CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Richard Stotts, Jerome Webb & Matthew Beebe, "Richard Stotts, Jerome Webb & Matthew Beebe"
-
HD
John Richardson, "Evolving the Internet"
What's wrong with today's Internet? If TCP/IP has won, what's ...
What's wrong with today's Internet? If TCP/IP has won, what's left to be done? In truth, we've only just begun ... to understand the how the Internet is evolving, the impact of our staggering demand for information, and how a whole set revolutionary techn
-
HD
Eugene Spafford, "The Challenge of Secure Software"
Despite decades of advances in computer science and software engineering, ...
Despite decades of advances in computer science and software engineering, our computing systems seem to be less and less trustworthy. Each week seems to bring new stories of computer viruses, invasions of privacy, serious bugs in common software platforms
-
HD
Jens Palsberg, "Static Checking of Interrupt-Driven Software"
Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm ...
Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm pilots, and digital thermostats. It can be difficult to fit required functionality into such a device without sacrificing the simplicity and clarity of the software.
-
HD
Pascal Meunier, "The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events"
Information about the incidence of security breaches is difficult to ...
Information about the incidence of security breaches is difficult to obtain. Emergency situations are not favorable to the maintenance of records, the security breaches are embarrassing and possibly damaging, and disclosing information about the incidents
-
HD
John Steven Reel, "The Future of Information Security Technologies"
Information security, and the technologies that provide such security, are ...
Information security, and the technologies that provide such security, are a very hot topic throughout the information technology and business communities today. This presentation opens with a consideration of the current network environment. It answers t
-
HD
Rick Davis, "The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance"
In order for e-commerce and e-business to grow at the ...
In order for e-commerce and e-business to grow at the fullest extent possible, higher levels of trust and accountability need to become established. The corporate buyers who rely on reliable structures need to hold those who build and support commercial n
-
HD
Michael G. Fleming & Victor Maconachy, "Information Assurance Challenges for the 21st Century"
In today's increasingly dependent and interdependent global information society, information ...
In today's increasingly dependent and interdependent global information society, information assurance for systems is gaining tremendous importance. Individuals, governments, and societies are insisting on secure and safe communications environments. The
-
HD
Terran Lane, "Machine Learning Techniques for Anomaly Detection in Computer Security"
With the recent phenomenal growth of the availability and connectivity ...
With the recent phenomenal growth of the availability and connectivity of computing resources and the advent of e-commerce, more valuable and private data is being stored online than ever before. But with greater value and availability comes greater threa
-
HD
Padgett Peterson, "Implications of Mobile Code on Microsoft Platforms"
With the advent of mobile code (excutable programs that are ...
With the advent of mobile code (excutable programs that are carried on web pages and inside E-Mail) in everyday use, the capability to include malicious software without the recipient's knowlege has been implicit. From the first crude examples ("Concept",