CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Wojciech Szpankowski, "WHAT IS INFORMATION?"
Information permeates every corner of our lives and shapes our ...
Information permeates every corner of our lives and shapes our universe. Understanding and harnessing information holds the potential for significant advances. The breadth and depth of underlying concepts of the science of information transcend traditiona
-
HD
Vipin Swarup, "Research Challenges in Assured Information Sharing"
Assured information sharing has been a "grand challenge" problem of ...
Assured information sharing has been a "grand challenge" problem of information security for several decades. Currently, there is broad consensus that the state-of-practice of information sharing is inadequate. One primary problem is that people on the fi
-
HD
Virginia Rezmierski, "Computer-Related Incidents: Factors Related to Cause and Prevention"
Computer-related incidents that have the potential to destabilize, violate, or ...
Computer-related incidents that have the potential to destabilize, violate, or damage, the resources, services, policies, or data of the community or individual members of the community are happening in increasing numbers. Despite the news, we know that t
-
HD
Marc Rogers, " The Psychology of Computer Deviance: How it can assist in digital evidence analysis."
The talk will look at the phenomenon of deviant computer ...
The talk will look at the phenomenon of deviant computer behavior and how understanding the individuals who engage in this behavior can benefit digital evidence investigations. A brief overview of the current research on computer deviance will be presente
-
HD
Dongyan Xu, "OS-Level Taint Analysis for Malware Investigation and Defense"
The Internet is facing threats from increasingly stealthy and sophisticated ...
The Internet is facing threats from increasingly stealthy and sophisticated malware. Recent reports have suggested that new computer worms and malware deliberately avoid fast massive propagation. Instead, they lurk in infected machines and inflict contami
-
HD
Richard Power, "One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back: A Ten Year Retrospective on Cyber Crime and Cyber Security (1996-2006)"
This presentation explores the evolution of cyber crime and cyber ...
This presentation explores the evolution of cyber crime and cyber security as global issues over the past decade. It examines the growth of cyber bank robbery, cyber extortion, identity theft, economic espionage, denial of service, cyber vandalism, cyber
-
HD
David Zage, "Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks"
Many multicast overlay networks maintain application-specific performance goals such as ...
Many multicast overlay networks maintain application-specific performance goals such as bandwidth, latency, jitter and loss rate by dynamically changing the overlay structure using measurement- based adaptation mechanisms. This results in an unstructured
-
HD
Paula DeWitte, "Developing an Operational Framework for Integrated System Security"
Systems are composed of multiple complex levels including the physical ...
Systems are composed of multiple complex levels including the physical infrastructure, personnel or �humans-in-the-loop�, administration policies and procedures, computers, networks, and the communication protocols for connectivity that tie the system int
-
HD
Qihua Wang, "Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies"
A high-level security policy states an overall requirement for a ...
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensitive task to be performed by a team of at least k users. It states a high-le
-
HD
Nitin Khanna, "Forensics Characterization of Printers and Image Capture devices"
The falling cost and wide availability of electronic devices have ...
The falling cost and wide availability of electronic devices have led to their widespread use by individuals, corporations, and governments. These devices, such as computers, cell phones, digital cameras, and printers, all contain various sensors which ge