Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1969 |

Results

Showing: 451 to 475 of 811
09/12/2007
Security issues within embedded software development

Security issues within embedded software development

Ron Buskey - Motorola

09/05/2007
Applying Recreational Mathematics to Secure Multiparty Computation

Applying Recreational Mathematics to Secure Multiparty Computation

Yvo Desmedt - University College, London

08/29/2007
Towards Effective and Efficient Behavior-based Trust Models

Towards Effective and Efficient Behavior-based Trust Models

Klemens Boehm - Karlsruhe University

08/22/2007
Role Discovery

Role Discovery

Bill Horne - HP Labs

04/11/2007
Dumb Ideas in Computer Security

Dumb Ideas in Computer Security

Dr. Charles P. Pfleeger - Pfleeger Consulting Group

04/04/2007

How the Criminal Law Must Adapt to the Networked World

Richard Downing - US Department of Justice

03/21/2007
A quant looks at the future

A quant looks at the future

Dan Geer - Geer Risk Services, LLC

03/07/2007
Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls

Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls

Eugene Schultz - High Tower Software

02/28/2007
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners

Bhavani Thuraisingham - The University of Texas at Dallas

02/21/2007
Cyber Security and the "NEW" world enterprise

Cyber Security and the "NEW" world enterprise

Howard Schmidt - R & H Security Consulting LLC

02/07/2007
Scenario-Driven Construction of Enterprise Information Policy

Scenario-Driven Construction of Enterprise Information Policy

Stuart Shapiro - The MITRE Corporation

01/31/2007
Mathematically Defining Privacy

Mathematically Defining Privacy

Chris Clifton - Purdue University

01/24/2007
WHAT IS INFORMATION?

WHAT IS INFORMATION?

Wojciech Szpankowski - Purdue University

01/17/2007
Research Challenges in Assured Information Sharing

Research Challenges in Assured Information Sharing

Vipin Swarup - MITRE

01/10/2007
Computer-Related Incidents:  Factors Related to Cause and Prevention

Computer-Related Incidents: Factors Related to Cause and Prevention

Virginia Rezmierski - University of Michigan

11/29/2006
OS-Level Taint Analysis for Malware Investigation and Defense

OS-Level Taint Analysis for Malware Investigation and Defense

Dongyan Xu - Purdue University

11/01/2006
Developing an Operational Framework for Integrated System Security

Developing an Operational Framework for Integrated System Security

Paula DeWitte - St. Mary’s Law School in San Antonio

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!