The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #395
01/14/2009
Measuring Privacy: A Risk-Based Approach

Measuring Privacy: A Risk-Based Approach

Chris Clifton - Purdue University

Episode #396
01/21/2009
A Rules Based Statistical Algorithm for Keystroke Detection

A Rules Based Statistical Algorithm for Keystroke Detection

Paul Kidwell - Purdue University

Episode #397
01/28/2009
An Alternate Memory Architecture for Code Injection Prevention

An Alternate Memory Architecture for Code Injection Prevention

Ryan Riley - Purdue University

Episode #398
02/04/2009
The Dark Side of Software Engineering and How to Defend Against It

The Dark Side of Software Engineering and How to Defend Against It

Cassio Goldschmidt - Symantec

Episode #399
02/11/2009
Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Quantitative Risk Assessment of Software Security and Privacy, and Risk Management with Game Theory

Mehmet Sahinoglu - Auburn University at Montgomery, AL

Episode #400
02/18/2009
Mace: Systems and Language Support for Building Correct, High-Performance Networked Services

Mace: Systems and Language Support for Building Correct, High-Performance Networked Services

Charles Killian - Purdue University

Episode #401
02/25/2009
Providing Privacy through Plausibly Deniable Search

Providing Privacy through Plausibly Deniable Search

Mummoorthy Murugesan - Purdue University

Episode #402
03/04/2009
The Best Defense is Information

The Best Defense is Information

Jeremy Rasmussen - Sypris Electronics

Episode #403
03/11/2009
Security for the Next Internet over Heterogeneous Environments

Security for the Next Internet over Heterogeneous Environments

Arjan Durresi - Indiana University Purdue University at Indianapolis

Episode #404
03/25/2009
Rick Clark, Ontario Systems

Rick Clark, Ontario Systems

Episode #405
04/01/2009
An Analysis of Data Breach Disclosure

An Analysis of Data Breach Disclosure

Melissa Dark - Purdue University

Episode #406
04/08/2009
Privacy – from accessing databases to location based services

Privacy – from accessing databases to location based services

Johann-Christoph Freytag - Humboldt University

Episode #409
04/29/2009

Privacy-Preserving Genome Computing Through Program Specialization

Xiaofeng Wang - Indiana University

Episode #410
08/26/2009
Sphinx: A Compact and Provably Secure Mix Format

Sphinx: A Compact and Provably Secure Mix Format

Ian Goldberg - University of Waterloo

Episode #411
09/02/2009
Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance

Fake Picassos, Tampered History, and Digital Forgery: Protecting the Genealogy of Bits with Secure Provenance

Ragib Hasan - University of Illinois at Urbana-Champaign

Episode #412
09/09/2009
Database Assurance: Anomaly Detection for Relational Databases

Database Assurance: Anomaly Detection for Relational Databases

Peter Mork - MITRE

Episode #413
09/16/2009
From Security Architecture to Implementation

From Security Architecture to Implementation

Jerry Saulman - IBM

Episode #414
09/23/2009
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyberlaw

Rick Aldrich - Booz Allen Hamilton

Episode #415
09/30/2009
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber Security

Richard Power - CyLab - Carnegie Mellon

Episode #416
10/07/2009
Building Security In Maturity Model (BSIMM)

Building Security In Maturity Model (BSIMM)

Gary McGraw - Cigital, Inc

Episode #417
10/14/2009
PlugNPlay Trust for Embedded Communication Systems

PlugNPlay Trust for Embedded Communication Systems

Raquel Hill - Indiana University

Episode #418
10/21/2009
Information Security Management and IT Executives in a Top Management Team

Information Security Management and IT Executives in a Top Management Team

Juhee Kwon - Purdue University

Episode #420
11/04/2009
Multi-Policy Access Control for Healthcare using Policy Machine

Multi-Policy Access Control for Healthcare using Policy Machine

Zahid Pervaiz - Purdue University

Episode #422
11/18/2009
Safely Analyzing Sensitive Network Data

Safely Analyzing Sensitive Network Data

Gerome Miklau - University of Massachusetts, Amherst

Episode #423
12/02/2009
Cyber Security Trends and Disruptors

Cyber Security Trends and Disruptors

Andrew Scholnick - Verisign

Episode #424
12/09/2009
Human Factors Approaches to Preserving Privacy

Human Factors Approaches to Preserving Privacy

Kelly Caine - Indiana University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!