The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 426 to 450 of 878

Affiliation shown is the affiliation at the time the talk was given.

10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

08/25/2010
Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru - Purdue University

04/28/2010
Ontological Semantic Technology for Detecting  Insider Threat and Social Engineering

Ontological Semantic Technology for Detecting Insider Threat and Social Engineering

Victor Raskin & Julia Taylor - Purdue University

04/14/2010
Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment

Christian Hammer - Purdue University

04/07/2010
60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection

Yvo Desmedt - University College London, UK

03/10/2010
Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition

Pascal Meunier - Purdue University

02/24/2010
Ribbons, A Partially-Shared Memory Programming Model

Ribbons, A Partially-Shared Memory Programming Model

Kevin Hoffman - PhD candidate in the Computer Science, Purdue University

02/17/2010
Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams

Hyo-Sang Lim - Purdue University

02/10/2010
Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics

Marcus Rogers - Purdue University

02/03/2010
Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets

Greg Stephens - Mitre

01/27/2010

Fast-flux Attacks

Shijie Zhou - University of Electronic Science and Technology of China

01/20/2010
Applications of biometric technologies

Applications of biometric technologies

Stephen Elliott - Purdue University

01/13/2010
Thinking Outside the Box

Thinking Outside the Box

Eugene Spafford - Purdue University

12/09/2009
Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy

Kelly Caine - Indiana University

12/02/2009
Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors

Andrew Scholnick - Verisign

11/18/2009
Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data

Gerome Miklau - University of Massachusetts, Amherst

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!