/CERIAS 1999/
|
1999-08-27 CERIAS - KHIP - A Scalable Protocol for Secure Multicast Routing.mp4
|
53.8 MB
|
1999-10-01 CERIAS - Architectures and Components for High-Assurance Security.mp4
|
60.8 MB
|
1999-10-15 CERIAS - Balancing Big Brother.mp4
|
114.8 MB
|
1999.m3u
|
0.2 KB
|
/CERIAS 2000/
|
2000-01-21 CERIAS - Open Source Issues and Opportunities for Tripwire.mp4
|
66.9 MB
|
2000-02-04 CERIAS - NLP for IAS Overview and Implementations.mp4
|
55.7 MB
|
2000-02-11 CERIAS - Commercial High-Resolution Satellite Imagery Polic.mp4
|
59.3 MB
|
2000-02-18 CERIAS - Tracing Denial-of-Service Attacks; or why we may never know who attacked Yaho....mp4
|
166.7 MB
|
2000-02-18 CERIAS - Tracing Denial-of-Service Attacks_ or why we may never know who attacked Yaho....mp4
|
67.6 MB
|
2000-02-25 CERIAS - Automatic identification of classified documents.mp4
|
67.4 MB
|
2000-03-31 CERIAS - Implications of Mobile Code on Microsoft Platforms.mp4
|
74.6 MB
|
2000-04-07 CERIAS - Machine Learning Techniques for Anomaly Detection in Computer Security.mp4
|
67.4 MB
|
2000-04-21 CERIAS - Information Assurance Challenges for the 21st Century.mp4
|
55.6 MB
|
2000-04-28 CERIAS - The Holy Grail of E-Business Risk Management Creating and Sustaining the Ins....mp4
|
75.2 MB
|
2000-08-23 CERIAS - The Future of Information Security Technologies.mp4
|
49.2 MB
|
2000-08-30 CERIAS - The IRDB Project An Incident Response Database For Gathering Cost And Incide....mp4
|
67.4 MB
|
2000-09-06 CERIAS - Static Checking of Interrupt-Driven Software.mp4
|
63.7 MB
|
2000-09-13 CERIAS - The Challenge of Secure Software.mp4
|
73.9 MB
|
2000-09-20 CERIAS - Evolving the Internet.mp4
|
70.9 MB
|
2000-10-04 CERIAS - Richard Stotts, Jerome Webb & Matthew Beebe.mp4
|
168.5 MB
|
2000-10-04 CERIAS - Richard Stotts, Jerome Webb &_amp_ Matthew Beebe.mp4
|
68.4 MB
|
2000-10-11 CERIAS - Developing Data Mining Techniques for Intrusion Detection A Progress Report.mp4
|
71.1 MB
|
2000-11-08 CERIAS - Investigating Computer Security Incidents.mp4
|
73.0 MB
|
2000.m3u
|
1.4 KB
|
/CERIAS 2004/
|
2004-09-08 - Administrative Scope and Role-Based Administration - CERIAS Security Seminar.mp4
|
53.3 MB
|
2004-09-15 - Secure Information Sharing within a Collaborative Environment - CERIAS Security Seminar.mp4
|
58.6 MB
|
2004-10-13 - Information Flow Analysis in Security Enhanced Linux - CERIAS Security Seminar.mp4
|
65.3 MB
|
2004-10-27 - Robustness testing - black-box testing for software security - CERIAS Security Seminar.mp4
|
58.4 MB
|
2004-11-03 - Towards Mining Syslog Data - Abe Singer - CERIAS Security Seminar.mp4
|
51.9 MB
|
2004-11-10 CERIAS - GTRBAC A Generalized Temporal Role Based Access Control Model.mp4
|
55.0 MB
|
2004-11-17 CERIAS - An Anonymous Fair-Exchange E-Commerce Protocol.mp4
|
39.8 MB
|
2004-12-01 CERIAS - Attribute-Based Access Control.mp4
|
58.6 MB
|
2004-12-08 CERIAS - Using Statistical Analysis to Locate Spam Web Pages.mp4
|
43.2 MB
|
2004.m3u
|
0.8 KB
|
/CERIAS 2005/
|
2005 (2).m3u
|
2.0 KB
|
2005-01-12 CERIAS - Survivable routing in wireless ad hoc networks.mp4
|
143.4 MB
|
2005-01-19 CERIAS - Hidden Access Control Policies with Hidden Credentials.mp4
|
110.2 MB
|
2005-02-02 CERIAS - Obfuscated Databases Definitions and Constructions.mp4
|
140.1 MB
|
2005-02-09 CERIAS - Architectural Considerations for Anomaly Detection.mp4
|
105.9 MB
|
