The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 451 to 475 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #482
11/30/2011
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Apu Kapadia - Indiana University

Episode #481
11/16/2011
Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers

Loukas Lazos - University of Arizona

Episode #480
11/09/2011
Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization

Zhongshu Gu - Purdue University

Episode #478
10/26/2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Sheila Becker - University of Luxembourgh

Episode #477
10/19/2011
Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing

Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University

Episode #476
10/12/2011
Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats

Dan McWhorter and Steve Surdu - Mandiant Corporation

Episode #475
10/05/2011
Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems

Hal Aldridge - Sypris Electronics

Episode #474
09/28/2011
Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing

Xukai Zou - Indiana University-Purdue University Indianapolis

Episode #473
09/21/2011
Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire

Joe Leonard - Global Velocity

Episode #472
09/14/2011
What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security

What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security

David Zage - Sandia National Laboratories

Episode #471
09/07/2011
Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs

Steven Gianvecchio - MITRE

Episode #470
08/31/2011
Non-homogeneous Anonymizations

Non-homogeneous Anonymizations

Tamir Tassa - The Open University, Israel

Episode #469
08/24/2011
Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion

Scott Hollenbeck - Verisign

Episode #468
04/27/2011
Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation

Eric Katz - Purdue University

Episode #467
04/20/2011
Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet

Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet

Jose Fernandez - Montreal Polytechnic

Episode #466
04/13/2011
FuzzyFusion™, an application architecture for multisource information fusion

FuzzyFusion™, an application architecture for multisource information fusion

Ronda R. Henning - Harris Corporation

Episode #465
04/06/2011
Society, Law Enforcement and the Internet:  Models for Give and Take

Society, Law Enforcement and the Internet: Models for Give and Take

Carter Bullard - QoSient, LLC

Episode #464
03/30/2011

The Threat to Our Nation's Infrastructure and Intellectual Property Is Substantial

Dennis McCallam - Northrop Grumman

Episode #463
03/23/2011
Wireless Technologies and how it relates to cyber security research

Wireless Technologies and how it relates to cyber security research

Kim Trieu - Lockheed Martin

Episode #462
03/09/2011
Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits

Michael Schearer - Booz Allen Hamilton

Episode #461
03/02/2011
Modeling DNS Security: Misconfiguration, Availability, and Visualization

Modeling DNS Security: Misconfiguration, Availability, and Visualization

Casey Deccio - Sandia National Labs

Episode #460
02/23/2011
A couple of results about JavaScript

A couple of results about JavaScript

Jan Vitek - Purdue University

Episode #459
02/16/2011

Malware Trends and Techniques

Tom Ervin - MITRE

Episode #458
02/09/2011
Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *

Fariborz Farahmand - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!