/
|
CERIAS logo.jpg
|
5.1 KB
|
CERIAS thank you.txt
|
0.8 KB
|
/CERIAS 1999/
|
Architectures and Components for High-Assurance Security.mp4
|
51.4 MB
|
Balancing Big Brother.mp4
|
98.3 MB
|
KHIP - A Scalable Protocol for Secure Multicast Routing.mp4
|
45.6 MB
|
/CERIAS 2000/
|
Automatic identification of classified documents.mp4
|
60.1 MB
|
Commercial High-Resolution Satellite Imagery Polic.mp4
|
49.7 MB
|
Developing Data Mining Techniques for Intrusion Detection - A Progress Report.mp4
|
57.0 MB
|
Evolving the Internet.mp4
|
59.7 MB
|
Implications of Mobile Code on Microsoft Platforms.mp4
|
62.8 MB
|
Information Assurance Challenges for the 21st Century.mp4
|
44.5 MB
|
Investigating Computer Security Incidents.mp4
|
59.4 MB
|
Machine Learning Techniques for Anomaly Detection in Computer Security.mp4
|
56.9 MB
|
NLP for IAS - Overview and Implementations.mp4
|
49.6 MB
|
Open Source Issues and Opportunities for Tripwire.mp4
|
56.0 MB
|
Richard Stotts, Jerome Webb &amp Matthew Beebe.mp4
|
57.2 MB
|
Static Checking of Interrupt-Driven Software.mp4
|
53.5 MB
|
The Challenge of Secure Software.mp4
|
63.1 MB
|
The Future of Information Security Technologies.mp4
|
43.3 MB
|
The Holy Grail of E-Business Risk Management - Creating and Sustaining the Ins..mp4
|
67.0 MB
|
The IRDB Project - An Incident Response Database For Gathering Cost And Incide..mp4
|
53.5 MB
|
Tracing Denial-of-Service Attacks or why we may never know who attacked Yaho..mp4
|
57.3 MB
|
/CERIAS 2004/
|
Administrative Scope and Role-Based Administration - CERIAS Security Seminar.mp4
|
48.2 MB
|
An Anonymous Fair-Exchange E-Commerce Protocol.mp4
|
37.6 MB
|
Attribute-Based Access Control.mp4
|
49.1 MB
|
GTRBAC - A Generalized Temporal Role Based Access Control Model.mp4
|
46.1 MB
|
Information Flow Analysis in Security Enhanced Linux - CERIAS Security Seminar.mp4
|
54.8 MB
|
Robustness testing - black-box testing for software security - CERIAS Security Seminar.mp4
|
49.3 MB
|
Secure Information Sharing within a Collaborative Environment - CERIAS Security Seminar.mp4
|
52.1 MB
|
Towards Mining Syslog Data - Abe Singer - CERIAS Security Seminar.mp4
|
43.2 MB
|
Using Statistical Analysis to Locate Spam Web Pages.mp4
|
35.8 MB
|
/CERIAS 2005/
|
A Demonstration in the Need for a Layered Security Model.mp4
|
59.8 MB
|
A Framework for Identifying Compromised Nodes in Sensor Networks.mp4
|
46.3 MB
|
An Introduction to Biometric Technologies - Stephen Elliott.mp4
|
49.0 MB
|
Architectural Considerations for Anomaly Detection.mp4
|
36.2 MB
|
CERIAS - Defining a Digital Forensic Investigation.mp4
|
44.1 MB
|
Clouseau - A practical IP spoofing defense through route-based filtering.mp4
|
48.3 MB
|
Dr. Kate Cherry and Dr. Wendy Hamilton - CERIAS Security Seminar.mp4
|
52.8 MB
|
Hidden Access Control Policies with Hidden Credentials.mp4
|
44.7 MB
|
Knowing Where, When and What Hazards Occur.mp4
|
55.6 MB
|
Minimizing Trust Liabilities in Secure Group Messaging Infrastructures.mp4
|
34.5 MB
|
Obfuscated Databases - Definitions and Constructions.mp4
|
49.4 MB
|
Perturbation of Multivariable Public-key Cryptosystems.mp4
|
35.2 MB
|
Privacy and anonymity in Trust Negotiations.mp4
|
45.2 MB
|
Privacy-preserving Policy-driven Access Control with Mixed Credentials.mp4
|
40.7 MB
|
Real World Web Application Security.mp4
|
44.3 MB
|
Secret Handshakes.mp4
|
50.2 MB
|
Securing the Internet s Domain Name System.mp4
|
41.1 MB
|
Survivable routing in wireless ad hoc networks.mp4
|
50.1 MB
|
Toward Self-healing Software.mp4
|
49.8 MB
|
Traust and PeerTrust2 - Applying Trust Negotiation to Real Systems.mp4
|
51.1 MB
|
Using process labels to obtain forensic and traceback information.mp4
|
45.9 MB
|
Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks.mp4
|
47.1 MB
|
Watermarking Relational Databases.mp4
|
40.6 MB
|
Where s the FEEB Effectiveness of Instruction Set Randomization.mp4
|
47.4 MB
|
/CERIAS 2006/
|
A Multi-layered Approach to Web Application Defense.mp4
|
45.8 MB
|
A Policy Engineering Framework for Federated Access Management.mp4
|
47.1 MB
|
Beyond Separation of Duty - An Algebra for Specifying High-level Security Poli..mp4
|
39.4 MB
|
Categories of Digital Forensic Investigation Techniques.mp4
|
51.4 MB
|
Chaos, Complexity, Cybernetics and Therminator.mp4
|
49.7 MB
|
Cross-Drive Forensic Analysis.mp4
|
37.0 MB
|
Developing an Operational Framework for Integrated System Security.mp4
|
51.5 MB
|
Digital Identity Management and Theft Protection.mp4
|
44.7 MB
|
Dynamic and Efficient Key Management for Access Hierarchies.mp4
|
36.1 MB
|
Forensics Characterization of Printers and Image Capture devices.mp4
|
41.9 MB
|
Identity Management Strategies and Integration Perspectives.mp4
|
66.9 MB
|
Invasive Browser Sniffing and Countermeasures.mp4
|
41.1 MB
|
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstru..mp4
|
39.5 MB
|
Net Trust - Identification Through Social Context.mp4
|
50.7 MB
|
Network Security Begins at Home - Changing Consumer Behavior for i-Safety.mp4
|
62.8 MB
|
On the Evolution of Adversary Models for Security Protocols - from the Beginn..mp4
|
52.7 MB
|
One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back - A Ten ..mp4
|
58.5 MB
|
OS-Level Taint Analysis for Malware Investigation and Defense.mp4
|
57.1 MB
|
Prioritizing Processes and Controls for Effective and Measurable Security.mp4
|
54.2 MB
|
Privacy Policies in Web-based Healthcare.mp4
|
44.2 MB
|
Provable security in mobile ad hoc networks.mp4
|
53.6 MB
|
Real-Time Visualization of Network Attacks on High-Speed Links.mp4
|
58.8 MB
|
Recent Attacks on MD5.mp4
|
53.0 MB
|
Semantic Attacks and Security.mp4
|
51.1 MB
|
Spoofing-resistant Packet Routing for the Internet.mp4
|
55.8 MB
|
The Psychology of Computer Deviance - How it can assist in digital evidence a..mp4
|
56.0 MB
|
The Secure Information Sharing Problem and Solution Approaches.mp4
|
60.0 MB
|
Toward Autonomic Security Policy Management.mp4
|
34.0 MB
|
Verification of Integrity for Outsourced Content Publishing and Database Quer..mp4
|
53.1 MB
|
/CERIAS 2007/
|
A quant looks at the future.mp4
|
60.2 MB
|
Applying Recreational Mathematics to Secure Multiparty Computation.mp4
|
45.5 MB
|
Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrust..mp4
|
62.4 MB
|
Automatic Debugging and Verification of RTL-Specified Real-Time Systems via I..mp4
|
49.8 MB
|
CANDID - Preventing SQL Injection Attacks using Dynamic Candidate Evaluations.mp4
|
38.7 MB
|
Computer-Related Incidents - Factors Related to Cause and Prevention.mp4
|
52.2 MB
|
Cyber Security and the - NEW - world enterprise.mp4
|
51.2 MB
|
Dumb Ideas in Computer Security.mp4
|
50.0 MB
|
From Securing Navigation Systems to Securing Wireless Communication.mp4
|
47.4 MB
|
Hiding the Message Behind the Words - Advances in Natural Language Watermarkin..mp4
|
33.5 MB
|
Intrusion Detection Event Correlation - Approaches, Benefits and Pitfalls.mp4
|
51.4 MB
|
Mathematically Defining Privacy.mp4
|
49.4 MB
|
Passwords Decay, Words Endure - Towards Secure and Re-usable Multiple Password..mp4
|
62.5 MB
|
Protecting Data Privacy - A Practical Guide to Managing Risk.mp4
|
33.3 MB
|
Protocols and Systems for Privacy Preserving Protection of Digital Identity.mp4
