Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/14/2000

Immunology and Intrusion Detection

Stephanie Forrest - Santa Fe Institute

01/21/2000
Open Source Issues and Opportunities for Tripwire

Open Source Issues and Opportunities for Tripwire

Gene Kim - Tripwire

01/28/2000

PFIRES: Policy Framework for Interpreting Risk in eCommerce Security

Jackie Rees - Krannert School of Management at Purdue University

02/04/2000
NLP for IAS: Overview and Implementations

NLP for IAS: Overview and Implementations

Victor Raskin - English and Linguistics at Purdue University

02/11/2000
Commercial High-Resolution Satellite Imagery Polic

Commercial High-Resolution Satellite Imagery Polic

Gerald Thomas - Political Science, Purdue University

02/25/2000
Automatic identification of classified documents

Automatic identification of classified documents

Judy Hochberg - Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory

03/03/2000

Algorithms for Internet Security Services

Michael T. Goodrich - Johns Hopkins University

03/31/2000
Implications of Mobile Code on Microsoft Platforms

Implications of Mobile Code on Microsoft Platforms

Padgett Peterson - Lockheed Martin

04/14/2000

Information Assurance: The Army's Perspective

Phil Loranger - United States Army

04/21/2000
Information Assurance Challenges for the 21st Century

Information Assurance Challenges for the 21st Century

Michael G. Fleming & Victor Maconachy - NSA

08/23/2000
The Future of Information Security Technologies

The Future of Information Security Technologies

John Steven Reel - Veridian

09/06/2000
Static Checking of Interrupt-Driven Software

Static Checking of Interrupt-Driven Software

Jens Palsberg - CERIAS

09/13/2000
The Challenge of Secure Software

The Challenge of Secure Software

Eugene Spafford - CERIAS

09/20/2000
Evolving the Internet

Evolving the Internet

John Richardson - Intel Corporation

10/04/2000
Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe - United States Air Force

10/11/2000
Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Wenke Lee - North Carolina State University

10/18/2000

Fault Tolerant Authentication in Mobile Computing

Bharat Bhargava - Purdue University

10/25/2000

Fast Encryption and Authentication in One Shot

Virgil Gligor - University of Maryland

11/01/2000

Data Warehousing

Bharat Bhargava - Purdue University

11/08/2000
Investigating Computer Security Incidents

Investigating Computer Security Incidents

Peter Stephenson - Netigy

11/14/2000

A Security Architecture for Survivable Systems

Chenxi Wang - University of Virginia

11/15/2000

Our Policy is to Violate Your Privacy: When Privacy Goals Conflict

Annie Anton - North Carolina State University

11/29/2000

Detecting Computer Attackers: Recognizing Patterns of Malicious, Stealthy Behavior

Robert Cunningham - MIT Lincoln Laboratory, Information Systems Technology

12/06/2000

Cryptology, Technology, and Policy

Susan Landau - Sun Microsystems

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!