2005-02-23 CERIAS - Perturbation of Multivariable Public-key Cryptosystems.mp4
|
82.8 MB
|
2005-03-02 CERIAS - Using process labels to obtain forensic and traceback information.mp4
|
131.2 MB
|
2005-03-09 - Where s the FEEB Effectiveness of Instruction Set Randomization.mp4
|
124.4 MB
|
2005-03-23 - Dr. Kate Cherry and Dr. Wendy Hamilton - CERIAS Security Seminar.mp4
|
150.4 MB
|
2005-03-30 - Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks.mp4
|
131.9 MB
|
2005-04-06 - CERIAS - Defining a Digital Forensic Investigation.mp4
|
122.0 MB
|
2005-04-13 CERIAS - Watermarking Relational Databases.mp4
|
118.7 MB
|
2005-04-20 CERIAS - Traust and PeerTrust2 Applying Trust Negotiation to Real Systems.mp4
|
140.6 MB
|
2005-08-24 CERIAS - An Introduction to Biometric Technologies - Stephen Elliott.mp4
|
135.9 MB
|
2005-08-31 CERIAS - Minimizing Trust Liabilities in Secure Group Messaging Infrastructures.mp4
|
92.6 MB
|
2005-09-07 CERIAS - Real World Web Application Security.mp4
|
81.9 MB
|
2005-09-14 CERIAS - Knowing Where, When and What Hazards Occur.mp4
|
151.5 MB
|
2005-09-21 CERIAS - A Framework for Identifying Compromised Nodes in Sensor Networks.mp4
|
129.1 MB
|
2005-10-05 CERIAS - Securing the Internet s Domain Name System.mp4
|
117.5 MB
|
2005-10-19 CERIAS - Toward Self-healing Software.mp4
|
137.4 MB
|
2005-10-26 CERIAS - A Demonstration in the Need for a Layered Security Model.mp4
|
172.5 MB
|
2005-11-09 CERIAS - Privacy and anonymity in Trust Negotiations.mp4
|
128.5 MB
|
2005-11-16 CERIAS - Privacy-preserving Policy-driven Access Control with Mixed Credentials.mp4
|
102.9 MB
|
2005-11-30 CERIAS - Secret Handshakes.mp4
|
129.8 MB
|
2005-12-07 CERIAS - Clouseau A practical IP spoofing defense through route-based filtering.mp4
|
127.7 MB
|
2005.m3u
|
1.9 KB
|
/CERIAS 2006/
|
2006-01-11 CERIAS - Cross-Drive Forensic Analysis.mp4
|
39.7 MB
|
2006-01-18 CERIAS - Net Trust Identification Through Social Context.mp4
|
51.1 MB
|
2006-01-25 CERIAS - Semantic Attacks and Security.mp4
|
61.2 MB
|
2006-02-01 CERIAS - Digital Identity Management and Theft Protection.mp4
|
46.1 MB
|
2006-02-08 CERIAS - Categories of Digital Forensic Investigation Techniques.mp4
|
48.0 MB
|
2006-02-15 CERIAS - Provable security in mobile ad hoc networks.mp4
|
56.2 MB
|
2006-03-01 CERIAS - A Policy Engineering Framework for Federated Access Management.mp4
|
53.7 MB
|
2006-03-08 CERIAS - Dynamic and Efficient Key Management for Access Hierarchies.mp4
|
39.7 MB
|
2006-03-22 CERIAS - Privacy Policies in Web-based Healthcare.mp4
|
52.4 MB
|
2006-03-29 CERIAS - Spoofing-resistant Packet Routing for the Internet.mp4
|
65.6 MB
|
2006-04-05 CERIAS - Chaos,Complexity, Cybernetics and Therminator.mp4
|
54.9 MB
|
2006-04-12 CERIAS - Identity Management Strategies and Integration Perspectives.mp4
|
74.4 MB
|
2006-04-19 CERIAS - Recent Attacks on MD5.mp4
|
54.1 MB
|
2006-04-26 CERIAS - On the Evolution of Adversary Models for Security Protocols - from the Beginn....mp4
|
58.9 MB
|
2006-08-23 CERIAS - Toward Autonomic Security Policy Management.mp4
|
40.8 MB
|
2006-08-30 CERIAS - Invasive Browser Sniffing and Countermeasures.mp4
|
49.5 MB
|
2006-09-06 CERIAS - A Multi-layered Approach to Web Application Defense.mp4
|
52.1 MB
|
2006-09-13 CERIAS - Real-Time Visualization of Network Attacks on High-Speed Links.mp4
|
67.4 MB
|
2006-09-20 CERIAS - Prioritizing Processes and Controls for Effective and Measurable Security.mp4