|
46.9 MB
|
Research Challenges in Assured Information Sharing.mp4
|
42.6 MB
|
Role Discovery.mp4
|
44.9 MB
|
Scenario-Driven Construction of Enterprise Information Policy.mp4
|
57.6 MB
|
Secure Virtualization.mp4
|
57.4 MB
|
Security issues within embedded software development.mp4
|
44.3 MB
|
Security, Soft Boundaries, and oh-so-subtle Strategies How to Play Chess Whil..mp4
|
58.7 MB
|
The Effect of Rootkits on the Corporate Environment.mp4
|
37.0 MB
|
Towards Effective and Efficient Behavior-based Trust Models.mp4
|
47.5 MB
|
What Every Engineer Needs To Know About Security And Where To Learn It.mp4
|
48.2 MB
|
WHAT IS INFORMATION.mp4
|
55.9 MB
|
Wireless Router Insecurity - The Next Crimeware Epidemic.mp4
|
48.4 MB
|
/CERIAS 2008/
|
Access Control and Resiliency for WS-BPEL.mp4
|
27.9 MB
|
Automatic Signature Generation for Unknown Vulnerabilities.mp4
|
43.8 MB
|
Beyond the Enclave - Evolving Concepts in Security Architectures.mp4
|
48.3 MB
|
Electronic Voting - Danger and Opportunity.mp4
|
48.7 MB
|
Exploitable Redirects on the Web - Identification, Prevalence, and Defense.mp4
|
50.7 MB
|
Exploiting Opportunistic Scheduling in Cellular Data Networks.mp4
|
41.2 MB
|
Extending anonymity research to high-tech white collar crimes and IT Insider ..mp4
|
42.6 MB
|
Fingerprint Sensor Interoperability - Analysis of Error Rates for Fingerprint ..mp4
|
49.2 MB
|
Hacking the Mobile Workforce.mp4
|
44.8 MB
|
John Oritz, SRA International.mp4
|
61.7 MB
|
Managing Security Polarities.mp4
|
53.0 MB
|
Measuring the Attack Surfaces of Enterprise Software Systems.mp4
|
47.0 MB
|
Private Queries in Location Based Services - Anonymizers are not Necessary.mp4
|
41.0 MB
|
Reading the Disclosures with New Eyes - Bridging the Gap between Information S..mp4
|
40.7 MB
|
Resilient Systems for Mission Assurance.mp4
|
33.6 MB
|
Responding to Anomalous Database Requests.mp4
|
29.1 MB
|
Security in a Changing World.mp4
|
50.3 MB
|
Shifting focus - Aligning security with risk management.mp4
|
53.7 MB
|
Signature Analysis Coupled With Slicing Analysis for the Validation of Softwa..mp4
|
23.6 MB
|
Static source code analysis.mp4
|
47.0 MB
|
The - merge - of Anti-Tamper and Information Assurance - lessons lear..mp4
|
53.5 MB
|
The Role Graph Model and its Extensions.mp4
|
43.4 MB
|
Tor - Anonymous communications for government agencies, corporations, journali..mp4
|
62.6 MB
|
Towards Event Source Location Privacy in Wireless Sensor Networks.mp4
|
48.3 MB
|
Trends in Identity Management.mp4
|
52.0 MB
|
Virtualization - Resource Coupling and Security across the Stack.mp4
|
43.4 MB
|
What are CSO s thinking about Top information security initiatives for 2008 ..mp4
|
44.6 MB
|
/CERIAS 2009/
|
A Rules Based Statistical Algorithm for Keystroke Detection.mp4
|
45.5 MB
|
Access Control and Resiliency for WS-BPEL.mp4
|
27.9 MB
|
An Alternate Memory Architecture for Code Injection Prevention.mp4
|
37.7 MB
|
An Analysis of Data Breach Disclosure.mp4
|
51.0 MB
|
Cyber Security Trends and Disruptors.mp4
|
47.5 MB
|
Database Assurance - Anomaly Detection for Relational Databases.mp4
|
43.7 MB
|
Fake Picassos, Tampered History, and Digital Forgery - Protecting the Genealog..mp4
|
46.5 MB
|
From Security Architecture to Implementation.mp4
|
36.5 MB
|
Human Factors Approaches to Preserving Privacy.mp4
|
49.3 MB
|
Information Security Management and IT Executives in a Top Management Team.mp4
|
43.1 MB
|
Mace - Systems and Language Support for Building Correct, High-Performance Net..mp4
|
48.1 MB
|
Measuring Privacy - A Risk-Based Approach.mp4
|
44.5 MB
|
Multi-Policy Access Control for Healthcare using Policy Machine.mp4
|
24.3 MB
|
PlugNPlay Trust for Embedded Communication Systems.mp4
|
52.4 MB
|
Privacy from accessing databases to location based services.mp4
|
45.2 MB
|
Providing Privacy through Plausibly Deniable Search.mp4
|
38.4 MB
|
Quantitative Risk Assessment of Software Security and Privacy, and Risk Manag..mp4
|
51.1 MB
|
Rick Clark, Ontario Systems.mp4
|
49.3 MB
|
Safely Analyzing Sensitive Network Data.mp4
|
51.2 MB
|
Security for the Next Internet over Heterogeneous Environments.mp4
|
49.1 MB
|
Security in Infrastructureless and Decentralized Communication Networks - Pos..mp4
|
38.1 MB
|
Software Assurance - Motivation, Background, and Acquisition Pursuits.mp4
|
50.9 MB
|
Some Thoughts on the Pervasive Trust Foundation for the Future Internet Archi..mp4
|
43.1 MB
|
Sphinx - A Compact and Provably Secure Mix Format.mp4
|
49.0 MB
|
Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber S..mp4
|
54.4 MB
|
The Best Defense is Information.mp4
|
42.5 MB
|
The Building Security In Maturity Model (BSIMM).mp4
|
46.7 MB
|
The dark side of software engineering and how to defend against it.mp4
|
44.4 MB
|
The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb..mp4
|
50.5 MB
|
USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYST..mp4
|
49.8 MB
|
/CERIAS 2010/
|
60 years of scientific research in cryptography - a reflection.mp4
|
68.1 MB
|
A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems.mp4
|
45.1 MB
|
Applications of Biometric Technologies.mp4
|
42.6 MB
|
Assured Processing through Obfuscation.mp4
|
55.4 MB
|
Data in the Cloud - Authentication Without Leaking.mp4
|
53.9 MB
|
Detecting Coordinated Attacks with Traffic Analysis.mp4
|
58.7 MB
|
Detecting Insider Theft of Trade Secrets.mp4
|
44.9 MB
|
Detection and protection from denial of service attacks in grids by accountab..mp4
|
47.2 MB
|
Dissecting Digital Data - Context and Meaning through Analytics.mp4
|
50.6 MB
|
Everything I Needed to Know about Security, I Learned in 1974.mp4
|
53.1 MB
|
Fast Regular Expression Matching using Small TCAMs for Network Intrusion Dete..mp4
|
57.2 MB
|
Global Study of Web 2.0 Use in Organizations.mp4
|
50.9 MB
|
Making of the CWE Top-25, 2010 Edition.mp4
|
47.9 MB
|
Nudging the Digital Pirate - Behavioral Issues in the Piracy Context.mp4
|
50.6 MB
|
Ontological Semantic Technology for Detecting Insider Threat and Socia..mp4
|
50.8 MB
|
Provenance-based Data Trustworthiness Assessment in Data Streams.mp4
|
38.3 MB
|
Ribbons, A Partially-Shared Memory Programming Model.mp4
|
42.9 MB
|
Rootkits.mp4
|
63.9 MB
|
Secure Network Coding for Wireless Mesh Networks.mp4
|
53.7 MB
|
Security Applications for Physically Unclonable Functions.mp4
|
55.2 MB
|
Security of JavaScript in a Browser Environment.mp4
|
49.6 MB
|
Security of Mobile Ad Hoc Networks (MANETs).mp4
|
55.3 MB
|
Side Channel Threats in the Software-as-a-Service Era - Challenges and Respons..mp4
|
64.0 MB
|
Tackling System-Wide Integrity.mp4
|
63.9 MB
|
The role of automata theory in software verification.mp4
|
60.4 MB
|
The role of System Security Engineering in the engineering lifecycle.mp4
|
62.1 MB
|
Thinking Outside the Box.mp4
|
42.0 MB
|
Trust and Protection in the Illinois Browser Operating System.mp4
|
52.5 MB
|
/CERIAS 2011/
|
A couple of results about JavaScript.mp4
|
38.2 MB
|
Detecting Bots in Online Games using Human Observational Proofs.mp4
|
51.4 MB
|
Enterprise-Wide Intrusions Involving Advanced Threats.mp4
|
61.9 MB
|
Exploiting Banners for Fun and Profits.mp4
|
53.6 MB
|
