CERIAS Security Seminar Series
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...
The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.
Show all Visit Show Website http://www.cerias.purdue.edu/sec...Recently Aired
-
HD
Judy Hochberg, "Automatic identification of classified documents"
How can one automatically identify classified documents? This is a ...
How can one automatically identify classified documents? This is a vital question for the Department of Energy (DOE), which is reviewing millions of classified documents for possible declassification, and for Los Alamos National Laboratory (LANL), which i
-
HD
Clay Shields, "Tracing Denial-of-Service Attacks; or why we may never know who attacked Yahoo et. al."
The recent spate of attacks against Yahoo and other sites ...
The recent spate of attacks against Yahoo and other sites with large on-line presences brought denial-of-service attacks into the public consciousness. The methods used in these attacks make it very difficult, if not impossible, to locate the source of th
-
HD
Gerald Thomas, "Commercial High-Resolution Satellite Imagery Polic"
In October of 1999, Denver based Space Imaging launched the ...
In October of 1999, Denver based Space Imaging launched the world's first very-high resolution commercial satellite, IKONOS 2, into polar orbit around the earth. For the first time in history, sub-1 meter near real time digital imagery is now available fo
-
HD
Victor Raskin, "NLP for IAS: Overview and Implementations"
This paper explores a promising interface between natural language processing ...
This paper explores a promising interface between natural language processing (NLP) and information assurance and security (IAS). More specifically, it is devoted to possible applications of the accumulated considerable resources in NLP to IAS. The paper
-
HD
Gene Kim, "Open Source Issues and Opportunities for Tripwire"
Tripwire has a long history of openly available source, having ...
Tripwire has a long history of openly available source, having been created at Purdue University in 1992 as a publicly available security tool. It has been created into an industrial strength tool, and has been successful in protecting critical enterprise
-
HD
Wenliang Du & Mahesh Tripunitara, "Security Relevancy Analysis on the Registry of Windows NT 4.0 (for Wenliang Du)"
Many security breaches are caused by inappropriate inputs crafted by ...
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inputs are filtered out by the program, or to ensure that only trusted people c
-
HD
Mahesh Tripunitara, "Thwarting Denial of Service Attacks against Communication Protocols with Backward Compatible Changes: A Case Study"
We will discuss a novel approach to building safeguards against ...
We will discuss a novel approach to building safeguards against denial of service attacks against communication protocols. Our approach involves changes to the relevant communication protocol subject to the following constraint: the protocol that results
-
HD
Michael Santarcangelo, "eInfrastructure Security"
This presentation will teach participants how to develop secure infrastructures ...
This presentation will teach participants how to develop secure infrastructures in eCommerce by discussing security impacts to business applications, Netcentric security elements, and real stories from client experience. The presentation includes a thorou
-
HD
James R. C. Hansen, "Computer Forensics Examinations in the Consulting Arena"
As use of information technology continues to expand, the need ...
As use of information technology continues to expand, the need to identify and preserve electronic evidence becomes a paramount. Once strictly the domain of law enforcement agencies, computer forensic examination has become a common part of litigation. Mr
-
HD
David Aucsmith, "Balancing Big Brother"
This talk addresses the issue of reconciling the needs of ...
This talk addresses the issue of reconciling the needs of law enforcement and national security with the continuing evolution of computer and communications technology. It will describe the needs of both the law enforcement and national security communiti