Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1969 |

Results

Showing: 401 to 425 of 814
04/08/2009
Privacy – from accessing databases to location based services

Privacy – from accessing databases to location based services

Johann-Christoph Freytag - Humboldt University

04/01/2009
An Analysis of Data Breach Disclosure

An Analysis of Data Breach Disclosure

Melissa Dark - Purdue University

03/11/2009
Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments

Arjan Durresi - Indiana University Purdue University at Indianapolis

03/04/2009
The Best Defense is Information

The Best Defense is Information

Jeremy Rasmussen - Sypris Electronics

02/25/2009
Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search

Mummoorthy Murugesan - Purdue University

02/11/2009
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Mehmet Sahinoglu - Auburn University at Montgomery, AL

01/28/2009
An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention

Ryan Riley - Purdue University

01/21/2009
A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection

Paul Kidwell - Purdue University

01/14/2009
Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach

Chris Clifton - Purdue University

11/19/2008
The Role Graph Model and its Extensions

The Role Graph Model and its Extensions

Sylvia Osborn - University of Western Ontario

11/12/2008
John Oritz, SRA International

John Oritz, SRA International

John Oritz - SRA International

10/29/2008
Trends in Identity Management

Trends in Identity Management

Kenji Takahashi - ITT Information Sharing Platform Laboratories

10/22/2008
Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL

Federica Paci - Purdue University

10/08/2008
Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems

Yuecel Karabulut - SAP Research

10/01/2008
Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance

Dave Keppler - MITRE

09/24/2008
Responding to Anomalous Database Requests

Responding to Anomalous Database Requests

Ashish Kamra - Purdue University

09/10/2008
Virtualization: Resource Coupling and Security across the Stack

Virtualization: Resource Coupling and Security across the Stack

Dennis Moreau - Configuresoft

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!