FuzzyFusion(tm), an application architecture for multisource informati..mp4
|
44.3 MB
|
Jam me if you can - Mitigating the Impact of Inside Jammers.mp4
|
58.9 MB
|
Methods and Techniques for Protecting Data in Real Time on the Wire.mp4
|
54.1 MB
|
Mobile Phones and Evidence Preservation.mp4
|
52.5 MB
|
Modeling DNS Security - Misconfiguration, Availability, and Visualizatio..mp4
|
51.5 MB
|
Non-homogeneous anonymizations.mp4
|
55.3 MB
|
Ontological Semantic Technology Goes Phishing.mp4
|
54.7 MB
|
Process Implanting - A New Active Introspection Framework for Virtualization.mp4
|
26.4 MB
|
Provisioning Protocol Challenges in an Era of gTLD Expansion.mp4
|
61.5 MB
|
Retrofitting Legacy Code for Security.mp4
|
47.0 MB
|
Risk Perception and Trust in Cloud.mp4
|
35.5 MB
|
Securing Application-Level Topology Estimation Networks - Facing the Frog-Boil..mp4
|
27.4 MB
|
Semantic Security - or How I Learned to Stop Worrying and Looooooove the..mp4
|
61.2 MB
|
Society, Law Enforcement and the Internet - Models for Give and Take.mp4
|
77.7 MB
|
Soundcomber - A Stealthy and Context-Aware Sound Trojan for Smartphones.mp4
|
60.2 MB
|
SureView AMP, Active Malware Protection, detecting malware anti virus solutio..mp4
|
44.6 MB
|
Trusted Computing and Security for Embedded Systems.mp4
|
52.1 MB
|
Understanding insiders - An analysis of risk-taking behavior.mp4
|
45.2 MB
|
User and Machine Authentication and Authorization Infrastructure for Distrib..mp4
|
57.6 MB
|
Weighted Multiple Secret Sharing.mp4
|
53.0 MB
|
What does Knowledge Discovery, Predictability, and Human Behavior have to do ..mp4
|
48.7 MB
|
Wireless Technologies and how it relates to cyber security research.mp4
|
59.5 MB
|
/CERIAS 2012/
|
A Flexible System for Access Control.mp4
|
44.0 MB
|
A New Class of Buffer Overflow Attacks.mp4
|
48.1 MB
|
Adding a Software Assurance Dimension to Supply Chain Practices.mp4
|
42.0 MB
|
Challenges for R&D in the Security Field.mp4
|
52.2 MB
|
Cryptographic protocols in the era of cloud computing.mp4
|
45.8 MB
|
Defending Users Against Smartphone Apps - Techniques and Future Directions.mp4
|
47.3 MB
|
Detecting Maliciousness Using Periodic Mobile Forensics.mp4
|
46.0 MB
|
Digital Citizenship - A Target s View of Security and Life Online.mp4
|
45.7 MB
|
Firmware Risks - The Next Frontier - Steve Battista, MITRE.mp4
|
34.3 MB
|
Forensic Carving of Network Packets with bulk_extractor and tcpflow.mp4
|
40.4 MB
|
Global Revocation for the Intersection Collision Warning Safety Application.mp4
|
40.9 MB
|
Introduction to Biometrics.mp4
|
45.6 MB
|
Is it time to add Trust to the Future Internet Web.mp4
|
50.8 MB
|
K-Anonymity in Social Networks - A Clustering Approach - CERIAS Security Seminar.mp4
|
44.2 MB
|
Leveraging internal network traffic to detect malicious activity - Lessons lea..mp4
|
39.5 MB
|
Not the Who but the What - New applications of Hardware Identity.mp4
|
33.0 MB
|
Privacy preserving attribute based group key management.mp4
|
37.1 MB
|
Privacy-Preserving Assessment of Location Data Trustworthiness.mp4
|
35.5 MB
|
Publishing Microdata with a Robust Privacy Guarantee.mp4
|
40.7 MB
|
Risk perception of information security risks online.mp4
|
47.8 MB
|
Secure Provenance Transmission for Data Streams.mp4
|
36.8 MB
|
The Boeing Company.mp4
|
49.8 MB
|
The Inertia of Productivity.mp4
|
49.0 MB
|
The new frontier, welcome the Cloud Brokers.mp4
|
49.0 MB
|
Trends in cyber security consulting.mp4
|
45.5 MB
|
Understanding Spam Economics.mp4
|
45.7 MB
|
Vulnerability Path and Assessment.mp4
|
45.4 MB
|
You are Anonymous Then you must be Lucky.mp4
|
43.5 MB
|
/CERIAS 2013/
|
A Semantic Baseline for Spam Filtering.mp4
|
44.1 MB
|
Active Cyber Network Defense with Denial and Deception.mp4
|
44.8 MB
|
BIOS Chronomancy - Using Timing-Based Attestation to Detect Firmware Rootkits.mp4
|
39.5 MB
|
Differentially Private Publishing of Geospatial Data.mp4
|
44.9 MB
|
Economic Policy and Cyber Challenges in Estonia.mp4
|
49.1 MB
|
Facebook - Protecting a billion identities without losing (much) sleep.mp4
|
42.0 MB
|
GPRI Global Connections Lecture Series - Mr. Norman R. Augustine.mp4
|
71.9 MB
|
I m not stealing, I m merely borrowing - Plagiarism in Smartphone App Markets.mp4
|
41.7 MB
|
Identity-Based Internet Protocol Network.mp4
|
23.7 MB
|
Information Security Challenges in an Academic Environment.mp4
|
34.6 MB
|
Membership Privacy - A Unifying Framework For Privacy Definitions.mp4
|
42.9 MB
|
Minimizing Private Data Disclosures in the Smart Grid.mp4
|
34.0 MB
|
New possibilities of steganography based on Kuznetsov-Tsybakov problem.mp4
|
38.1 MB
|
Regulatory Compliance Software Engineering.mp4
|
38.6 MB
|
Systems of Systems - Opportunities and Challenges.mp4
|
44.6 MB
|
The Durkheim Project - Privacy Considerations in Predicting Military and Vete..mp4
|
38.3 MB
|
Towards Automated Problem Inference from Trouble Tickets.mp4
|
39.9 MB
|
Trust Management for Publishing Graph Data.mp4
|
47.4 MB
|
Using Probabilistic Generative Models for Ranking Risks of Android Apps.mp4
|
34.6 MB
|
Whole Genome Sequencing - Innovation Dream or Privacy Nightmare.mp4
|
46.8 MB
|
Yahoo Messenger Forensics on Windows Vista and Windows 7.mp4
|
26.4 MB
|
/CERIAS 2014/
|
Awards - Purdue University.mp4
|
12.1 MB
|
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp..mp4
|
33.1 MB
|
Delivering - Always-on - Services Despite Flaky Network Infrastructur..mp4
|
38.0 MB
|
DSCRETE - Automatic Rendering of Forensic Information from Memory Images via A..mp4
|
16.1 MB
|
Fireside Chat.mp4
|
58.2 MB
|
General-Purpose Secure Computation and Outsourcing.mp4
|
44.9 MB
|
Integrity Levels - A New Paradigm for Protecting Computing Systems.mp4
|
41.7 MB
|
Keynote Day 2.mp4
|
62.8 MB
|
Machine Intelligence for Biometric and On-Line Security.mp4
|
46.2 MB
|
Online Privacy Agreements, is it Informed Consent.mp4
|
46.0 MB
|
Opening Keynote.mp4
|
51.1 MB
|
Panel 1.mp4
|
50.6 MB
|
Panel 2.mp4
|
69.8 MB
|
Poster Contest Winners.mp4
|
32.9 MB
|
Secure and Private Outsourcing to Untrusted Cloud Servers.mp4
|
44.4 MB
|
Security Plus (not Versus) Privacy.mp4
|
79.3 MB
|
Technical Tradeoffs in the NSA s Mass Phone Call Program.mp4
|
42.5 MB
|
Why so CERIAS Why we re losing and what to do about it.mp4
|
76.4 MB
|
/CERIAS 2015/
|
Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.en.srt
|
85.9 KB
|
Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.mp4
|
37.4 MB
|
Breaking Mobile Social Networks for Automated User Location Tracking.en.srt
|
64.4 KB
|
Breaking Mobile Social Networks for Automated User Location Tracking.mp4
|
30.2 MB
|
Code-Pointer Integrity.en.srt
|
67.7 KB
|
Code-Pointer Integrity.mp4
|
28.9 MB
|
Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.en.srt
|
41.0 KB
|
Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.mp4
|
23.5 MB
|
Evaluation of Urban Vehicle Tracking Algorithms.en.srt
|
64.0 KB
|
Evaluation of Urban Vehicle Tracking Algorithms.mp4
|
30.8 MB
|
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.en.srt
|
89.0 KB
|
Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.mp4
|
43.5 MB
|
Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.en.srt
|
103.1 KB
|
Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.mp4