|
65.5 MB
|
2006-09-27 CERIAS - The Secure Information Sharing Problem and Solution Approaches.mp4
|
72.0 MB
|
2006-10-04 CERIAS - Verification of Integrity for Outsourced Content Publishing and Database Quer....mp4
|
64.0 MB
|
2006-10-11 CERIAS - Network Security Begins at Home Changing Consumer Behavior for i-Safety.mp4
|
75.2 MB
|
2006-10-18 CERIAS - Forensics Characterization of Printers and Image Capture devices.mp4
|
35.3 MB
|
2006-10-25 CERIAS - Beyond Separation of Duty An Algebra for Specifying High-level Security Poli....mp4
|
47.0 MB
|
2006-11-01 CERIAS - Developing an Operational Framework for Integrated System Security.mp4
|
61.7 MB
|
2006-11-08 CERIAS - Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstru....mp4
|
47.7 MB
|
2006-11-15 CERIAS - One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back A Ten ....mp4
|
70.4 MB
|
2006-11-29 CERIAS - OS-Level Taint Analysis for Malware Investigation and Defense.mp4
|
68.6 MB
|
2006-12-06 CERIAS - The Psychology of Computer Deviance How it can assist in digital evidence a....mp4
|
67.2 MB
|
2006.m3u
|
2.5 KB
|
/CERIAS 2007/
|
2007-01-10 CERIAS - Computer-Related Incidents Factors Related to Cause and Prevention.mp4
|
62.2 MB
|
2007-01-17 CERIAS - Research Challenges in Assured Information Sharing.mp4
|
47.8 MB
|
2007-01-24 CERIAS - WHAT IS INFORMATION.mp4
|
67.2 MB
|
2007-01-31 CERIAS - Mathematically Defining Privacy.mp4
|
59.9 MB
|
2007-02-07 CERIAS - Scenario-Driven Construction of Enterprise Information Policy.mp4
|
68.5 MB
|
2007-02-21 CERIAS - Cyber Security and the NEW world enterprise.mp4
|
61.7 MB
|
2007-02-28 CERIAS - Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrust....mp4
|
74.8 MB
|
2007-03-07 CERIAS - Intrusion Detection Event Correlation Approaches, Benefits and Pitfalls.mp4
|
61.4 MB
|
2007-03-21 CERIAS - A quant looks at the future.mp4
|
72.3 MB
|
2007-03-28 CERIAS - Automatic Debugging and Verification of RTL-Specified Real-Time Systems via I....mp4
|
60.1 MB
|
2007-04-11 CERIAS - Dumb Ideas in Computer Security.mp4
|
60.0 MB
|
2007-04-18 CERIAS - Hiding the Message Behind the Words Advances in Natural Language Watermarkin....mp4
|
38.0 MB
|
2007-04-25 CERIAS - Passwords Decay, Words Endure Towards Secure and Re-usable Multiple Password....mp4
|
68.0 MB
|
2007-08-22 CERIAS - Role Discovery.mp4
|
108.9 MB
|
2007-08-29 CERIAS - Towards Effective and Efficient Behavior-based Trust Models.mp4
|
116.9 MB
|
2007-09-05 CERIAS - Applying Recreational Mathematics to Secure Multiparty Computation.mp4
|
125.1 MB
|
2007-09-12 CERIAS - Security issues within embedded software development.mp4
|
95.7 MB
|
2007-09-19 CERIAS - Protecting Data Privacy A Practical Guide to Managing Risk.mp4
|
81.8 MB
|
2007-09-26 CERIAS - The Effect of Rootkits on the Corporate Environment.mp4
|
102.3 MB
|
2007-10-10 CERIAS - What Every Engineer Needs To Know About Security And Where To Learn It.mp4
|
118.6 MB
|
2007-10-17 CERIAS - From Securing Navigation Systems to Securing Wireless Communication.mp4
|
129.6 MB
|
2007-10-24 CERIAS - Secure Virtualization.mp4
|
141.1 MB
|
2007-10-31 CERIAS - Protocols and Systems for Privacy Preserving Protection of Digital Identity.mp4
|
125.5 MB
|
2007-11-07 CERIAS - Security, Soft Boundaries, and oh-so-subtle Strategies How to Play Chess Whil....mp4
|
70.4 MB
|
