CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University
Center for Education and Research in Information Assurance and Security

CERIAS Security Seminar Archive

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/14/2009

Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach


Chris Clifton - Purdue University
(236.2MB): Video Icon MP4 Video   Watch on Youtube
01/21/2009

A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection


Paul Kidwell - Purdue University
(358.8MB): Video Icon MP4 Video   Watch on Youtube
01/28/2009

An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention


Ryan Riley - Purdue University
(224.6MB): Video Icon MP4 Video   Watch on Youtube
02/04/2009

The dark side of software engineering and how to defend against it

The dark side of software engineering and how to defend against it


Cassio Goldschmidt - Symantec
(332.0MB): Video Icon MP4 Video   Watch on Youtube
02/11/2009

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory


Mehmet Sahinoglu - Auburn University at Montgomery, AL
(873.3MB): Video Icon MP4 Video   Watch on Youtube
02/25/2009

Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search


Mummoorthy Murugesan - Purdue University
(248.5MB): Video Icon MP4 Video   Watch on Youtube
03/04/2009

The Best Defense is Information

The Best Defense is Information


Jeremy Rasmussen - Sypris Electronics
(559.2MB): Video Icon MP4 Video   Watch on Youtube
03/11/2009

Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments


Arjan Durresi - Indiana University Purdue University at Indianapolis
(635.0MB): Video Icon MP4 Video   Watch on Youtube
03/25/2009

Rick Clark, Ontario Systems

Rick Clark, Ontario Systems



(582.4MB): Video Icon MP4 Video   Watch on Youtube
04/01/2009

An Analysis of Data Breach Disclosure

An Analysis of Data Breach Disclosure


Melissa Dark - Purdue University
(657.9MB): Video Icon MP4 Video   Watch on Youtube
04/08/2009

Privacy – from accessing databases to location based services

Privacy – from accessing databases to location based services


Johann-Christoph Freytag - Humboldt University
(588.6MB): Video Icon MP4 Video   Watch on Youtube
04/29/2009

Privacy-Preserving Genome Computing Through Program Specialization


Xiaofeng Wang - Indiana University
08/26/2009

Sphinx: A Compact and Provably Secure Mix Format

Sphinx: A Compact and Provably Secure Mix Format


Ian Goldberg - University of Waterloo
(643.4MB): Video Icon MP4 Video   Watch on Youtube
09/02/2009

Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance

Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance


Ragib Hasan - University of Illinois at Urbana-Champaign
(611.8MB): Video Icon MP4 Video   Watch on Youtube
09/16/2009

From Security Architecture to Implementation

From Security Architecture to Implementation


Jerry Saulman - IBM
(497.1MB): Video Icon MP4 Video   Watch on Youtube
09/23/2009

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw


Rick Aldrich - Booz Allen Hamilton
(650.3MB): Video Icon MP4 Video   Watch on Youtube
09/30/2009

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security


Richard Power - CyLab - Carnegie Mellon
(708.5MB): Video Icon MP4 Video   Watch on Youtube
10/07/2009

The Building Security In Maturity Model (BSIMM)

The Building Security In Maturity Model (BSIMM)


Gary McGraw - Cigital, Inc
(610.9MB): Video Icon MP4 Video   Watch on Youtube
10/14/2009

PlugNPlay Trust for Embedded Communication Systems

PlugNPlay Trust for Embedded Communication Systems


Raquel Hill - Indiana University
(350.7MB): Video Icon MP4 Video   Watch on Youtube
10/21/2009

Information Security Management and IT Executives in a Top Management Team

Information Security Management and IT Executives in a Top Management Team


Juhee Kwon - Purdue University
(551.7MB): Video Icon MP4 Video   Watch on Youtube
11/04/2009

Multi-Policy Access Control for Healthcare using Policy Machine

Multi-Policy Access Control for Healthcare using Policy Machine


Zahid Pervaiz - Purdue University
(244.6MB): Video Icon MP4 Video   Watch on Youtube
11/18/2009

Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data


Gerome Miklau - University of Massachusetts, Amherst
(477.3MB): Video Icon MP4 Video   Watch on Youtube
12/02/2009

Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors


Andrew Scholnick - Verisign
(476.3MB): Video Icon MP4 Video   Watch on Youtube
12/09/2009

 Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy


Kelly Caine - Indiana University
(456.3MB): Video Icon MP4 Video   Watch on Youtube

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.