The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 551 to 575 of 899

Affiliation shown is the affiliation at the time the talk was given.

02/28/2007
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners

Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners

Bhavani Thuraisingham - The University of Texas at Dallas

02/21/2007
Cyber Security and the "NEW" world enterprise

Cyber Security and the "NEW" world enterprise

Howard Schmidt - R & H Security Consulting LLC

02/07/2007
Scenario-Driven Construction of Enterprise Information Policy

Scenario-Driven Construction of Enterprise Information Policy

Stuart Shapiro - The MITRE Corporation

01/31/2007
Mathematically Defining Privacy

Mathematically Defining Privacy

Chris Clifton - Purdue University

01/24/2007
What is Information?

What is Information?

Wojciech Szpankowski - Purdue University

01/17/2007
Research Challenges in Assured Information Sharing

Research Challenges in Assured Information Sharing

Vipin Swarup - MITRE

01/10/2007
Computer-Related Incidents:  Factors Related to Cause and Prevention

Computer-Related Incidents: Factors Related to Cause and Prevention

Virginia Rezmierski - University of Michigan

11/29/2006
OS-Level Taint Analysis for Malware Investigation and Defense

OS-Level Taint Analysis for Malware Investigation and Defense

Dongyan Xu - Purdue University

11/01/2006
Developing an Operational Framework for Integrated System Security

Developing an Operational Framework for Integrated System Security

Paula DeWitte - St. Mary’s Law School in San Antonio

10/11/2006
Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Network Security Begins at Home: Changing Consumer Behavior for i-Safety

Nora Rifon - Michigan State University

09/27/2006
The Secure Information Sharing Problem and Solution Approaches

The Secure Information Sharing Problem and Solution Approaches

Ravi Sandhu - George Mason University

09/13/2006
Real-Time Visualization of Network Attacks on High-Speed Links

Real-Time Visualization of Network Attacks on High-Speed Links

Hyogon Kim - Korea University/PU Visitor

09/06/2006
A Multi-layered Approach to Web Application Defense

A Multi-layered Approach to Web Application Defense

Ed Finkler - Purdue University

08/30/2006
Invasive Browser Sniffing and Countermeasures

Invasive Browser Sniffing and Countermeasures

Sid Stamm - Indiana University

08/23/2006
Toward Autonomic Security Policy Management

Toward Autonomic Security Policy Management

Ehab Al-Shaer, Ph.D. - DePaul University, Chicago, IL

04/19/2006
Recent Attacks on MD5

Recent Attacks on MD5

John Black - University of Colorado at Boulder

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!