Archive
2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1970 |
Results
Affiliation shown is the affiliation at the time the talk was given.
Learning from Information Security Maturity: A Textual Analysis
Jackie Rees Ulmer - Purdue University
Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
Savvas Savvides - Purdue University
Regulatory Compliance Checking Over Encrypted Audit Logs
Omar Chowdhury - Purdue University
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
Xinming Ou - Kansas State University
Breaking Mobile Social Networks for Automated User Location Tracking
Kui Ren - University at Buffalo
Privacy Potpourri: Changing Privacy from the Bottom Up
Rebecca Herold - Rebecca Herold & Associates, LLC
CERIAS Poster Contest Winners
Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Steve Bellovin - Columbia University
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Samuel Jero - Purdue University
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Jianjun Huang - Purdue University
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
Applying Formal Verification Techniques for Checking Compliance of Computer Systems and Protocols
Omar Chowdhury - Purdue University
The Five W's of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec
A Hybrid Private Record Linkage Scheme: Separating Differentially Private Synopses FromMatching Records
Fang-Yu Rao - Purdue University
Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University
Secure Multiparty Computation and Differential Privacy
Balamurugan Anandan - Purdue University
A Secure Communication Protocol for Drones and Smart Objects
Jongho Won - Purdue University
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories
Laura Amo - SUNY Buffalo
Preventing or Penalizing Equivocation in Decentralized Environments
Aniket Kate - Purdue University
Ways to Watch
Watch Now!
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!- Upcoming
- Past Seminars
- Previous Speakers
- Open Dates (Fall/Spring)
- Attending the Seminar
- About the Weekly Seminar
- CPE Credit Information (PDF)
- Join our Mailing List












