The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 451 to 475 of 922

Affiliation shown is the affiliation at the time the talk was given.

03/09/2011
Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits

Michael Schearer - Booz Allen Hamilton

03/02/2011
Modeling DNS Security: Misconfiguration, Availability, and Visualization

Modeling DNS Security: Misconfiguration, Availability, and Visualization

Casey Deccio - Sandia National Labs

02/23/2011
A couple of results about JavaScript

A couple of results about JavaScript

Jan Vitek - Purdue University

02/16/2011

Malware Trends and Techniques

Tom Ervin - MITRE

02/09/2011
Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *

Fariborz Farahmand - Purdue University

02/02/2011

Campus closed/snow

01/19/2011
Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha - University of Wisconsin

01/12/2011
Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand - Purdue University

12/01/2010
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim - Purdue University

11/17/2010
Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick - Purdue University

11/10/2010
Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov - University of Illinois at Urbana-Champaign

11/03/2010
Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger - Pennsylvania State

10/27/2010
The Role of Automata Theory in Software Verification

The Role of Automata Theory in Software Verification

P. Madhusudan - University of Illinois at Urbana-Champaign

10/20/2010
Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King - University of Illinois

10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!