|
60.3 MB
|
Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.en.srt
|
101.0 KB
|
Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.mp4
|
53.5 MB
|
Learning from Information Security Maturity A Textual Analysis.en.srt
|
81.0 KB
|
Learning from Information Security Maturity A Textual Analysis.mp4
|
44.8 MB
|
Microsemi Security Solutions and Threat Driven Security.mp4
|
47.8 MB
|
Preventing or Penalizing Equivocation in Decentralized Environments.mp4
|
40.4 MB
|
Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.en.srt
|
73.3 KB
|
Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.mp4
|
47.3 MB
|
Privacy Notions for Data Publishing and Analysis.mp4
|
48.3 MB
|
Privacy Potpourri Changing Privacy from the Bottom Up.en.srt
|
96.8 KB
|
Privacy Potpourri Changing Privacy from the Bottom Up.mp4
|
50.5 MB
|
Regulatory Compliance Checking Over Encrypted Audit Logs.en(transcribed).srt
|
77.1 KB
|
Regulatory Compliance Checking Over Encrypted Audit Logs.mp4
|
40.1 MB
|
Samuel Jero - Purdue University.en.srt
|
69.4 KB
|
Samuel Jero - Purdue University.mp4
|
36.2 MB
|
Security with Privacy - A Research Agenda.mp4
|
39.7 MB
|
Software updates decisions and security implications.en.srt
|
108.6 KB
|
Software updates decisions and security implications.mp4
|
50.5 MB
|
SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.en.srt
|
53.4 KB
|
SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.mp4
|
32.5 MB
|
Verification Techniques for Checking Compliance of Computer Systems and Protocols.mp4
|
40.9 MB
|
Verifying Computations with (Private) State.en.srt
|
89.3 KB
|
Verifying Computations with (Private) State.mp4
|
48.1 MB
|
Virtual Android Malware Detection and Analysis (VAMDA).en.srt
|
58.1 KB
|
Virtual Android Malware Detection and Analysis (VAMDA).mp4
|
24.8 MB
|
Yonghwi Kwon - Purdue University.en.srt
|
57.6 KB
|
Yonghwi Kwon - Purdue University.mp4
|
32.3 MB
|
/CERIAS 2016/
|
Annual Information Security Symposium Awards.en.srt
|
15.6 KB
|
Annual Information Security Symposium Awards.mp4
|
14.1 MB
|
Automatically Recovering Human-Understandable Evidence from Memory Images.en.srt
|
55.4 KB
|
Automatically Recovering Human-Understandable Evidence from Memory Images.mp4
|
43.8 MB
|
Batch Techniques for Practical Private Information Retrieval.en.srt
|
110.0 KB
|
Batch Techniques for Practical Private Information Retrieval.mp4
|
82.1 MB
|
Big Data Security and Privacy.mp4
|
67.8 MB
|
Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.en.srt
|
93.5 KB
|
Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.mp4
|
50.5 MB
|
CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.en.srt
|
55.8 KB
|
CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.mp4
|
46.3 MB
|
Context Aware, Policy based approaches to Security.en.srt
|
92.7 KB
|
Context Aware, Policy based approaches to Security.mp4
|
71.0 MB
|
Digital Identity Protection.en.srt
|
72.2 KB
|
Digital Identity Protection.mp4
|
44.0 MB
|
Enforcing Least Privilege Memory Views for Multithreaded Applications.en.srt
|
41.9 KB
|
Enforcing Least Privilege Memory Views for Multithreaded Applications.mp4
|
28.5 MB
|
ErsatzPasswords - Ending Password Cracking.en.srt
|
48.8 KB
|
ErsatzPasswords - Ending Password Cracking.mp4
|
31.6 MB
|
Finding Specification Noncompliance and Attacks in Wireless Network..en.srt
|
84.0 KB
|
Finding Specification Noncompliance and Attacks in Wireless Network..mp4
|
55.5 MB
|
General Motors Product Cybersecurity Overview.en.srt
|
71.6 KB
|
General Motors Product Cybersecurity Overview.mp4
|
62.7 MB
|
Growing Up In Cyber, But Is Cyber Growing Up.en.srt
|
121.5 KB
|
Growing Up In Cyber, But Is Cyber Growing Up.mp4
|
57.8 MB
|
IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.en.srt
|
43.1 KB
|
IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.mp4
|
33.2 MB
|
Improving Outcomes with Services.en.srt
|
67.4 KB
|
Improving Outcomes with Services.mp4
|
47.9 MB
|
IN-ISAC SOC, Security Awareness and More.mp4
|
75.3 MB
|
Information Security Through the Lens of Crisis Organizations.mp4
|
32.8 MB
|
Life as a Target.en.srt
|
87.1 KB
|
Life as a Target.mp4
|
75.2 MB
|
nesCheck Memory Safety for Embedded Devices.en.srt
|
58.4 KB
|
nesCheck Memory Safety for Embedded Devices.mp4
|
39.6 MB
|
New Research and Resources in NL IAS at Purdue.mp4
|
48.1 MB
|
Predicting What Users Will do Next.en.srt
|
61.0 KB
|
Predicting What Users Will do Next.mp4
|
45.8 MB
|
Privacy-preserving payments in credit networks.mp4
|
44.3 MB
|
Robust Secure Computation.mp4
|
46.4 MB
|
Secure Coding - Patterns and anti-patterns in the design and architecture of ..en.srt
|
89.6 KB
|
Secure Coding - Patterns and anti-patterns in the design and architecture of ..mp4
|
77.0 MB
|
The Application of Natural Language Processing to Open Source Intelligence fo..en.srt
|
60.8 KB
|
The Application of Natural Language Processing to Open Source Intelligence fo..mp4
|
35.5 MB
|
The Internet of Value Privacy and Applications.mp4
|
42.2 MB
|
The role of cyber insurance in security and risk management.en.srt
|
106.2 KB
|
The role of cyber insurance in security and risk management.mp4
|
64.9 MB
|
The Role of the NSA in the Development of DES.en.srt
|
94.9 KB
|
The Role of the NSA in the Development of DES.mp4
|
75.9 MB
|
Towards Safe In-memory Transactions.en.srt
|
101.9 KB
|
Towards Safe In-memory Transactions.mp4
|
42.1 MB
|
Usable and Secure Human Authentication.en.srt
|
91.9 KB
|
Usable and Secure Human Authentication.mp4
|
46.3 MB
|
Usable Secure Webmail for Grassroots Adoption.mp4
|
58.1 MB
|
Xukai Zou - Indiana University-Purdue University Indianapolis.mp4
|
72.5 MB
|
/CERIAS 2017/
|
A2C Self Destructing Exploit Executions via Input Perturbation.en.srt
|
69.8 KB
|
A2C Self Destructing Exploit Executions via Input Perturbation.mp4
|
33.5 MB
|
Behavioral and Computational Aspects of Network Security Games.en.srt
|
81.6 KB
|
Behavioral and Computational Aspects of Network Security Games.mp4
|
52.8 MB
|
Brig Gen. Greg Touhill, (USAF Ret.).en.srt
|
98.6 KB
|
Brig Gen. Greg Touhill, (USAF Ret.).mp4
|
58.0 MB
|
Changing the Economics of the Network.en.srt
|
69.8 KB
|
Changing the Economics of the Network.mp4
|
40.1 MB
|
CIO Risk Appetite and Information Security Management.en.srt
|
75.4 KB
|
CIO Risk Appetite and Information Security Management.mp4
|
38.2 MB
|
Cyber Security in Large Complex Corporations.en.srt
|
86.4 KB
|
Cyber Security in Large Complex Corporations.mp4
|
60.6 MB
|
DataShield Configurable Data Confidentiality and Integrity.en.srt
|
56.9 KB
|
DataShield Configurable Data Confidentiality and Integrity.mp4
|
28.7 MB
|
Day 2 Keynote - David Meltzer - Tripwire.en.srt
|
131.3 KB
|
Day 2 Keynote - David Meltzer - Tripwire.mp4
|
129.4 MB
|
Differential Guarantees for Cryptographic Systems.mp4
|
34.3 MB
|
Emerging Cyber Threats.mp4
|
58.9 MB
|
Enabling Trust and Efficiency in Provenance-Aware Systems.en.srt
|
105.6 KB
|
Enabling Trust and Efficiency in Provenance-Aware Systems.mp4
|
62.5 MB
|
Fireside Chat.en.srt
|
106.0 KB
|
Fireside Chat.mp4
|
115.0 MB
|
Information Flow Security in Practical Systems.mp4
|
42.6 MB
|
INSuRE Program Overview.en.srt
|
42.9 KB
|
INSuRE Program Overview.mp4
|
44.9 MB
|
Lok Yan.en.srt
