CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 76 to 100 of 669
04/15/2015

Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently


Yan Huang - Indiana University
(107.4MB): Video Icon MP4 Video   Watch on Youtube
04/08/2015

Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up


Rebecca Herold - Rebecca Herold & Associates, LLC
(222.7MB): Video Icon MP4 Video   Watch on Youtube
04/01/2015

Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking


Kui Ren - University at Buffalo
(109.5MB): Video Icon MP4 Video   Watch on Youtube
03/25/2015

Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel


Michelle Dennedy - Intel
(242.2MB): Video Icon MP4 Video   Watch on Youtube
03/11/2015

Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)


Andrew Pyles - MITRE
(85.3MB): Video Icon MP4 Video   Watch on Youtube
03/04/2015

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology


Xinming Ou - Kansas State University
(112.5MB): Video Icon MP4 Video   Watch on Youtube
02/25/2015

Software updates: decisions and security implications

Software updates: decisions and security implications


Kami Vaniea - Indiana University
(181.3MB): Video Icon MP4 Video   Watch on Youtube
02/18/2015

Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis


Ninghui Li - Purdue University
(216.9MB): Video Icon MP4 Video   Watch on Youtube
02/11/2015

Code-Pointer Integrity

Code-Pointer Integrity


Mathias Payer - Purdue University
(90.3MB): Video Icon MP4 Video   Watch on Youtube
02/04/2015

Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs


Omar Chowdhury - Purdue University
(149.6MB): Video Icon MP4 Video   Watch on Youtube
01/28/2015

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds


Savvas Savvides - Purdue University
(148.3MB): Video Icon MP4 Video   Watch on Youtube
01/21/2015

Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda


Bharath Samanthula - Purdue University
(117.4MB): Video Icon MP4 Video   Watch on Youtube
01/14/2015

Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis


Jackie Rees Ulmer - Purdue University
(598.7MB): Video Icon MP4 Video   Watch on Youtube
12/10/2014

How Program Analysis can be Used in Security Applications

How Program Analysis can be Used in Security Applications


Xiangyu Zhang - Purdue University
(148.5MB): Video Icon MP4 Video   Watch on Youtube
12/03/2014

Open



11/19/2014

Privacy in the Age of the Police State

Privacy in the Age of the Police State


Marcus Ranum - Tenable Network Security
(209.0MB): Video Icon MP4 Video   Watch on Youtube
11/05/2014

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers

Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers


Barrett Caldwell and Omar Eldardiry - Purdue University
(145.2MB): Video Icon MP4 Video   Watch on Youtube
10/29/2014

Healthcare Security and Privacy: Not There Yet

Healthcare Security and Privacy: Not There Yet


Robert Zimmerman - Inforistec
(206.1MB): Video Icon MP4 Video   Watch on Youtube
10/22/2014


"Memory Analysis, Meet GPU Malware"


Golden G. Richard III - University of New Orleans
(170.0MB): Video Icon MP4 Video   Watch on Youtube
10/15/2014

Canceled



10/08/2014

Biometrics and Usability

Biometrics and Usability


Stephen Elliott - Purdue University
(164.9MB): Video Icon MP4 Video   Watch on Youtube
09/24/2014

Threat intelligence and digital forensics

Threat intelligence and digital forensics


Sam Liles - Purdue University
(166.4MB): Video Icon MP4 Video   Watch on Youtube
09/17/2014

MITRE/Purdue Mobile Masquerading User Experiment

MITRE/Purdue Mobile Masquerading User Experiment


Mark Guido - MITRE
(183.2MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.