The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #425
01/13/2010
Thinking Outside the Box

Thinking Outside the Box

Eugene Spafford - Purdue University

Episode #426
01/20/2010
Applications of biometric technologies

Applications of biometric technologies

Stephen Elliott - Purdue University

Episode #427
01/27/2010

Fast-flux Attacks

Shijie Zhou - University of Electronic Science and Technology of China

Episode #428
02/03/2010
Detecting Insider Theft of Trade Secrets

Detecting Insider Theft of Trade Secrets

Greg Stephens - Mitre

Episode #429
02/10/2010
Dissecting Digital Data: Context & Meaning through Analytics

Dissecting Digital Data: Context & Meaning through Analytics

Marcus Rogers - Purdue University

Episode #430
02/17/2010
Provenance-based Data Trustworthiness Assessment in Data Streams

Provenance-based Data Trustworthiness Assessment in Data Streams

Hyo-Sang Lim - Purdue University

Episode #431
02/24/2010
Ribbons, A Partially-Shared Memory Programming Model

Ribbons, A Partially-Shared Memory Programming Model

Kevin Hoffman - PhD candidate in the Computer Science, Purdue University

Episode #433
03/10/2010
Making of the CWE Top-25, 2010 Edition

Making of the CWE Top-25, 2010 Edition

Pascal Meunier - Purdue University

Episode #434
03/24/2010
A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems

David Zage - Purdue University

Episode #435
03/31/2010
Everything I Needed to Know about Security, I Learned in 1974

Everything I Needed to Know about Security, I Learned in 1974

David Bell - Retired

Episode #436
04/07/2010
60 years of scientific research in cryptography:  a reflection

60 years of scientific research in cryptography: a reflection

Yvo Desmedt - University College London, UK

Episode #437
04/14/2010
Security of JavaScript in a Browser Environment

Security of JavaScript in a Browser Environment

Christian Hammer - Purdue University

Episode #438
04/21/2010
The role of System Security Engineering in the engineering lifecycle

The role of System Security Engineering in the engineering lifecycle

Stephen Dill - Lockheed Martin

Episode #439
04/28/2010
Ontological Semantic Technology for Detecting  Insider Threat and Social Engineering

Ontological Semantic Technology for Detecting Insider Threat and Social Engineering

Victor Raskin & Julia Taylor - Purdue University

Episode #440
08/25/2010
Secure Network Coding for Wireless Mesh Networks

Secure Network Coding for Wireless Mesh Networks

Cristina Nita-Rotaru - Purdue University

Episode #441
09/01/2010
Data in the Cloud: Authentication Without Leaking

Data in the Cloud: Authentication Without Leaking

Ashish Kundu - Purdue University

Episode #442
09/08/2010
Rootkits

Rootkits

Xeno Kovah - MITRE

Episode #443
09/15/2010
Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses

Xiaofeng Wang - Indiana University

Episode #444
09/22/2010
Security of Mobile Ad Hoc Networks (MANETs)

Security of Mobile Ad Hoc Networks (MANETs)

Petros Mouchtaris - Telcordia

Episode #445
09/29/2010
Assured Processing through Obfuscation

Assured Processing through Obfuscation

Sergey Panasyuk - Air Force Research Laboratory

Episode #446
10/06/2010
Global Study of Web 2.0 Use in Organizations

Global Study of Web 2.0 Use in Organizations

Mihaela Vorvoreanu, Lorraine G. Kisselburgh - Purdue University

Episode #448
10/20/2010
Trust and Protection in the Illinois Browser Operating System

Trust and Protection in the Illinois Browser Operating System

Sam King - University of Illinois

Episode #449
10/27/2010
The Role of Automata Theory in Software Verification

The Role of Automata Theory in Software Verification

P. Madhusudan - University of Illinois at Urbana-Champaign

Episode #450
11/03/2010
Tackling System-Wide Integrity

Tackling System-Wide Integrity

Trent Jaeger - Pennsylvania State

Episode #451
11/10/2010
Detecting Coordinated Attacks with Traffic Analysis

Detecting Coordinated Attacks with Traffic Analysis

Nikita Borisov - University of Illinois at Urbana-Champaign

Episode #452
11/17/2010
Security Applications for Physically Unclonable Functions

Security Applications for Physically Unclonable Functions

Michael Kirkpatrick - Purdue University

Episode #453
12/01/2010
Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Nudging the Digital Pirate: Behavioral Issues in the Piracy Context

Matthew Hashim - Purdue University

Episode #454
12/08/2010

Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory

Junghwan Rhee - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!