The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 426 to 450 of 894

Affiliation shown is the affiliation at the time the talk was given.

03/02/2011
Modeling DNS Security: Misconfiguration, Availability, and Visualization

Modeling DNS Security: Misconfiguration, Availability, and Visualization

Casey Deccio - Sandia National Labs

02/23/2011
A couple of results about JavaScript

A couple of results about JavaScript

Jan Vitek - Purdue University

02/16/2011

Malware Trends and Techniques

Tom Ervin - MITRE

02/09/2011
Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *

Fariborz Farahmand - Purdue University

02/02/2011

Campus closed/snow

01/19/2011
Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha - University of Wisconsin

01/12/2011
Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand - Purdue University

12/01/2010
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim - Purdue University

11/17/2010
Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick - Purdue University

11/10/2010
Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov - University of Illinois at Urbana-Champaign

11/03/2010
Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger - Pennsylvania State

10/27/2010
The Role of Automata Theory in Software Verification

The Role of Automata Theory in Software Verification

P. Madhusudan - University of Illinois at Urbana-Champaign

10/20/2010
Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King - University of Illinois

10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

08/25/2010
Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru - Purdue University

04/28/2010
Ontological Semantic Technology for Detecting  Insider Threat and Social Engineering

Ontological Semantic Technology for Detecting Insider Threat and Social Engineering

Victor Raskin & Julia Taylor - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!