The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/14/2009
Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach

Chris Clifton - Purdue University

01/21/2009
A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection

Paul Kidwell - Purdue University

01/28/2009
An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention

Ryan Riley - Purdue University

02/11/2009
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Mehmet Sahinoglu - Auburn University at Montgomery, AL

02/25/2009
Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search

Mummoorthy Murugesan - Purdue University

03/04/2009
The Best Defense is Information

The Best Defense is Information

Jeremy Rasmussen - Sypris Electronics

03/11/2009
Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments

Arjan Durresi - Indiana University Purdue University at Indianapolis

04/01/2009
An Analysis of Data Breach Disclosure

An Analysis of Data Breach Disclosure

Melissa Dark - Purdue University

04/08/2009
Privacy – from accessing databases to location based services

Privacy – from accessing databases to location based services

Johann-Christoph Freytag - Humboldt University

04/29/2009

Privacy-Preserving Genome Computing Through Program Specialization

Xiaofeng Wang - Indiana University

08/26/2009
Sphinx: A Compact and Provably Secure Mix Format

Sphinx: A Compact and Provably Secure Mix Format

Ian Goldberg - University of Waterloo

09/16/2009
From Security Architecture to Implementation

From Security Architecture to Implementation

Jerry Saulman - IBM

10/07/2009
Building Security In Maturity Model (BSIMM)

Building Security In Maturity Model (BSIMM)

Gary McGraw - Cigital, Inc

10/14/2009
PlugNPlay Trust for Embedded Communication Systems

PlugNPlay Trust for Embedded Communication Systems

Raquel Hill - Indiana University

11/04/2009
Multi-Policy Access Control for Healthcare using Policy Machine

Multi-Policy Access Control for Healthcare using Policy Machine

Zahid Pervaiz - Purdue University

11/18/2009
Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data

Gerome Miklau - University of Massachusetts, Amherst

12/02/2009
Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors

Andrew Scholnick - Verisign

12/09/2009
Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy

Kelly Caine - Indiana University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!