|
46.6 KB
|
Lok Yan.mp4
|
64.8 MB
|
MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ..en.srt
|
68.3 KB
|
MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ..mp4
|
40.5 MB
|
Network Deception as a Threat Intelligence Platform.en.srt
|
105.9 KB
|
Network Deception as a Threat Intelligence Platform.mp4
|
48.9 MB
|
Panel 2 - Security Through Artificial Intelligence.mp4
|
99.1 MB
|
Panel 3 - Securing Vehicles & Machinery.en.srt
|
111.3 KB
|
Panel 3 - Securing Vehicles & Machinery.mp4
|
142.3 MB
|
Panel 4 - Securing Smart Communities.en.srt
|
102.7 KB
|
Panel 4 - Securing Smart Communities.mp4
|
141.7 MB
|
Prof. Eugene Spafford.en.srt
|
4.1 KB
|
Prof. Eugene Spafford.mp4
|
6.2 MB
|
Prof. Mathias Payer.en.srt
|
62.8 KB
|
Prof. Mathias Payer.mp4
|
84.3 MB
|
Ron Ross - NIST.mp4
|
69.7 MB
|
Security Through Formal Methods and Secure Architecture.en.srt
|
94.2 KB
|
Security Through Formal Methods and Secure Architecture.mp4
|
108.6 MB
|
TechTalk - Jeremiah M. Blocki.en.srt
|
45.2 KB
|
TechTalk - Jeremiah M. Blocki.mp4
|
59.3 MB
|
TechTalk - Making the Internet Fast Again..At The Cost of Security.en.srt
|
35.1 KB
|
TechTalk - Making the Internet Fast Again..At The Cost of Security.mp4
|
40.6 MB
|
TechTalk - Shreyas Sundaram.en.srt
|
58.0 KB
|
TechTalk - Shreyas Sundaram.mp4
|
55.4 MB
|
The Rise of Cyber-Crime A Legal Perspective.en.srt
|
104.3 KB
|
The Rise of Cyber-Crime A Legal Perspective.mp4
|
71.7 MB
|
The Stark Reality of Red vs. Blue and Why it's Not Working.en.srt
|
107.7 KB
|
The Stark Reality of Red vs. Blue and Why it's Not Working.mp4
|
81.1 MB
|
Welcome - Ian Steff, Indiana Economic Development Corporation.en.srt
|
40.2 KB
|
Welcome - Ian Steff, Indiana Economic Development Corporation.mp4
|
25.9 MB
|
Women in CyberSecurity Report.en.srt
|
37.2 KB
|
Women in CyberSecurity Report.mp4
|
41.6 MB
|
/CERIAS 2018/
|
Awards.eng.srt
|
71.6 KB
|
Awards.mp4
|
26.7 MB
|
Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.eng.srt
|
180.0 KB
|
Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.mp4
|
67.1 MB
|
Blockchains - A Technical Perspective on the Future of Decentralization.eng.srt
|
95.4 KB
|
Blockchains - A Technical Perspective on the Future of Decentralization.mp4
|
31.2 MB
|
CFIXX - Object Type Integrity for C.en.srt
|
76.6 KB
|
CFIXX - Object Type Integrity for C.mp4
|
25.0 MB
|
Cyber Center for Education and Innovation.eng.srt
|
39.2 KB
|
Cyber Center for Education and Innovation.mp4
|
16.3 MB
|
Developing a Public Private Cybersec Scorecard for the State of Indiana.eng.srt
|
84.6 KB
|
Developing a Public Private Cybersec Scorecard for the State of Indiana.mp4
|
33.3 MB
|
Eli Lilly 's Path to a Successful Threat Intelligence Program.en.srt
|
91.3 KB
|
Eli Lilly 's Path to a Successful Threat Intelligence Program.mp4
|
47.5 MB
|
Firesdie Chat - What’s Ahead - The Spirit of Cybersecurity Yet to Come.eng.srt
|
195.8 KB
|
Firesdie Chat - What’s Ahead - The Spirit of Cybersecurity Yet to Come.mp4
|
73.0 MB
|
Fireside Chat - Cybersecurity Past.eng.srt
|
180.7 KB
|
Fireside Chat - Cybersecurity Past.mp4
|
81.2 MB
|
Fireside Chat - The State of Cybersecurity Education.eng.srt
|
134.9 KB
|
Fireside Chat - The State of Cybersecurity Education.mp4
|
64.8 MB
|
History of CERIAS - Eugene Spafford.mp4
|
62.2 MB
|
Human Biases Meet Cybersecurity of Embedded and Networked Systems.eng.srt
|
106.7 KB
|
Human Biases Meet Cybersecurity of Embedded and Networked Systems.mp4
|
34.0 MB
|
Indiana Cybersecurity Initiatives.eng.srt
|
96.0 KB
|
Indiana Cybersecurity Initiatives.mp4
|
31.9 MB
|
Keynote - Mark Spangler.eng.srt
|
165.6 KB
|
Keynote - Mark Spangler.mp4
|
75.1 MB
|
Keynote - Mark Weatherford.eng.srt
|
127.4 KB
|
Keynote - Mark Weatherford.mp4
|
60.9 MB
|
Lessons Learned From the Retrocomputing Community.en.srt
|
94.8 KB
|
Lessons Learned From the Retrocomputing Community.mp4
|
32.1 MB
|
Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai..en.srt
|
96.9 KB
|
Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai..mp4
|
47.4 MB
|
Mind Your Credit Assessing the Health of the Ripple Credit Network.mp4
|
34.5 MB
|
OBLIVIATE A Data Oblivious File System for Intel SGX.en.srt
|
110.5 KB
|
OBLIVIATE A Data Oblivious File System for Intel SGX.mp4
|
42.4 MB
|
Online Adversarial Learning of Nuclear Reactor Dynamical State.eng.srt
|
71.2 KB
|
Online Adversarial Learning of Nuclear Reactor Dynamical State.mp4
|
27.3 MB
|
State of Cybersecurity in Healthcare.en.srt
|
132.3 KB
|
State of Cybersecurity in Healthcare.mp4
|
59.1 MB
|
The Economics of Offline Password Cracking.en.srt
|
87.8 KB
|
The Economics of Offline Password Cracking.mp4
|
38.6 MB
|
Threats and Risks in Cryptocurrencies.en.srt
|
78.9 KB
|
Threats and Risks in Cryptocurrencies.mp4
|
41.5 MB
|
Welcome.eng.srt
|
54.3 KB
|
Welcome.mp4
|
19.5 MB
|
What Roles Can Empirical Research Play to Advance Software Security Knowledg..en.srt
|
90.1 KB
|
What Roles Can Empirical Research Play to Advance Software Security Knowledg..mp4
|
41.9 MB
|
/CERIAS 2019/
|
A Data Privacy Primer.mp4
|
34.0 MB
|
A Game Theoretic Approach for Adversarial Machine Learning - When Big Data M..en.srt
|
61.2 KB
|
A Game Theoretic Approach for Adversarial Machine Learning - When Big Data M..mp4
|
31.7 MB
|
Aniket Kate, GDPR Privacy vs. Blockchain Transparency.en.srt
|
58.9 KB
|
Aniket Kate, GDPR Privacy vs. Blockchain Transparency.mp4
|
43.9 MB
|
Awards.en.srt
|
19.3 KB
|
Awards.mp4
|
17.4 MB
|
Baiju Patel, Intel.mp4
|
56.1 MB
|
CEIVE Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Infer..mp4
|
32.8 MB
|
Closing Keynote.en.srt
|
100.3 KB
|
Closing Keynote.mp4
|
89.6 MB
|
Connected Intelligence.en.srt
|
63.6 KB
|
Connected Intelligence.mp4
|
48.2 MB
|
Efficient and Constant-Round Secure Comparison through Function Transformati..en.srt
|
98.6 KB
|
Efficient and Constant-Round Secure Comparison through Function Transformati..mp4
|
46.8 MB
|
Game theoretic modeling of cyber deception in the Internet of Battlefield Thi..en.srt
|
43.1 KB
|
Game theoretic modeling of cyber deception in the Internet of Battlefield Thi..mp4
|
30.3 MB
|
Hardware Cybersecurity Attacks and Some Solutions.en.srt
|
86.7 KB
|
Hardware Cybersecurity Attacks and Some Solutions.mp4
|
54.7 MB
|
Keynote Chris Inglis.en.srt
|
171.0 KB
|
Keynote Chris Inglis.mp4
|
107.6 MB
|
Keynote Ray Rothrock, Chairman and CEO, RedSeal, Inc.en.srt
|
112.7 KB
|
Keynote Ray Rothrock, Chairman and CEO, RedSeal, Inc.mp4
|
86.2 MB
|
Panel 1.en.srt
|
113.3 KB
|
Panel 1.mp4
|
104.8 MB
|
Panel 2.en.srt
|
100.5 KB
|
Panel 2.mp4
|
83.9 MB
|
Panel 3.en.srt
|
110.0 KB
|
Panel 3.mp4
|
99.7 MB
|
Panel 04.en.srt
|
117.9 KB
|
Panel 04.mp4
|
96.3 MB
|
Protection against Compromised Operating Systems on ARM Cortex-A Architecture.en.srt
|
77.4 KB
|
Protection against Compromised Operating Systems on ARM Cortex-A Architecture.mp4
|
54.0 MB
|
Rob Hale, Lockheed Martin.en.srt
|
58.6 KB
|
Rob Hale, Lockheed Martin.mp4
|
44.8 MB
|
Secure Information Forwarding through Fragmentation in Delay- tolerant Networ..en.srt
|
77.1 KB
|
Secure Information Forwarding through Fragmentation in Delay- tolerant Networ..mp4
|
40.3 MB
|
Securing IoT-based Cyber-Physical Human Systems against diverse attacks.mp4
