The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 526 to 550 of 940

Affiliation shown is the affiliation at the time the talk was given.

Episode #406
04/08/2009
Privacy – from accessing databases to location based services

Privacy – from accessing databases to location based services

Johann-Christoph Freytag - Humboldt University

Episode #405
04/01/2009
An Analysis of Data Breach Disclosure

An Analysis of Data Breach Disclosure

Melissa Dark - Purdue University

Episode #404
03/25/2009
Rick Clark, Ontario Systems

Rick Clark, Ontario Systems

Episode #403
03/11/2009
Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments

Arjan Durresi - Indiana University Purdue University at Indianapolis

Episode #402
03/04/2009
The Best Defense is Information

The Best Defense is Information

Jeremy Rasmussen - Sypris Electronics

Episode #401
02/25/2009
Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search

Mummoorthy Murugesan - Purdue University

Episode #400
02/18/2009
Mace: Systems and Language Support for Building Correct, High-Performance Networked Services

Mace: Systems and Language Support for Building Correct, High-Performance Networked Services

Charles Killian - Purdue University

Episode #399
02/11/2009
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Mehmet Sahinoglu - Auburn University at Montgomery, AL

Episode #398
02/04/2009
The Dark Side of Software Engineering and How to Defend Against It

The Dark Side of Software Engineering and How to Defend Against It

Cassio Goldschmidt - Symantec

Episode #397
01/28/2009
An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention

Ryan Riley - Purdue University

Episode #396
01/21/2009
A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection

Paul Kidwell - Purdue University

Episode #395
01/14/2009
Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach

Chris Clifton - Purdue University

Episode #393
12/03/2008
Automatic Signature Generation for Unknown Vulnerabilities

Automatic Signature Generation for Unknown Vulnerabilities

Weidong Cui - Microsoft

Episode #392
11/19/2008
The Role Graph Model and its Extensions

The Role Graph Model and its Extensions

Sylvia Osborn - University of Western Ontario

Episode #391
11/12/2008
John Oritz, SRA International

John Oritz, SRA International

John Oritz - SRA International

Episode #389
10/29/2008
Trends in Identity Management

Trends in Identity Management

Kenji Takahashi - ITT Information Sharing Platform Laboratories

Episode #388
10/22/2008
Access Control and Resiliency for WS-BPEL

Access Control and Resiliency for WS-BPEL

Federica Paci - Purdue University

Episode #386
10/08/2008
Measuring the Attack Surfaces of Enterprise Software Systems

Measuring the Attack Surfaces of Enterprise Software Systems

Yuecel Karabulut - SAP Research

Episode #385
10/01/2008
Resilient Systems for Mission Assurance

Resilient Systems for Mission Assurance

Dave Keppler - MITRE

Episode #384
09/24/2008
Responding to Anomalous Database Requests

Responding to Anomalous Database Requests

Ashish Kamra - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!