The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Showing: 776 to 800 of 917

Affiliation shown is the affiliation at the time the talk was given.

03/31/2000
Implications of Mobile Code on Microsoft Platforms

Implications of Mobile Code on Microsoft Platforms

Padgett Peterson - Lockheed Martin

03/03/2000

Algorithms for Internet Security Services

Michael T. Goodrich - Johns Hopkins University

02/25/2000
Automatic identification of classified documents

Automatic identification of classified documents

Judy Hochberg - Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory

02/11/2000
Commercial High-Resolution Satellite Imagery Polic

Commercial High-Resolution Satellite Imagery Polic

Gerald Thomas - Political Science, Purdue University

02/04/2000
NLP for IAS: Overview and Implementations

NLP for IAS: Overview and Implementations

Victor Raskin - English and Linguistics at Purdue University

01/28/2000

PFIRES: Policy Framework for Interpreting Risk in eCommerce Security

Jackie Rees - Krannert School of Management at Purdue University

01/21/2000
Open Source Issues and Opportunities for Tripwire

Open Source Issues and Opportunities for Tripwire

Gene Kim - Tripwire

01/14/2000

Immunology and Intrusion Detection

Stephanie Forrest - Santa Fe Institute

12/10/1999

Developing Custom Intrusion Detection Filters Using Data Mining

Chris Clifton - The MITRE Corporation

11/12/1999
Information Security, a Folk Art in Need of an Upgrade

Information Security, a Folk Art in Need of an Upgrade

Donn Parker - SRI Consulting

11/05/1999
eInfrastructure Security

eInfrastructure Security

Michael Santarcangelo - Andersen Consulting

10/29/1999
Computer Forensics Examinations in the Consulting Arena

Computer Forensics Examinations in the Consulting Arena

James R. C. Hansen - Trident Data Systems

10/22/1999

Anonymity Online

Albert H. Teich - American Association for the Advancement of Science

10/15/1999
Balancing Big Brother

Balancing Big Brother

David Aucsmith - Intel Corporation

10/08/1999

A Formal Framework and Evaluation Method for Protocol Denial of Service

Catherine Meadows - Naval Research Laboratory

10/01/1999

Architectures and Components for High-Assurance Security

Carl Landwehr - Mitretek

09/24/1999

Engineering secure software in Java with Confined Types

Jan Vitek - Purdue, CERIAS

09/17/1999

Technical and legal approaches to spam

David E. Sorkin - Center for Information Technology & Privacy Law at The John Marshall Law School

09/10/1999
Image and Video Watermarking: An Overview

Image and Video Watermarking: An Overview

Edward J. Delp - Video and Image Processing Laboratory (VIPER), Purdue School of Electrical and Computer Engineering

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!