|
51.4 MB
|
Teck Talk Umit Karabiyik.en.srt
|
70.7 KB
|
Teck Talk Umit Karabiyik.mp4
|
56.5 MB
|
The Golden Rules of Security and Assurance.en.srt
|
81.6 KB
|
The Golden Rules of Security and Assurance.mp4
|
66.5 MB
|
The Purdue Live Security Analyzer - (PULSAR ).en.srt
|
77.1 KB
|
The Purdue Live Security Analyzer - (PULSAR ).mp4
|
52.1 MB
|
The Rise of Unconventional Security Controls.en.srt
|
106.3 KB
|
The Rise of Unconventional Security Controls.mp4
|
95.3 MB
|
Trustable Information for Security Applications Visual Analytics for Reliabl..mp4
|
78.0 MB
|
/CERIAS 2020/
|
Automated Reasoning of Security and Privacy of Cellular Networks.en.srt
|
96.0 KB
|
Automated Reasoning of Security and Privacy of Cellular Networks.mp4
|
50.2 MB
|
Contactless Control Flow Monitoring via Electromagnetic Emanations.en.srt
|
55.3 KB
|
Contactless Control Flow Monitoring via Electromagnetic Emanations.mp4
|
43.8 MB
|
Cyber Risk Management 101.en.srt
|
95.5 KB
|
Cyber Risk Management 101.mp4
|
22.6 MB
|
Empirical Digital Forensics.en.srt
|
95.0 KB
|
Empirical Digital Forensics.mp4
|
37.1 MB
|
Everyone wants to help you Understanding the Issues and Surviving with a mul..en.srt
|
78.1 KB
|
Everyone wants to help you Understanding the Issues and Surviving with a mul..mp4
|
39.1 MB
|
Identifying Security Risks Using Internet-Wide Scan Data.en.srt
|
65.9 KB
|
Identifying Security Risks Using Internet-Wide Scan Data.mp4
|
51.4 MB
|
Immersive Virtual Insanity Exploring Immersive Virtual Reality Security and ..en.srt
|
107.3 KB
|
Immersive Virtual Insanity Exploring Immersive Virtual Reality Security and ..mp4
|
78.4 MB
|
Mirai - DDoS and the Criminal Ecosystem.mp4
|
49.4 MB
|
Physics-Based Approaches for creating Cyber Resilient Systems.en.srt
|
94.8 KB
|
Physics-Based Approaches for creating Cyber Resilient Systems.mp4
|
69.5 MB
|
Proactive Endpoint and Network Security Operations.mp4
|
56.2 MB
|
Public Sector Cyber Security 2020 Challenges and Rewards.en.srt
|
85.0 KB
|
Public Sector Cyber Security 2020 Challenges and Rewards.mp4
|
26.7 MB
|
Security and Privacy of Connected Autonomous Vehicles.en.srt
|
90.0 KB
|
Security and Privacy of Connected Autonomous Vehicles.mp4
|
58.2 MB
|
Security, Ethics and the End of the World as We Know It.en.srt
|
92.6 KB
|
Security, Ethics and the End of the World as We Know It.mp4
|
93.1 MB
|
Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.mp4
|
31.7 MB
|
The Role of Culture in Cybersecurity.en.srt
|
112.7 KB
|
The Role of Culture in Cybersecurity.mp4
|
64.2 MB
|
/CERIAS 2021/
|
2021 CERIAS Security Symposium Keynote - Dr. Wen Masters, VP for Cyber Technologies, MITRE Corp..eng.srt
|
68.2 KB
|
2021 CERIAS Security Symposium Keynote - Dr. Wen Masters, VP for Cyber Technologies, MITRE Corp.mp4
|
58.7 MB
|
2021 Symposium Closing Keynote - Amit Yoran, Tenable.eng.srt
|
86.2 KB
|
2021 Symposium Closing Keynote - Amit Yoran, Tenable.mp4
|
82.0 MB
|
2021-10-27 - Password Strength Signaling A Counter-Intuitive Defense Against Password Cracking.eng.srt
|
92.1 KB
|
2021-10-27 - Password Strength Signaling A Counter-Intuitive Defense Against Password Cracking.mp4
|
34.5 MB
|
2021-11-03 - Navigating the Cybersecurity Profession - Essential Elements for a Satisfying.eng.srt
|
112.7 KB
|
2021-11-03 - Navigating the Cybersecurity Profession - Essential Elements for a Satisfying.mp4
|
46.5 MB
|
2021-11-17 CERIAS - You Are The Future of Industrial Cybersecurity.mp4
|
41.6 MB
|
2021-12-01 CERIAS - Future Trends in Cyber Crime and Hybrid Warfare.eng.srt
|
123.4 KB
|
2021-12-01 CERIAS - Future Trends in Cyber Crime and Hybrid Warfare.mp4
|
50.0 MB
|
2021-12-08 CERIAS - Integrating Cybersecurity into Digital Development.eng.srt
|
111.6 KB
|
2021-12-08 CERIAS - Integrating Cybersecurity into Digital Development.mp4
|
55.2 MB
|
A Formal Verifier for the Diem Blockchain Move Language.eng.srt
|
118.2 KB
|
A Formal Verifier for the Diem Blockchain Move Language.mp4
|
34.3 MB
|
Adaptive Cybersecurity Risk Assessments.eng.srt
|
93.2 KB
|
Adaptive Cybersecurity Risk Assessments.mp4
|
45.9 MB
|
AI, Computational Imaging and the Battle for Media Integrity.eng.srt
|
111.7 KB
|
AI, Computational Imaging and the Battle for Media Integrity.mp4
|
54.7 MB
|
Big Breaches Cybersecurity Lessons For Everyone.eng.srt
|
119.5 KB
|
Big Breaches Cybersecurity Lessons For Everyone.mp4
|
51.7 MB
|
Building Practical Security Systems for the Post-App Smart Home.mp4
|
53.8 MB
|
Byzantine-Resilient Learning in Mult-Agent Systems - Shreyas Sundaram CERIAS - Purdue.eng.srt
|
61.7 KB
|
Byzantine-Resilient Learning in Mult-Agent Systems - Shreyas Sundaram CERIAS - Purdue.mp4
|
22.7 MB
|
CERIAS - 2021 Security Symposium Panel Discussion Ransoming America.eng.srt
|
122.3 KB
|
CERIAS - 2021 Security Symposium Panel Discussion Ransoming America.mp4
|
97.7 MB
|
CERIAS 2021 Security Symposium - Opening Keynote, Rob Joyce, NSA.mp4
|
45.6 MB
|
CERIAS 2021 Security Symposium - Welcome.eng.srt
|
33.7 KB
|
CERIAS 2021 Security Symposium - Welcome.mp4
|
20.0 MB
|
CERIAS Fall 2021 Student Welcome.eng.srt
|
108.0 KB
|
CERIAS Fall 2021 Student Welcome.mp4
|
46.6 MB
|
Christian Moya Protecting the Power Grid from Cyber-attacks A Machine Learning-based Approach.eng.srt
|
30.1 KB
|
Christian Moya Protecting the Power Grid from Cyber-attacks A Machine Learning-based Approach.mp4
|
12.9 MB
|
Cory Doctorow, Technology, Self-Determination, and the Future of the Future.eng.srt
|
139.9 KB
|
Cory Doctorow, Technology, Self-Determination, and the Future of the Future.mp4
|
55.1 MB
|
Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology.eng.srt
|
111.1 KB
|
Cyber Supply Chain Risk Management (SCRM) and its impact on information and Operational Technology.mp4
|
39.6 MB
|
Cybercrime A Proposed Solution.eng.srt
|
104.1 KB
|
Cybercrime A Proposed Solution.mp4
|
40.1 MB
|
Deep Learning-Powered Situational Awareness for Securing Cyber-Physical Critical Infrastructure.eng.srt
|
32.0 KB
|
Deep Learning-Powered Situational Awareness for Securing Cyber-Physical Critical Infrastructure.mp4
|
17.0 MB
|
Delving into differential privacy and anomaly detection a meta-learning pers.eng.srt
|
58.5 KB
|
Delving into differential privacy and anomaly detection a meta-learning pers.mp4
|
27.7 MB
|
Educating the Next Generation on the Challenges of Securing Critical Infrastructure.eng.srt
|
134.1 KB
|
Educating the Next Generation on the Challenges of Securing Critical Infrastructure.mp4
|
50.4 MB
|
Fireside Chat.eng.srt
|
186.9 KB
|
Fireside Chat.mp4
|
145.2 MB
|
Industrial Control Systems Security An Educational Challenge - Ida Ngambeki CERIAS - Purdue.eng.srt
|
54.4 KB
|
Industrial Control Systems Security An Educational Challenge - Ida Ngambeki CERIAS - Purdue.mp4
|
22.3 MB
|
Lessons Learned - Fifty Years of Mistakes in Cybersecurity.eng.srt
|
84.6 KB
|
Lessons Learned - Fifty Years of Mistakes in Cybersecurity.mp4
|
29.6 MB
|
LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks, Antonio Bianchi, CERIAS - Purdue.eng.srt
|
34.8 KB
|
LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks, Antonio Bianchi, CERIAS - Purdue.mp4
|
17.8 MB
|
M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles - Dave Tian CERIAS.eng.srt
