The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

01/10/2024
Invisible Signatures: Device Fingerprinting in a Connected World

Invisible Signatures: Device Fingerprinting in a Connected World

Sandhya Aneja - Marist College

01/17/2024
Grep for Evil

Grep for Evil

Leigh Metcalf - Carnegie Mellon University / CERT

02/07/2024
Tensor Decomposition Methods for Cybersecurity

Tensor Decomposition Methods for Cybersecurity

Maksim Eren - Los Alamos National Laboratory

02/14/2024
On Security Operations for AI Systems

On Security Operations for AI Systems

Jonathan (Jono) Spring - Cybersecurity and Infrastructure Security Agency (CISA)

02/21/2024
Stepping Through Cybersecurity Risk Management A Systems Thinking Approach

Stepping Through Cybersecurity Risk Management A Systems Thinking Approach

Jennifer Bayuk - Jennifer L. Bayuk, LLC

02/28/2024
Modern Enterprise Cybersecurity: A CISO perspective

Modern Enterprise Cybersecurity: A CISO perspective

Sanket Naik - Palosade

03/06/2024
The Fault in Our Stars: How Reputation Systems Fail in Practice

The Fault in Our Stars: How Reputation Systems Fail in Practice

Alejandro Cuevas - Carnegie Mellon University

04/03/2024

Symposium Closing Keynote "A Cyber Journey"

Phillipe Biondi - Airbus

04/17/2024

CANCELLED

04/24/2024
Defining Trusted Artificial Intelligence for the National Security Space

Defining Trusted Artificial Intelligence for the National Security Space

David Stracuzzi - Sandia National Laboratories

08/21/2024
Privacy and Security in ML: A Priority, not an Afterthought

Privacy and Security in ML: A Priority, not an Afterthought

Shagufta Mehnaz - The Pennsylvania State University

09/18/2024
Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms

Exploiting Vulnerabilities in AI-Enabled UAV: Attacks and Defense Mechanisms

Ashok Vardhan Raja - Purdue University Northwest

09/25/2024
Shamrock Cyber – When Luck Just Isn't Enough

Shamrock Cyber – When Luck Just Isn't Enough

Chance Younkin - Pacific Northwest National Laboratory

10/23/2024
Behavioral Advertising and Consumer Welfare

Behavioral Advertising and Consumer Welfare

Alessandro Acquisti - Carnegie Mellon

10/30/2024
Many Ways to Hack MFA

Many Ways to Hack MFA

Roger Grimes - KnowBe4

11/06/2024
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted

HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted

Yanxue Jia - Purdue University

11/13/2024

Modern Software Delivery: Friend or Foe?

Kelly Shortridge - Fastly

11/20/2024
Adversarial C2 inside OT Networks

Adversarial C2 inside OT Networks

Mason Rice - Oak Ridge National Laboratory

12/04/2024

Fairness as Equal Concession

Christopher Yeomans - Purdue University

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!