Display Shows:

My Language:

CERIAS Security Seminar Series

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, ...

The CERIAS weekly security seminar has been held every semester since spring of 1992. We invite personnel at Purdue and visitors from outside to present on topics of particular interest to them in the areas of computer and network security, computer crime investigation, information warfare, information ethics, public policy for computing and security, the computing "underground," and other related topics.

Show all Visit Show Website http://www.cerias.purdue.edu/sec...

Recently Aired


  • HD

    Richard Stotts, Jerome Webb & Matthew Beebe, "Richard Stotts, Jerome Webb & Matthew Beebe"

    Oct 4, 2000 Read more
  • HD

    John Richardson, "Evolving the Internet"

    What's wrong with today's Internet? If TCP/IP has won, what's ...

    What's wrong with today's Internet? If TCP/IP has won, what's left to be done? In truth, we've only just begun ... to understand the how the Internet is evolving, the impact of our staggering demand for information, and how a whole set revolutionary techn

    Sep 20, 2000 Read more
  • HD

    Eugene Spafford, "The Challenge of Secure Software"

    Despite decades of advances in computer science and software engineering, ...

    Despite decades of advances in computer science and software engineering, our computing systems seem to be less and less trustworthy. Each week seems to bring new stories of computer viruses, invasions of privacy, serious bugs in common software platforms

    Sep 13, 2000 Read more
  • HD

    Jens Palsberg, "Static Checking of Interrupt-Driven Software"

    Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm ...

    Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm pilots, and digital thermostats. It can be difficult to fit required functionality into such a device without sacrificing the simplicity and clarity of the software.

    Sep 6, 2000 Read more
  • HD

    Pascal Meunier, "The IRDB Project: An Incident Response Database For Gathering Cost And Incidence Information On Types of Security Events"

    Information about the incidence of security breaches is difficult to ...

    Information about the incidence of security breaches is difficult to obtain. Emergency situations are not favorable to the maintenance of records, the security breaches are embarrassing and possibly damaging, and disclosing information about the incidents

    Aug 30, 2000 Read more
  • HD

    John Steven Reel, "The Future of Information Security Technologies"

    Information security, and the technologies that provide such security, are ...

    Information security, and the technologies that provide such security, are a very hot topic throughout the information technology and business communities today. This presentation opens with a consideration of the current network environment. It answers t

    Aug 23, 2000 Read more
  • HD

    Rick Davis, "The Holy Grail of E-Business Risk Management: Creating and Sustaining the Insurable Standard for E-Business Security and Assurance"

    In order for e-commerce and e-business to grow at the ...

    In order for e-commerce and e-business to grow at the fullest extent possible, higher levels of trust and accountability need to become established. The corporate buyers who rely on reliable structures need to hold those who build and support commercial n

    Apr 28, 2000 Read more
  • HD

    Michael G. Fleming & Victor Maconachy, "Information Assurance Challenges for the 21st Century"

    In today's increasingly dependent and interdependent global information society, information ...

    In today's increasingly dependent and interdependent global information society, information assurance for systems is gaining tremendous importance. Individuals, governments, and societies are insisting on secure and safe communications environments. The

    Apr 21, 2000 Read more
  • HD

    Terran Lane, "Machine Learning Techniques for Anomaly Detection in Computer Security"

    With the recent phenomenal growth of the availability and connectivity ...

    With the recent phenomenal growth of the availability and connectivity of computing resources and the advent of e-commerce, more valuable and private data is being stored online than ever before. But with greater value and availability comes greater threa

    Apr 7, 2000 Read more
  • HD

    Padgett Peterson, "Implications of Mobile Code on Microsoft Platforms"

    With the advent of mobile code (excutable programs that are ...

    With the advent of mobile code (excutable programs that are carried on web pages and inside E-Mail) in everyday use, the capability to include malicious software without the recipient's knowlege has been implicit. From the first crude examples ("Concept",

    Mar 31, 2000 Read more
Loading...