The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #132
01/14/2000

Immunology and Intrusion Detection

Stephanie Forrest - Santa Fe Institute

Episode #133
01/21/2000
Open Source Issues and Opportunities for Tripwire

Open Source Issues and Opportunities for Tripwire

Gene Kim - Tripwire

Episode #134
01/28/2000

PFIRES: Policy Framework for Interpreting Risk in eCommerce Security

Jackie Rees - Krannert School of Management at Purdue University

Episode #135
02/04/2000
NLP for IAS: Overview and Implementations

NLP for IAS: Overview and Implementations

Victor Raskin - English and Linguistics at Purdue University

Episode #136
02/11/2000
Commercial High-Resolution Satellite Imagery Polic

Commercial High-Resolution Satellite Imagery Polic

Gerald Thomas - Political Science, Purdue University

Episode #137
02/18/2000
Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.

Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al.

Clay Shields - CERIAS, Purdue University

Episode #138
02/25/2000
Automatic identification of classified documents

Automatic identification of classified documents

Judy Hochberg - Computer Research and Applications Group (CIC-3) at Los Alamos National Laboratory

Episode #139
03/03/2000

Algorithms for Internet Security Services

Michael T. Goodrich - Johns Hopkins University

Episode #141
03/31/2000
Implications of Mobile Code on Microsoft Platforms

Implications of Mobile Code on Microsoft Platforms

Padgett Peterson - Lockheed Martin

Episode #142
04/07/2000
Machine Learning Techniques for Anomaly Detection in Computer Security

Machine Learning Techniques for Anomaly Detection in Computer Security

Terran Lane - Purdue University

Episode #143
04/14/2000

Information Assurance: The Army's Perspective

Phil Loranger - United States Army

Episode #144
04/21/2000
Information Assurance Challenges for the 21st Century

Information Assurance Challenges for the 21st Century

Michael G. Fleming & Victor Maconachy - NSA

Episode #146
08/23/2000
The Future of Information Security Technologies

The Future of Information Security Technologies

John Steven Reel - Veridian

Episode #148
09/06/2000
Static Checking of Interrupt-Driven Software

Static Checking of Interrupt-Driven Software

Jens Palsberg - CERIAS

Episode #149
09/13/2000
The Challenge of Secure Software

The Challenge of Secure Software

Eugene Spafford - CERIAS

Episode #150
09/20/2000
Evolving the Internet

Evolving the Internet

John Richardson - Intel Corporation

Episode #152
10/04/2000
Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe

Richard Stotts, Jerome Webb & Matthew Beebe - United States Air Force

Episode #153
10/11/2000
Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Developing Data Mining Techniques for Intrusion Detection: A Progress Report

Wenke Lee - North Carolina State University

Episode #154
10/18/2000

Fault Tolerant Authentication in Mobile Computing

Bharat Bhargava - Purdue University

Episode #155
10/25/2000

Fast Encryption and Authentication in One Shot

Virgil Gligor - University of Maryland

Episode #156
11/01/2000

Data Warehousing

Bharat Bhargava - Purdue University

Episode #157
11/08/2000
Investigating Computer Security Incidents

Investigating Computer Security Incidents

Peter Stephenson - Netigy

Episode #158
11/14/2000

A Security Architecture for Survivable Systems

Chenxi Wang - University of Virginia

Episode #159
11/15/2000

Our Policy is to Violate Your Privacy: When Privacy Goals Conflict

Annie Anton - North Carolina State University

Episode #160
11/29/2000

Detecting Computer Attackers: Recognizing Patterns of Malicious, Stealthy Behavior

Robert Cunningham - MIT Lincoln Laboratory, Information Systems Technology

Episode #161
12/06/2000

Cryptology, Technology, and Policy

Susan Landau - Sun Microsystems

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!