|
41.1 KB
|
M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles - Dave Tian CERIAS.mp4
|
15.5 MB
|
National Security Implications of Quantum Technology.eng.srt
|
95.4 KB
|
National Security Implications of Quantum Technology.mp4
|
38.5 MB
|
NUTS The Beta Demo.eng.srt
|
109.1 KB
|
NUTS The Beta Demo.mp4
|
52.5 MB
|
Opening Remarks Dr. Dongyan Xu, Executive Director, CERIAS.eng.srt
|
12.6 KB
|
Opening Remarks Dr. Dongyan Xu, Executive Director, CERIAS.mp4
|
5.9 MB
|
Panel Aero-Cyber The Challenges of Resource-Constrained Embedded Systems.eng.srt
|
110.8 KB
|
Panel Aero-Cyber The Challenges of Resource-Constrained Embedded Systems.mp4
|
69.4 MB
|
Panel Discussion Trusted Microelectronics The Base upon Which all Connections are Built.eng.srt
|
127.4 KB
|
Panel Discussion Trusted Microelectronics The Base upon Which all Connections are Built.mp4
|
92.0 MB
|
Practical software Supply Chain Security and Transparency.eng.srt
|
80.2 KB
|
Practical software Supply Chain Security and Transparency.mp4
|
26.3 MB
|
SDN NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool.eng.srt
|
94.6 KB
|
SDN NFV in the ICS, SCADA and Manufacturing World as a Cyber Security Tool.mp4
|
26.1 MB
|
Secure Federated Learning.eng.srt
|
103.5 KB
|
Secure Federated Learning.mp4
|
34.8 MB
|
Securing SaaS, a Practitioner's Guide.eng.srt
|
109.0 KB
|
Securing SaaS, a Practitioner's Guide.mp4
|
45.4 MB
|
Securing the Software Supply Chain.eng.srt
|
99.5 KB
|
Securing the Software Supply Chain.mp4
|
34.0 MB
|
Security Engineering for Machine Learning.eng.srt
|
132.0 KB
|
Security Engineering for Machine Learning.mp4
|
52.3 MB
|
Security Industry Context.eng.srt
|
86.6 KB
|
Security Industry Context.mp4
|
35.7 MB
|
Security is Probabilistic, Not Deterministic Get Over It.eng.srt
|
111.1 KB
|
Security is Probabilistic, Not Deterministic Get Over It.mp4
|
65.0 MB
|
SOL4CE Cyber Cyber-Physical Laboratory.eng.srt
|
8.4 KB
|
SOL4CE Cyber Cyber-Physical Laboratory.mp4
|
5.6 MB
|
Steven Furnell, University of Nottingham Cybersecurity Skills.eng.srt
|
127.0 KB
|
Steven Furnell, University of Nottingham Cybersecurity Skills.mp4
|
44.0 MB
|
The Changing Cybersecurity Threatscape.eng.srt
|
129.0 KB
|
The Changing Cybersecurity Threatscape.mp4
|
60.3 MB
|
The Gauntlet of Cybersecurity Research.eng.srt
|
103.3 KB
|
The Gauntlet of Cybersecurity Research.mp4
|
43.5 MB
|
The History of Cybersecurity Metrics.eng.srt
|
138.5 KB
|
The History of Cybersecurity Metrics.mp4
|
65.8 MB
|
The Internet of Things What Everyone Needs to Know.eng.srt
|
124.2 KB
|
The Internet of Things What Everyone Needs to Know.mp4
|
45.1 MB
|
The Invisible Risks An Empirical Analysis on Data Sharing Activities and Sys.eng.srt
|
83.2 KB
|
The Invisible Risks An Empirical Analysis on Data Sharing Activities and Sys.mp4
|
27.1 MB
|
The Need for Legal Education within a Cybersecurity Curriculum.eng.srt
|
124.8 KB
|
The Need for Legal Education within a Cybersecurity Curriculum.mp4
|
53.7 MB
|
The Shoulders of InfoSec.eng.srt
|
97.6 KB
|
The Shoulders of InfoSec.mp4
|
31.4 MB
|
Understanding Attackers and Motivations.eng.srt
|
89.1 KB
|
Understanding Attackers and Motivations.mp4
|
29.4 MB
|
Understanding the Human Hacker.eng.srt
|
140.2 KB
|
Understanding the Human Hacker.mp4
|
51.9 MB
|
You Can Stop Stupid Human Security Engineering.eng.srt
|
129.8 KB
|
You Can Stop Stupid Human Security Engineering.mp4
|
34.4 MB
|
/CERIAS 2022/
|
2022-09-21 CERIAS.en.srt
|
95.9 KB
|
2022-09-21 CERIAS.mp4
|
44.0 MB
|
A Fake Image is Worth a Thousand Lies.eng.srt
|
86.6 KB
|
A Fake Image is Worth a Thousand Lies.mp4
|
33.1 MB
|
Adaptive Multi-Factor Authentication and Cyber Identity.eng.srt
|
72.5 KB
|
Adaptive Multi-Factor Authentication and Cyber Identity.mp4
|
45.4 MB
|
Automated Function Boundary Detection in Stripped Binaries.eng.srt
|
99.2 KB
|
Automated Function Boundary Detection in Stripped Binaries.mp4
|
38.8 MB
|
Awards - Purdue University.eng.srt
|
37.6 KB
|
Awards - Purdue University.mp4
|
23.8 MB
|
Building the Next Generation Cybersecurity Workforce - Progress and Challenge.eng.srt
|
87.9 KB
|
Building the Next Generation Cybersecurity Workforce - Progress and Challenge.mp4
|
35.1 MB
|
Counterfeit Medicines as a Fundamental Security Problem.eng.srt
|
64.4 KB
|
Counterfeit Medicines as a Fundamental Security Problem.mp4
|
31.3 MB
|
Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence.eng.srt
|
94.2 KB
|
Critical Infrastructure Resilience Hinges on Cyber-Physical Convergence.mp4
|
20.0 MB
|
Crowd Forecasting to Enhance Cybersecurity.eng.srt
|
103.3 KB
|
Crowd Forecasting to Enhance Cybersecurity.mp4
|
52.4 MB
|
Cyber Security in Aviation.eng.srt
|
97.8 KB
|
Cyber Security in Aviation.mp4
|
35.5 MB
|
Cyber-Physical System Security of the Power Grid.eng.srt
|
99.4 KB
|
Cyber-Physical System Security of the Power Grid.mp4
|
39.9 MB
|
Data, Privacy--and the Interactions Between Them.eng.srt
|
120.4 KB
|
Data, Privacy--and the Interactions Between Them.mp4
|
64.1 MB
|
Enabling a Practically Secure Mobile Networked System.eng.srt
|
94.1 KB
|
Enabling a Practically Secure Mobile Networked System.mp4
|
32.6 MB
|
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover.eng.srt
|
78.5 KB
|
Fast and Reliable Formal Verification of Smart Contracts with the Move Prover.mp4
|
34.6 MB
|
Fireside Chat.eng.srt
|
122.4 KB
|
Fireside Chat.mp4
|
67.5 MB
|
IoT Device Security in a Zero Trust Environment.eng.srt
|
73.9 KB
|
IoT Device Security in a Zero Trust Environment.mp4
|
30.6 MB
|
Keynote Day 2.eng.srt
|
97.6 KB
|
Keynote Day 2.mp4
|
53.7 MB
|
Leading Trends and Emerging Technologies for Cybersecurity in 2022.eng.srt
|
92.9 KB
|
Leading Trends and Emerging Technologies for Cybersecurity in 2022.mp4
|
36.9 MB
|
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding.eng.srt
|
88.9 KB
|
Making Cybersecurity Reliable and Cybersecurity Careers Rewarding.mp4
|
41.1 MB
|
Moving Target Defense for Space Systems.eng.srt
|
91.3 KB
|
Moving Target Defense for Space Systems.mp4
|
32.1 MB
|
On Using Differential Privacy.mp4
|
31.4 MB
|
Opening Keynote - Network Security in a Zero Trust World.eng.srt
|
142.7 KB
|
Opening Keynote - Network Security in a Zero Trust World.mp4
|
54.9 MB
|
Panel Discussion - Fair and Trusted A.I..eng.srt
|
114.4 KB
|
Panel Discussion - Fair and Trusted A.I.mp4
|
66.6 MB
|
Physical Security in Intelligent Transportation Networks.eng.srt
|
90.2 KB
|
Physical Security in Intelligent Transportation Networks.mp4
|
33.6 MB
|
Program Maturity - Cybersecurity and Operational Risk Management.eng.srt
|
83.9 KB
|
Program Maturity - Cybersecurity and Operational Risk Management.mp4
|
36.6 MB
|
Ransomware and the Future of Cyberwarfare.eng.srt
|
108.0 KB
|
Ransomware and the Future of Cyberwarfare.mp4
|
38.0 MB
|
Richard A. Clarke - Now That We’re in a Hybrid War.eng.srt
|
104.4 KB
|
Richard A. Clarke - Now That We’re in a Hybrid War.mp4
|
68.5 MB
|
Robust Collective Cyber Power across Consolidated Democracies.eng.srt
|
89.9 KB
|
Robust Collective Cyber Power across Consolidated Democracies.mp4
|
44.2 MB
|
Securing Connected Devices - Challenge and Opportunities.eng.srt
|
111.2 KB
|
Securing Connected Devices - Challenge and Opportunities.mp4