2007-11-14 CERIAS - Wireless Router Insecurity The Next Crimeware Epidemic.mp4
|
117.3 MB
|
2007-11-28 CERIAS - CANDID Preventing SQL Injection Attacks using Dynamic Candidate Evaluations.mp4
|
44.1 MB
|
2007.m3u
|
2.2 KB
|
/CERIAS 2008/
|
2008-01-09 CERIAS - Security in a Changing World.mp4
|
60.2 MB
|
2008-01-16 CERIAS - Tor Anonymous communications for government agencies, corporations, journali....mp4
|
71.3 MB
|
2008-01-23 CERIAS - Electronic Voting Danger and Opportunity.mp4
|
107.2 MB
|
2008-01-30 CERIAS - What are CSO s thinking about Top information security initiatives for 2008 ....mp4
|
113.2 MB
|
2008-02-13 CERIAS - Beyond the Enclave Evolving Concepts in Security Architectures.mp4
|
116.4 MB
|
2008-02-20 CERIAS - Reading the Disclosures with New Eyes Bridging the Gap between Information S....mp4
|
100.2 MB
|
2008-02-27 CERIAS - Managing Security Polarities.mp4
|
96.1 MB
|
2008-03-05 CERIAS - Hacking the Mobile Workforce.mp4
|
123.0 MB
|
2008-03-26 CERIAS - Towards Event Source Location Privacy in Wireless Sensor Networks.mp4
|
131.1 MB
|
2008-04-02 CERIAS - Exploiting Opportunistic Scheduling in Cellular Data Networks.mp4
|
109.7 MB
|
2008-04-09 CERIAS - Shifting focus Aligning security with risk management.mp4
|
84.7 MB
|
2008-04-16 CERIAS - Static source code analysis.mp4
|
129.2 MB
|
2008-08-27 CERIAS - Exploitable Redirects on the Web Identification, Prevalence, and Defense.mp4
|
139.6 MB
|
2008-09-03 CERIAS - Private Queries in Location Based Services Anonymizers are not Necessary.mp4
|
113.7 MB
|
2008-09-10 CERIAS - Virtualization Resource Coupling and Security across the Stack.mp4
|
118.4 MB
|
2008-09-17 CERIAS - Fingerprint Sensor Interoperability Analysis of Error Rates for Fingerprint ....mp4
|
80.3 MB
|
2008-09-24 CERIAS - Responding to Anomalous Database Requests.mp4
|
93.1 MB
|
2008-10-01 CERIAS - Resilient Systems for Mission Assurance.mp4
|
93.8 MB
|
2008-10-08 CERIAS - Measuring the Attack Surfaces of Enterprise Software Systems.mp4
|
100.7 MB
|
2008-10-15 CERIAS - Signature Analysis Coupled With Slicing Analysis for the Validation of Softwa....mp4
|
68.1 MB
|
2008-10-22 CERIAS - Access Control and Resiliency for WS-BPEL.mp4
|
61.2 MB
|
2008-10-29 CERIAS - Trends in Identity Management.mp4
|
66.5 MB
|
2008-11-05 CERIAS - The merge of Anti-Tamper and Information Assurance - lessons lear....mp4
|
117.2 MB
|
2008-11-12 CERIAS - John Oritz, SRA International.mp4
|
98.1 MB
|
2008-11-19 CERIAS - The Role Graph Model and its Extensions.mp4
|
109.7 MB
|
2008-12-03 CERIAS - Automatic Signature Generation for Unknown Vulnerabilities.mp4
|
106.8 MB
|
2008-12-10 CERIAS - Extending anonymity research to high-tech white collar crimes and IT Insider ....mp4
|
94.4 MB
|
2008.m3u
|
2.3 KB
|
/CERIAS 2009/
|
2008-10-22 CERIAS - Access Control and Resiliency for WS-BPEL.mp4
|
61.2 MB
|
2009-01-14 CERIAS - Measuring Privacy A Risk-Based Approach.mp4
|
104.7 MB
|
2009-01-21 CERIAS - A Rules Based Statistical Algorithm for Keystroke Detection.mp4
|
55.7 MB
|
2009-01-28 CERIAS - An Alternate Memory Architecture for Code Injection Prevention.mp4
|
45.6 MB
|
2009-02-04 CERIAS - The dark side of software engineering and how to defend against it.mp4
|
53.8 MB
|
2009-02-11 CERIAS - Quantitative Risk Assessment of Software Security and Privacy, and Risk Manag....mp4
|
61.7 MB
|
