CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Morgan Greenwood, "SureView AMP, Active Malware Protection, detecting malware anti virus solutions miss"
Learn how organization's proactivly protect against malware that traditional signature-based ...
Learn how organization's proactivly protect against malware that traditional signature-based anti virus solutions miss.
-
HD
Sheila Becker, "Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack"
Peer-to-peer real-time communication and media streaming applications optimize their performance ...
Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coordinate systems allow nodes in a peer-to-peer network t
-
HD
Julia M. Taylor, Victor Raskin, and Eugene H. Spafford, "Ontological Semantic Technology Goes Phishing"
The talk reports on an early stage of on-going research ...
The talk reports on an early stage of on-going research on the application of computational semantic techniques to detect phishing, i. e., mass mailings intended to sweep up personal details for later malicious use by the phishers themselves or their pote
-
HD
Dan McWhorter and Steve Surdu, "Enterprise-Wide Intrusions Involving Advanced Threats"
Since early 2010 Google, Sony, Epsilon CitiBank, International Monetary Fund, ...
Since early 2010 Google, Sony, Epsilon CitiBank, International Monetary Fund, RSA, various law enforcement agencies and many other organizations have been compromised by different attack groups. These groups include hacktivist organizations like Anonymous
-
HD
Hal Aldridge, "Trusted Computing and Security for Embedded Systems"
Computer hardware and software that perform real-world functions such as ...
Computer hardware and software that perform real-world functions such as flight control, telecommunications switching, and network routing form a class of systems called embedded systems. These embedded systems have challenges that differ from general pur
-
HD
Xukai Zou, "Weighted Multiple Secret Sharing"
Secret sharing is important in information and network security and ...
Secret sharing is important in information and network security and has broad applications in the real world. Since an elegant secret sharing mechanism was first proposed by Shamir in 1979 (also Blakley did the similar work then), many schemes have appear
-
HD
Joe Leonard, " Methods and Techniques for Protecting Data in Real Time on the Wire"
The ongoing explosion of data and information throughout the enterprise ...
The ongoing explosion of data and information throughout the enterprise is undeniable. Sensitive data, whether structured or unstructured, finds itself replicated and dispersed. This creates a challenge for information security professionals to prevent th
-
HD
David Zage, "What does Knowledge Discovery, Predictability, and Human Behavior have to do with Computer Security"
Vast resources are devoted to predicting human behavior in domains ...
Vast resources are devoted to predicting human behavior in domains such as economics, popular culture, and national security, but the quality of such predictions is often poor. Thus, it is tempting to conclude that this inability to make good predictions
-
HD
Steven Gianvecchio, "Detecting Bots in Online Games using Human Observational Proofs"
The abuse of online games by automated programs, known as ...
The abuse of online games by automated programs, known as bots, has grown significantly in recent years. The conventional methods for distinguishing bots from humans, such as CAPTCHAs, are not effective in a gaming context. This talk presents a non-intera
-
HD
Tamir Tassa, "Non-homogeneous anonymizations"
Privacy Preserving Data Publishing (PPDP) is an evolving research field ...
Privacy Preserving Data Publishing (PPDP) is an evolving research field that is targeted at developing anonymization techniques to enable publishing data so that privacy is preserved while data distortion is minimized. Up until recently most of the resear