Latest COVID-19 Information for Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

01/15/2020
Contactless Control Flow Monitoring via Electromagnetic Emanations

Contactless Control Flow Monitoring via Electromagnetic Emanations

Sriharsha Etigowni - Purdue University

01/22/2020
Identifying Security Risks Using Internet-Wide Scan Data

Identifying Security Risks Using Internet-Wide Scan Data

Morgan Princing - Censys

02/05/2020
Automated Reasoning of Security and Privacy of Cellular Networks

Automated Reasoning of Security and Privacy of Cellular Networks

Syed Rafiul Hussain - Purdue University

02/12/2020
The Role of Culture in Cybersecurity

The Role of Culture in Cybersecurity

Char Sample - Idaho National Lab

02/19/2020
Security, Ethics and the End of the World as We Know It

Security, Ethics and the End of the World as We Know It

Doug Rapp - Delta Research & Cyber Leadership Alliance

02/26/2020
Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

Yuhong Nan - Purdue University

03/11/2020
Security and Privacy of Connected Autonomous Vehicles

Security and Privacy of Connected Autonomous Vehicles

Vireshwar Kumar - Purdue University

03/25/2020
Cyber Risk Management 101

Cyber Risk Management 101

Nick Sturgeon - IU Health & IU School of Medicine

04/01/2020
Empirical Digital Forensics

Empirical Digital Forensics

Neil Rowe - Naval Postgraduate School

04/08/2020
Mirai - DDoS and the Criminal Ecosystem

Mirai - DDoS and the Criminal Ecosystem

Elliott Peterson - FBI

04/22/2020
Public Sector Cyber Security 2020: Challenges and Rewards

Public Sector Cyber Security 2020: Challenges and Rewards

Bruce Coffing - City of Chicago

06/17/2020
A Principled Approach to Cybersecurity Engineering

A Principled Approach to Cybersecurity Engineering

Sami Saydjari - Cyber Defense Agency, Inc.

06/24/2020
Using Machine Learning for Network Intrusion Detection

Using Machine Learning for Network Intrusion Detection

Nandi Leslie - Raytheon

07/08/2020

Trusting Autonomous Cars

Ashish Kundu - Ciphense

07/15/2020
Cyber Security of Control Systems: The Second Coming of the Maginot Line

Cyber Security of Control Systems: The Second Coming of the Maginot Line

Joe Weiss - Applied Control Systems, LLC

07/22/2020
The Ghost in the Machine: Reconciling AI and Trust in the Connected World

The Ghost in the Machine: Reconciling AI and Trust in the Connected World

Sam Curry and Alon Kaufman - Cybereason  / Duality Technologies

07/29/2020
Network Awareness and Predictive Cyber Analytics

Network Awareness and Predictive Cyber Analytics

Carter Bullard - QoSient

08/19/2020
Flexible and Adaptive Malware Identification Using Techniques from Biology

Flexible and Adaptive Malware Identification Using Techniques from Biology

Elena Peterson - Pacific Northwest National Laboratory

09/09/2020
EMP Threat & Protection

EMP Threat & Protection

Rich Banta - Lifeline Data Centers

09/16/2020
Authentication: Behind The Scenes When You Click “Check Out”

Authentication: Behind The Scenes When You Click “Check Out”

Warda Zahid Khan - Mastercard

09/23/2020
TCB: From Assumption to Assurance

TCB: From Assumption to Assurance

Osman Ismael - BedRock Systems

10/21/2020
Why Attack When You Can Defend

Why Attack When You Can Defend

Jeff Man - Online Business Systems

11/04/2020
Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Results from the Field: Cybersecurity in Nonprofits and Why it Matters

Kelley Misata - Sightline Security

11/11/2020
Fearless Computing

Fearless Computing

Abhilasha Bhargav-Spantzel - Intel Corporation

11/18/2020
Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Improving the Accuracy of Blocklists by Aggregation and Address Reuse Detection

Sivaram Ramanathan - University of Southern California

12/02/2020
Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Maximizing Cyber Deception to Improve Security: An Empirical Analysis

Kimberly Ferguson-Walter - Laboratory for Advanced Cybersecurity Research, NSA Research

12/09/2020
Security and Privacy for Humans

Security and Privacy for Humans

Lorrie Cranor - Carnegie Mellon University, CyLab

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!