Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Umut Topkara, "Passwords Decay, Words Endure: Towards Secure and Re-usable Multiple Password Mnemonics"

    Human aspects of information security were identified at the early ...

    Human aspects of information security were identified at the early stages in the history of time shared computing. The recent surge in attacks that exploit security vulnerabilities involving human factors have also put them under the spotlight of various

    Apr 26, 2007 Read more
  • HD

    Mercan Topkara, "Hiding the Message Behind the Words: Advances in Natural Language Watermarking"

    The Internet has become one of the main sources of ...

    The Internet has become one of the main sources of knowledge acquisition, harboring resources such as online newspapers, web portals for scientific documents, personal blogs, encyclopedias, and advertisements. It has become a part of our daily life to sea

    Apr 19, 2007 Read more
  • HD

    Dr. Charles P. Pfleeger, "Dumb Ideas in Computer Security"

    Every profession goes through mistakes and unwise steps, especially in ...

    Every profession goes through mistakes and unwise steps, especially in its early years. It is through trial and error that leaders and innovators of the profession are able to advance knowledge. Computer security is no exception. Both insiders' and outsid

    Apr 12, 2007 Read more
  • HD

    Dr. Albert M. K. Cheng, "Automatic Debugging and Verification of RTL-Specified Real-Time Systems via Incremental Satisfiability Counting and On-Time and Scalable Intrusion Detection in Embedded Systems"

    Abstract 1: Real-time logic (RTL) is useful for the verification ...

    Abstract 1: Real-time logic (RTL) is useful for the verification of a safety assertion with respect to the specification of a real-time system. Since the satisfiability problem for RTL is undecidable, the systematic debugging of a real-time system appears

    Mar 29, 2007 Read more
  • HD

    Dan Geer, "A quant looks at the future"

    If there is a difference between information and bits we ...

    If there is a difference between information and bits we had better find it soon. The bit-count is bounding upward, no one dares throw anything away, and once "search" supplants "organize" there is no going back. Information may or may not want to be free

    Mar 22, 2007 Read more
  • HD

    Eugene Schultz, "Intrusion Detection Event Correlation: Approaches, Benefits and Pitfalls"

    Over the years intrusion detection technology has improved to the ...

    Over the years intrusion detection technology has improved to the point that it is highly useful to both the commercial and non-commercial sector. This technology is, however, by no means anything close to perfect. Even the best intrusion detection system

    Mar 8, 2007 Read more
  • HD

    Bhavani Thuraisingham, "Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrustworthy Coalition Partners"

    Data mining is the process of posing queries and extracting ...

    Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many ap-plications in security including for national securi

    Mar 1, 2007 Read more
  • HD

    Howard Schmidt, "Cyber Security and the "NEW" world enterprise"

    As cyber security has evolved in the new world of ...

    As cyber security has evolved in the new world of distributed computing there have been dramatic changes to the nature of our security needs. Mr. Schmidt will talk about issues that affect large enterprises, small and medium business and end users. He wil

    Feb 22, 2007 Read more
  • HD

    Stuart Shapiro, "Scenario-Driven Construction of Enterprise Information Policy"

    Information policy at the enterprise level is invariably an exercise ...

    Information policy at the enterprise level is invariably an exercise in gaps and inconsistencies. The range of concerns�including security�is broad, the environment tends to be heterogeneous and dispersed, the contextual scope is significant, and the stak

    Feb 8, 2007 Read more
  • HD

    Chris Clifton, "Mathematically Defining Privacy"

    Computer systems ease the sharing and use of information, but ...

    Computer systems ease the sharing and use of information, but accessibility of information leads to privacy concerns. Technology is being developed to address this issue - enabling use of information while controlling the disclosure. But is this enough to

    Feb 1, 2007 Read more
Loading...