|
43.9 MB
|
Security and Privacy in the Cyber-physical World.eng.srt
|
69.5 KB
|
Security and Privacy in the Cyber-physical World.mp4
|
31.4 MB
|
Stop Selling Cybersecurity Short Cybersecurity as a Component of National P.eng.srt
|
80.6 KB
|
Stop Selling Cybersecurity Short Cybersecurity as a Component of National P.mp4
|
38.4 MB
|
Tech Talk - Digital Forensics Investigations The Holistic Approach.eng.srt
|
82.1 KB
|
Tech Talk - Digital Forensics Investigations The Holistic Approach.mp4
|
38.5 MB
|
The Evolution of Cybersecurity and its Role in the International System.eng.srt
|
119.7 KB
|
The Evolution of Cybersecurity and its Role in the International System.mp4
|
45.6 MB
|
The Metaverse Infinite attack surface and boundless risk.eng.srt
|
111.2 KB
|
The Metaverse Infinite attack surface and boundless risk.mp4
|
59.4 MB
|
Threat Modeling in the World of DevOps.eng.srt
|
127.4 KB
|
Threat Modeling in the World of DevOps.mp4
|
57.3 MB
|
Tommy Gardner, Chief Technology Officer, HP Federal.eng.srt
|
105.3 KB
|
Tommy Gardner, Chief Technology Officer, HP Federal.mp4
|
45.6 MB
|
Users Are Not Stupid Six Cybersecurity Pitfalls Overturned.eng.srt
|
87.6 KB
|
Users Are Not Stupid Six Cybersecurity Pitfalls Overturned.mp4
|
32.4 MB
|
What You Don't Know About Hard Drives.eng.srt
|
111.9 KB
|
What You Don't Know About Hard Drives.mp4
|
28.2 MB
|
/CERIAS 2023/
|
2nd Annual Indiana Statewide Academic Cybersecurity Alliance Summit.eng.srt
|
123.2 KB
|
2nd Annual Indiana Statewide Academic Cybersecurity Alliance Summit.mp4
|
53.5 MB
|
35 Years of Protecting the Internet.eng.srt
|
96.8 KB
|
35 Years of Protecting the Internet.mp4
|
53.9 MB
|
2023 Annual Security Symposium Awards.eng.srt
|
49.2 KB
|
2023 Annual Security Symposium Awards.mp4
|
32.8 MB
|
2023 Annual Security Symposium Fireside Chat.eng.srt
|
104.7 KB
|
2023 Annual Security Symposium Fireside Chat.mp4
|
48.4 MB
|
2023 Annual Security Symposium Opening Comments and FBI Guest Speakers.eng.srt
|
152.5 KB
|
2023 Annual Security Symposium Opening Comments and FBI Guest Speakers.mp4
|
79.9 MB
|
2023-02-22 CERIAS -.eng.srt
|
112.3 KB
|
2023-02-22 CERIAS -.mp4
|
42.8 MB
|
2023-09-13 CERIAS -.eng.srt
|
80.9 KB
|
2023-09-13 CERIAS -.mp4
|
32.8 MB
|
Advancements and New Developments in Bio-metric Privacy, Security and Ethics.eng.srt
|
84.3 KB
|
Advancements and New Developments in Bio-metric Privacy, Security and Ethics.mp4
|
32.2 MB
|
Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine.eng.srt
|
105.6 KB
|
Applying Multi-Agent Reinforcement Learning (MARL) in a Cyber Wargame Engine.mp4
|
42.0 MB
|
Backtracking Intrusions in Modern Industrial Internet of Things.eng.srt
|
82.9 KB
|
Backtracking Intrusions in Modern Industrial Internet of Things.mp4
|
29.8 MB
|
CERIAS -.eng.srt
|
44.7 KB
|
CERIAS -.mp4
|
21.6 MB
|
Chinese Views of Information and Future Warfare.eng.srt
|
90.0 KB
|
Chinese Views of Information and Future Warfare.mp4
|
59.1 MB
|
Criminology, Linguistics, and Biometrics An Approach to Identifying Online Child Sex Offenders.eng.srt
|
49.9 KB
|
Criminology, Linguistics, and Biometrics An Approach to Identifying Online Child Sex Offenders.mp4
|
26.4 MB
|
Cyber defender's plead - If it's not codified - Please go away.eng.srt
|
104.1 KB
|
Cyber defender's plead - If it's not codified - Please go away.mp4
|
47.9 MB
|
Cyber Risk Analysis for Critical Infrastructure.eng.srt
|
47.1 KB
|
Cyber Risk Analysis for Critical Infrastructure.mp4
|
28.4 MB
|
Designing Emotionally-Intelligent Digital Agents that Move, Express, and Feel Like Us.eng.srt
|
49.5 KB
|
Designing Emotionally-Intelligent Digital Agents that Move, Express, and Feel Like Us.mp4
|
18.9 MB
|
Don't Copy That Floppy A History of Anti-cracking Controls in Early Video G.eng.srt
|
76.0 KB
|
Don't Copy That Floppy A History of Anti-cracking Controls in Early Video G.mp4
|
33.0 MB
|
Effective Security Proactively Verifying Your Security Posture.eng.srt
|
86.1 KB
|
Effective Security Proactively Verifying Your Security Posture.mp4
|
32.5 MB
|
Elements of Robust Real-Time Systems Regularity-Based Virtualization and Fun.eng.srt
|
80.8 KB
|
Elements of Robust Real-Time Systems Regularity-Based Virtualization and Fun.mp4
|
41.6 MB
|
Enhancing Software Supply Chain Security in Distributed Systems.eng.srt
|
116.3 KB
|
Enhancing Software Supply Chain Security in Distributed Systems.mp4
|
43.5 MB
|
Fuzzing Understanding the Landscape.eng.srt
|
95.9 KB
|
Fuzzing Understanding the Landscape.mp4
|
41.2 MB
|
How the Cyberspace Domain has Changed the Game for the Space Domain.eng.srt
|
104.2 KB
|
How the Cyberspace Domain has Changed the Game for the Space Domain.mp4
|
51.8 MB
|
How to Build and Measure a Corporate Security Program.eng.srt
|
121.2 KB
|
How to Build and Measure a Corporate Security Program.mp4
|
69.4 MB
|
Increasing Dependency - Increasing Threat.eng.srt
|
114.8 KB
|
Increasing Dependency - Increasing Threat.mp4
|
64.4 MB
|
Mind the Gap Vulnerabilities and Opportunities for Cyber R&D at the Edge.eng.srt
|
98.3 KB
|
Mind the Gap Vulnerabilities and Opportunities for Cyber R&D at the Edge.mp4
|
36.7 MB
|
Our Journey in Phishing Mitigation.eng.srt
|
107.1 KB
|
Our Journey in Phishing Mitigation.mp4
|
38.8 MB
|
Pre-Silicon Hardware Security Analysis through Information Flow Tracking - Cu.eng.srt
|
81.1 KB
|
Pre-Silicon Hardware Security Analysis through Information Flow Tracking - Cu.mp4
|
38.5 MB
|
Problems and Challenges in Data Security Posture Management.eng.srt
|
97.9 KB
|
Problems and Challenges in Data Security Posture Management.mp4
|
41.8 MB
|
Purdue Cybersecurity Awareness Speaker - Admiral Michael Rogers - 10-16-23.eng.srt
|
151.4 KB
|
Purdue Cybersecurity Awareness Speaker - Admiral Michael Rogers - 10-16-23.mp4
|
162.5 MB
|
Pushing the Frontiers of Collaborative Learning Security Challenges and the Path Forward.eng.srt
|
31.5 KB
|
Pushing the Frontiers of Collaborative Learning Security Challenges and the Path Forward.mp4
|
10.2 MB
|
Securing Your Software Supply Chain.eng.srt
|
117.3 KB
|
Securing Your Software Supply Chain.mp4
|
39.7 MB
|
Security Symposium Closing Keynote.eng.srt
|
105.4 KB
|
Security Symposium Closing Keynote.mp4
|
59.5 MB
|
The Bride of the Pod People.eng.srt
|
98.0 KB
|
The Bride of the Pod People.mp4
|
49.7 MB
|
The State of Software Supply Chain Security.eng.srt
|
112.1 KB
|
The State of Software Supply Chain Security.mp4
|
37.6 MB
|
Thinking About the Future of Encryption.eng.srt
|
88.2 KB
|
Thinking About the Future of Encryption.mp4
|
35.3 MB
|
Trends in the Industrial Cybersecurity Landscape - Rober M. Lee Dragos.eng.srt
|
123.4 KB
|
Trends in the Industrial Cybersecurity Landscape - Rober M. Lee Dragos.mp4
|
57.5 MB
|
Using Endpoint Isolation to Track Malware Trends.eng.srt
|
79.8 KB
|
Using Endpoint Isolation to Track Malware Trends.mp4
|
33.8 MB
|
Vulnerability Identification and Defense Construction in Cyber-Physical Syste.eng.srt
|
92.6 KB
|
Vulnerability Identification and Defense Construction in Cyber-Physical Syste.mp4
|
32.8 MB
|
Zero Trust Application Cyber-Physical System Security.eng.srt
|
39.4 KB
|
Zero Trust Application Cyber-Physical System Security.mp4
|
20.1 MB
|
Total files 821
|