The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 501 to 525 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #433
03/10/2010
Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition

Pascal Meunier - Purdue University

Episode #431
02/24/2010
Ribbons, A Partially-Shared Memory Programming Model

Ribbons, A Partially-Shared Memory Programming Model

Kevin Hoffman - PhD candidate in the Computer Science, Purdue University

Episode #430
02/17/2010
Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams

Hyo-Sang Lim - Purdue University

Episode #429
02/10/2010
Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics

Marcus Rogers - Purdue University

Episode #428
02/03/2010
Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets

Greg Stephens - Mitre

Episode #427
01/27/2010

Fast-flux Attacks

Shijie Zhou - University of Electronic Science and Technology of China

Episode #426
01/20/2010
Applications of biometric technologies

Applications of biometric technologies

Stephen Elliott - Purdue University

Episode #425
01/13/2010
Thinking Outside the Box

Thinking Outside the Box

Eugene Spafford - Purdue University

Episode #424
12/09/2009
Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy

Kelly Caine - Indiana University

Episode #423
12/02/2009
Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors

Andrew Scholnick - Verisign

Episode #422
11/18/2009
Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data

Gerome Miklau - University of Massachusetts, Amherst

Episode #420
11/04/2009
Multi-Policy Access Control for Healthcare using Policy Machine

Multi-Policy Access Control for Healthcare using Policy Machine

Zahid Pervaiz - Purdue University

Episode #418
10/21/2009
Information Security Management and IT Executives in a Top Management Team

Information Security Management and IT Executives in a Top Management Team

Juhee Kwon - Purdue University

Episode #417
10/14/2009
PlugNPlay Trust for Embedded Communication Systems

PlugNPlay Trust for Embedded Communication Systems

Raquel Hill - Indiana University

Episode #416
10/07/2009
Building Security In Maturity Model (BSIMM)

Building Security In Maturity Model (BSIMM)

Gary McGraw - Cigital, Inc

Episode #415
09/30/2009
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Richard Power - CyLab - Carnegie Mellon

Episode #414
09/23/2009
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

Rick Aldrich - Booz Allen Hamilton

Episode #413
09/16/2009
From Security Architecture to Implementation

From Security Architecture to Implementation

Jerry Saulman - IBM

Episode #412
09/09/2009
Database Assurance: Anomaly Detection for Relational Databases

Database Assurance: Anomaly Detection for Relational Databases

Peter Mork - MITRE

Episode #411
09/02/2009
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance

Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance

Ragib Hasan - University of Illinois at Urbana-Champaign

Episode #410
08/26/2009
Sphinx: A Compact and Provably Secure Mix Format

Sphinx: A Compact and Provably Secure Mix Format

Ian Goldberg - University of Waterloo

Episode #409
04/29/2009

Privacy-Preserving Genome Computing Through Program Specialization

Xiaofeng Wang - Indiana University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!