Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1969 |

Results

Showing: 351 to 375 of 814
01/19/2011
Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha - University of Wisconsin

01/12/2011
Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand - Purdue University

12/01/2010
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim - Purdue University

11/17/2010
Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick - Purdue University

11/10/2010
Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov - University of Illinois at Urbana-Champaign

11/03/2010
Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger - Pennsylvania State

10/27/2010
The role of automata theory in software verification

The role of automata theory in software verification

P. Madhusudan - University of Illinois at Urbana-Champaign

10/20/2010
Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King - University of Illinois

10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

08/25/2010
Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru - Purdue University

04/28/2010
"Ontological Semantic Technology for Detecting  Insider Threat and Social Engineering"

"Ontological Semantic Technology for Detecting Insider Threat and Social Engineering"

Victor Raskin & Julia Taylor - Purdue University

04/14/2010
Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment

Christian Hammer - Purdue University

04/07/2010
60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection

Yvo Desmedt - University College London, UK

03/10/2010
Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition

Pascal Meunier - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!