The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 726 to 750 of 887

Affiliation shown is the affiliation at the time the talk was given.

01/10/2001
Building Secure Software

Building Secure Software

Gary McGraw - Cigital

12/06/2000

Cryptology, Technology, and Policy

Susan Landau - Sun Microsystems

11/29/2000

Detecting Computer Attackers: Recognizing Patterns of Malicious, Stealthy Behavior

Robert Cunningham - MIT Lincoln Laboratory, Information Systems Technology

11/15/2000

Our Policy is to Violate Your Privacy: When Privacy Goals Conflict

Annie Anton - North Carolina State University

11/14/2000

A Security Architecture for Survivable Systems

Chenxi Wang - University of Virginia

11/08/2000
Investigating Computer Security Incidents

Investigating Computer Security Incidents

Peter Stephenson - Netigy

11/01/2000

Data Warehousing

Bharat Bhargava - Purdue University

10/25/2000

Fast Encryption and Authentication in One Shot

Virgil Gligor - University of Maryland

10/18/2000

Fault Tolerant Authentication in Mobile Computing

Bharat Bhargava - Purdue University

10/11/2000
Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Wenke Lee - North Carolina State University

10/04/2000
Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe - United States Air Force

09/20/2000
Evolving the Internet

Evolving the Internet

John Richardson - Intel Corporation

09/13/2000
The Challenge of Secure Software

The Challenge of Secure Software

Eugene Spafford - CERIAS

09/06/2000
Static Checking of Interrupt-Driven Software

Static Checking of Interrupt-Driven Software

Jens Palsberg - CERIAS

08/23/2000
The Future of Information Security Technologies

The Future of Information Security Technologies

John Steven Reel - Veridian

04/21/2000
Information Assurance Challenges for the 21st Century

Information Assurance Challenges for the 21st Century

Michael G. Fleming & Victor Maconachy - NSA

04/14/2000

Information Assurance: The Army's Perspective

Phil Loranger - United States Army

03/31/2000
Implications of Mobile Code on Microsoft Platforms

Implications of Mobile Code on Microsoft Platforms

Padgett Peterson - Lockheed Martin

03/03/2000

Algorithms for Internet Security Services

Michael T. Goodrich - Johns Hopkins University

02/25/2000
Automatic identification of classified documents

Automatic identification of classified documents

Judy Hochberg - Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!