The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 301 to 325 of 894

Affiliation shown is the affiliation at the time the talk was given.

04/22/2015
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University

04/15/2015
Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently

Yan Huang - Indiana University

04/08/2015
Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up

Rebecca Herold - Rebecca Herold & Associates, LLC

03/25/2015
Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy - Intel

03/04/2015
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Xinming Ou - Kansas State University

02/25/2015
Software updates: decisions and security implications

Software updates: decisions and security implications

Kami Vaniea - Indiana University

02/18/2015
Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis

Ninghui Li - Purdue University

02/11/2015
Code-Pointer Integrity

Code-Pointer Integrity

Mathias Payer - Purdue University

02/04/2015
Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs

Omar Chowdhury - Purdue University

01/21/2015
Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda

Bharath Samanthula - Purdue University

01/14/2015
Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis

Jackie Rees Ulmer - Purdue University

12/10/2014
How Program Analysis can be Used in Security Applications

How Program Analysis can be Used in Security Applications

Xiangyu Zhang - Purdue University

12/03/2014

Cancelled

11/19/2014
Privacy in the Age of the Police State

Privacy in the Age of the Police State

Marcus Ranum - Tenable Network Security

11/05/2014
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Barrett Caldwell and Omar Eldardiry - Purdue University

10/29/2014
Healthcare Security and Privacy: Not There Yet

Healthcare Security and Privacy: Not There Yet

Robert Zimmerman - Inforistec

10/22/2014
"Memory Analysis, Meet GPU Malware"

"Memory Analysis, Meet GPU Malware"

Golden G. Richard III - University of New Orleans

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!