The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 351 to 375 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #576
04/22/2015
CERIAS Poster Contest Winners

CERIAS Poster Contest Winners

Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University

Episode #575
04/15/2015
Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently

Yan Huang - Indiana University

Episode #574
04/08/2015
Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up

Rebecca Herold - Rebecca Herold & Associates, LLC

Episode #573
04/01/2015
Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking

Kui Ren - University at Buffalo

Episode #572
03/25/2015
Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel

Michelle Dennedy - Intel

Episode #571
03/11/2015
Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)

Andrew Pyles - MITRE

Episode #570
03/04/2015
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Xinming Ou - Kansas State University

Episode #569
02/25/2015
Software updates: decisions and security implications

Software updates: decisions and security implications

Kami Vaniea - Indiana University

Episode #568
02/18/2015
Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis

Ninghui Li - Purdue University

Episode #567
02/11/2015
Code-Pointer Integrity

Code-Pointer Integrity

Mathias Payer - Purdue University

Episode #566
02/04/2015
Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs

Omar Chowdhury - Purdue University

Episode #565
01/28/2015
Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Savvas Savvides - Purdue University

Episode #564
01/21/2015
Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda

Bharath Samanthula - Purdue University

Episode #563
01/14/2015
Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis

Jackie Rees Ulmer - Purdue University

Episode #562
12/10/2014
How Program Analysis can be Used in Security Applications

How Program Analysis can be Used in Security Applications

Xiangyu Zhang - Purdue University

12/03/2014

Cancelled

Episode #561
11/19/2014
Privacy in the Age of the Police State

Privacy in the Age of the Police State

Marcus Ranum - Tenable Network Security

Episode #560
11/12/2014
You can hack, but you can't hide: Using log analysis to detect APTs

You can hack, but you can't hide: Using log analysis to detect APTs

Kevin Bowers - RSA

Episode #559
11/05/2014
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Barrett Caldwell and Omar Eldardiry - Purdue University

Episode #558
10/29/2014
Healthcare Security and Privacy: Not There Yet

Healthcare Security and Privacy: Not There Yet

Robert Zimmerman - Inforistec

Episode #557
10/22/2014
"Memory Analysis, Meet GPU Malware"

"Memory Analysis, Meet GPU Malware"

Golden G. Richard III - University of New Orleans

10/15/2014

Canceled

Episode #556
10/08/2014
Biometrics and Usability

Biometrics and Usability

Stephen Elliott - Purdue University

Episode #555
10/01/2014
Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis

Responsible Information Management and the 2014 Cost of Data Breach: Global Analysis

Larry Ponemon - Ponemon Institute

Episode #554
09/24/2014
Threat intelligence and digital forensics

Threat intelligence and digital forensics

Sam Liles - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!