Archive

2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/14/2015

Learning from Information Security Maturity: A Textual Analysis

Learning from Information Security Maturity: A Textual Analysis


Jackie Rees Ulmer - Purdue University
(598.7MB): Video Icon MP4 Video   Watch on Youtube
01/21/2015

Security with Privacy - A Research Agenda

Security with Privacy - A Research Agenda


Bharath Samanthula - Purdue University
(117.4MB): Video Icon MP4 Video   Watch on Youtube
01/28/2015

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds


Savvas Savvides - Purdue University
(148.3MB): Video Icon MP4 Video   Watch on Youtube
02/04/2015

Regulatory Compliance Checking Over Encrypted Audit Logs

Regulatory Compliance Checking Over Encrypted Audit Logs


Omar Chowdhury - Purdue University
(149.6MB): Video Icon MP4 Video   Watch on Youtube
02/11/2015

Code-Pointer Integrity

Code-Pointer Integrity


Mathias Payer - Purdue University
(90.3MB): Video Icon MP4 Video   Watch on Youtube
02/18/2015

Privacy Notions for Data Publishing and Analysis

Privacy Notions for Data Publishing and Analysis


Ninghui Li - Purdue University
(216.9MB): Video Icon MP4 Video   Watch on Youtube
02/25/2015

Software updates: decisions and security implications

Software updates: decisions and security implications


Kami Vaniea - Indiana University
(181.3MB): Video Icon MP4 Video   Watch on Youtube
03/04/2015

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology

Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology


Xinming Ou - Kansas State University
(112.5MB): Video Icon MP4 Video   Watch on Youtube
03/11/2015

Virtual Android Malware Detection and Analysis (VAMDA)

Virtual Android Malware Detection and Analysis (VAMDA)


Andrew Pyles - MITRE
(85.3MB): Video Icon MP4 Video   Watch on Youtube
03/25/2015

Symposium/Michelle Dennedy, Intel

Symposium/Michelle Dennedy, Intel


Michelle Dennedy - Intel
(242.2MB): Video Icon MP4 Video   Watch on Youtube
04/01/2015

Breaking Mobile Social Networks for Automated User Location Tracking

Breaking Mobile Social Networks for Automated User Location Tracking


Kui Ren - University at Buffalo
(109.5MB): Video Icon MP4 Video   Watch on Youtube
04/08/2015

Privacy Potpourri: Changing Privacy from the Bottom Up

Privacy Potpourri: Changing Privacy from the Bottom Up


Rebecca Herold - Rebecca Herold & Associates, LLC
(222.7MB): Video Icon MP4 Video   Watch on Youtube
04/15/2015

Engineering Secure Computation -- Efficiently

Engineering Secure Computation -- Efficiently


Yan Huang - Indiana University
(107.4MB): Video Icon MP4 Video   Watch on Youtube
04/22/2015

CERIAS Poster Contest Winners

CERIAS Poster Contest Winners


Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University
(114.1MB): Video Icon MP4 Video   Watch on Youtube
04/29/2015

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet


Steve Bellovin - Columbia University
(261.8MB): Video Icon MP4 Video   Watch on Youtube
09/02/2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps

SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps


Jianjun Huang - Purdue University
(88.3MB): Video Icon MP4 Video   Watch on Youtube
09/16/2015

Evaluation of Urban Vehicle Tracking Algorithms

Evaluation of Urban Vehicle Tracking Algorithms


John Feddema - Sandia Labs
(0): Video Icon MP4 Video   Watch on Youtube
10/21/2015

Anonymized Data

Anonymized Data


Koray Mancuhan - Purdue University
(94.6MB): Video Icon MP4 Video   Watch on Youtube
10/28/2015

 Case Study of the Authur Pendragon Cyber Threat at The University of Alabama

Case Study of the Authur Pendragon Cyber Threat at The University of Alabama


Kate Seigfried-Spellar - Purdue University
(213.2MB): Video Icon MP4 Video   Watch on Youtube
11/04/2015

Secure Multiparty Computation and Differential Privacy

Secure Multiparty Computation and Differential Privacy


Balamurugan Anandan - Purdue University
(125.4MB): Video Icon MP4 Video   Watch on Youtube
11/11/2015

Verifying Computations with (Private) State

Verifying Computations with (Private) State


Ariel Feldman - University of Chicago
(138.7MB): Video Icon MP4 Video   Watch on Youtube
11/18/2015

 A Secure Communication Protocol for Drones and Smart Objects

A Secure Communication Protocol for Drones and Smart Objects


Jongho Won - Purdue University
(88.2MB): Video Icon MP4 Video   Watch on Youtube
12/09/2015

 Preventing or Penalizing Equivocation in Decentralized Environments

Preventing or Penalizing Equivocation in Decentralized Environments


Aniket Kate - Purdue University
(116.1MB): Video Icon MP4 Video   Watch on Youtube

Coming Up!

Our annual security symposium will take place on April 7 & 8, 2020.
Purdue University, West Lafayette, IN

More Information