The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #455
01/12/2011
Risk Perception and Trust in Cloud

Risk Perception and Trust in Cloud

Fariborz Farahmand - Purdue University

Episode #456
01/19/2011
Retrofitting Legacy Code for Security

Retrofitting Legacy Code for Security

Somesh Jha - University of Wisconsin

Episode #457
01/26/2011
User and Machine Authentication and Authorization Infrastructure for  Distributed Testbeds

User and Machine Authentication and Authorization Infrastructure for Distributed Testbeds

Torsten Braun - University of Bern

02/02/2011

Campus closed/snow

Episode #458
02/09/2011
Understanding insiders: An analysis of risk-taking behavior *

Understanding insiders: An analysis of risk-taking behavior *

Fariborz Farahmand - Purdue University

Episode #459
02/16/2011

Malware Trends and Techniques

Tom Ervin - MITRE

Episode #460
02/23/2011
A couple of results about JavaScript

A couple of results about JavaScript

Jan Vitek - Purdue University

Episode #461
03/02/2011
Modeling DNS Security: Misconfiguration, Availability, and Visualization

Modeling DNS Security: Misconfiguration, Availability, and Visualization

Casey Deccio - Sandia National Labs

Episode #462
03/09/2011
Exploiting Banners for Fun and Profits

Exploiting Banners for Fun and Profits

Michael Schearer - Booz Allen Hamilton

Episode #463
03/23/2011
Wireless Technologies and how it relates to cyber security research

Wireless Technologies and how it relates to cyber security research

Kim Trieu - Lockheed Martin

Episode #464
03/30/2011

The Threat to Our Nation's Infrastructure and Intellectual Property Is Substantial

Dennis McCallam - Northrop Grumman

Episode #465
04/06/2011
Society, Law Enforcement and the Internet:  Models for Give and Take

Society, Law Enforcement and the Internet: Models for Give and Take

Carter Bullard - QoSient, LLC

Episode #466
04/13/2011
FuzzyFusion™, an application architecture for multisource information fusion

FuzzyFusion™, an application architecture for multisource information fusion

Ronda R. Henning - Harris Corporation

Episode #467
04/20/2011
Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet

Semantic Security: or How I Learned to Stop Worrying and Looooooove the Internet

Jose Fernandez - Montreal Polytechnic

Episode #468
04/27/2011
Mobile Phones and Evidence Preservation

Mobile Phones and Evidence Preservation

Eric Katz - Purdue University

Episode #469
08/24/2011
Provisioning Protocol Challenges in an Era of gTLD Expansion

Provisioning Protocol Challenges in an Era of gTLD Expansion

Scott Hollenbeck - Verisign

Episode #470
08/31/2011
Non-homogeneous Anonymizations

Non-homogeneous Anonymizations

Tamir Tassa - The Open University, Israel

Episode #471
09/07/2011
Detecting Bots in Online Games using Human Observational Proofs

Detecting Bots in Online Games using Human Observational Proofs

Steven Gianvecchio - MITRE

Episode #472
09/14/2011
What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security

What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security

David Zage - Sandia National Laboratories

Episode #473
09/21/2011
Methods and Techniques for Protecting Data in Real Time on the Wire

Methods and Techniques for Protecting Data in Real Time on the Wire

Joe Leonard - Global Velocity

Episode #474
09/28/2011
Weighted Multiple Secret Sharing

Weighted Multiple Secret Sharing

Xukai Zou - Indiana University-Purdue University Indianapolis

Episode #475
10/05/2011
Trusted Computing and Security for Embedded Systems

Trusted Computing and Security for Embedded Systems

Hal Aldridge - Sypris Electronics

Episode #476
10/12/2011
Enterprise-Wide Intrusions Involving Advanced Threats

Enterprise-Wide Intrusions Involving Advanced Threats

Dan McWhorter and Steve Surdu - Mandiant Corporation

Episode #477
10/19/2011
Ontological Semantic Technology Goes Phishing

Ontological Semantic Technology Goes Phishing

Julia M. Taylor, Victor Raskin, and Eugene H. Spafford - Purdue University

Episode #478
10/26/2011
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Sheila Becker - University of Luxembourgh

Episode #480
11/09/2011
Process Implanting: A New Active Introspection Framework for Virtualization

Process Implanting: A New Active Introspection Framework for Virtualization

Zhongshu Gu - Purdue University

Episode #481
11/16/2011
Jam me if you can: Mitigating the Impact of Inside Jammers

Jam me if you can: Mitigating the Impact of Inside Jammers

Loukas Lazos - University of Arizona

Episode #482
11/30/2011
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Apu Kapadia - Indiana University

12/07/2011

No Seminar

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!