB): Video Icon MP4 Video   Watch on Youtube
08/27/2008

Exploitable Redirects on the Web: Identification, Prevalence, and Defense

Exploitable Redirects on the Web: Identification, Prevalence, and Defense


Minaxi Gupta - Indiana University
(653.2MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.