Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 476 to 500 of 750
10/20/2004

Effective and Efficient Intrusion Analysis

Peng Ning - NC State

10/13/2004
Information Flow Analysis in Security Enhanced Linux

Information Flow Analysis in Security Enhanced Linux

Dan Thomsen - Tresys Technology

10/06/2004

How to Forge Signatures and Be Happy About It

Giuseppe Ateniese - Johns Hopkins University

09/29/2004

Automatic Generation and Analysis of Attack Graphs

Jeannette Wing - Carnegie Mellon University

09/22/2004

Samuel D. Conte Distinguished Lecture Series

John Mitchell - Stanford University

09/15/2004
Secure Information Sharing within a Collaborative Environment

Secure Information Sharing within a Collaborative Environment

Gail-Joon Ahn - University of North Carolina at Charlotte

09/08/2004
Administrative Scope and Role-Based Administration

Administrative Scope and Role-Based Administration

Jason Crampton - Royal Holloway, University of London

09/01/2004

Privacy Technologies

Latanya Sweeney - Carnegie Mellon University

08/25/2004

Application of Thermodynamics to Computer Network Defense

Dave Ford - Naval Postgraduate School

04/21/2004

Improving audit sources by categorizing security monitoring systems

Benjamin Kuperman - PhD Candidate, Purdue University

04/14/2004

Secure Collaboration for Capacity Sharing in Logistics

Chris Clifton - Computer Science, Purdue University

04/07/2004

Security in Outsourced Databases

Gene Tsudik - UC Irvine

03/31/2004

Securing Wireless Sensor Networks

Wenliang (Kevin) Du - Syracuse University

03/24/2004

Managing Policy for Coordinated Defense

Clifford Neuman - ISI/USC

03/10/2004

Lessons from the EROS Experiment

Jonathan Shapiro - Johns Hopkins University

02/25/2004

Testing Computer Forensic Tools

James R. Lyle - National Institute of Standards and Technology

02/18/2004

Signatures, Heuristics and Behavior Blocking

Sarah Merrion - Symantec

02/11/2004

TrustBuilder: Automated Trust Negotiation in Open Systems

Kent Seamons - Brigham Young University

02/04/2004

Info Forthcoming

Prof. Steve Elliott - Purdue University

01/28/2004

Proactive Protection Against DDoS and Worm Attacks

Kihong Park - Computer Science, Purdue University

01/21/2004

Enabling Effective Trust Judgments

Sean Smith - Dartmouth College

01/14/2004

Privacy Preserving Data Mining on Vertically Partitioned Data

Jaideep Vaidya - Purdue University

12/10/2003

NL Downgrading, Sanitization, and Declassification

Dina Mohamed - Purdue University Department of Linguistics

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!