2009-02-18 CERIAS - Mace Systems and Language Support for Building Correct, High-Performance Net....mp4
|
58.2 MB
|
2009-02-25 CERIAS - Providing Privacy through Plausibly Deniable Search.mp4
|
46.7 MB
|
2009-03-04 CERIAS - The Best Defense is Information.mp4
|
93.9 MB
|
2009-03-11 CERIAS - Security for the Next Internet over Heterogeneous Environments.mp4
|
135.4 MB
|
2009-03-25 CERIAS - Rick Clark, Ontario Systems.mp4
|
62.9 MB
|
2009-04-01 CERIAS - An Analysis of Data Breach Disclosure.mp4
|
139.7 MB
|
2009-04-08 CERIAS - Privacy from accessing databases to location based services.mp4
|
98.2 MB
|
2009-04-15 CERIAS - USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYST....mp4
|
124.6 MB
|
2009-04-22 CERIAS - Software Assurance Motivation, Background, and Acquisition Pursuits.mp4
|
112.6 MB
|
2009-08-26 CERIAS - Sphinx A Compact and Provably Secure Mix Format.mp4
|
107.5 MB
|
2009-09-02 CERIAS - Fake Picassos, Tampered History, and Digital Forgery Protecting the Genealog....mp4
|
130.0 MB
|
2009-09-09 CERIAS - Database Assurance Anomaly Detection for Relational Databases.mp4
|
97.2 MB
|
2009-09-16 CERIAS - From Security Architecture to Implementation.mp4
|
83.4 MB
|
2009-09-23 CERIAS - The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb....mp4
|
108.3 MB
|
2009-09-30 CERIAS - Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber S....mp4
|
150.6 MB
|
2009-10-07 CERIAS - The Building Security In Maturity Model (BSIMM).mp4
|
102.1 MB
|
2009-10-14 CERIAS - PlugNPlay Trust for Embedded Communication Systems.mp4
|
112.7 MB
|
2009-10-21 CERIAS - Information Security Management and IT Executives in a Top Management Team.mp4
|
116.9 MB
|
2009-10-28 CERIAS - Security in Infrastructureless and Decentralized Communication Networks - Pos....mp4
|
94.3 MB
|
2009-11-04 CERIAS - Multi-Policy Access Control for Healthcare using Policy Machine.mp4
|
71.5 MB
|
2009-11-11 CERIAS - Some Thoughts on the Pervasive Trust Foundation for the Future Internet Archi....mp4
|
110.4 MB
|
2009-11-18 CERIAS - Safely Analyzing Sensitive Network Data.mp4
|
129.1 MB
|
2009-12-02 CERIAS - Cyber Security Trends and Disruptors.mp4
|
159.0 MB
|
2009-12-09 CERIAS - Human Factors Approaches to Preserving Privacy.mp4
|
97.6 MB
|
2009.m3u
|
2.6 KB
|
/CERIAS 2010/
|
2010-01-13 CERIAS - Thinking Outside the Box.mp4
|
101.7 MB
|
2010-01-20 CERIAS - Applications of Biometric Technologies.mp4
|
113.0 MB
|
2010-02-03 CERIAS - Detecting Insider Theft of Trade Secrets.mp4
|
157.7 MB
|
2010-02-10 CERIAS - Dissecting Digital Data Context and Meaning through Analytics.mp4
|
126.1 MB
|
2010-02-17 CERIAS - Provenance-based Data Trustworthiness Assessment in Data Streams.mp4
|
110.9 MB
|
2010-02-24 CERIAS - Ribbons, A Partially-Shared Memory Programming Model.mp4
|
121.3 MB
|
2010-03-03 CERIAS - Detection and protection from denial of service attacks in grids by accountab....mp4
|
131.1 MB
|
2010-03-10 CERIAS - Making of the CWE Top-25, 2010 Edition.mp4
|
120.2 MB
|
2010-03-24 CERIAS - A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems.mp4
|
125.4 MB
|
2010-03-31 CERIAS - Everything I Needed to Know about Security, I Learned in 1974.mp4
|
148.6 MB
|
2010-04-07 CERIAS - 60 years of scientific research in cryptography a reflection.mp4
|
160.9 MB
|
2010-04-14 CERIAS - Security of JavaScript in a Browser Environment.mp4
|
110.1 MB
|
2010-04-21 CERIAS - The role of System Security Engineering in the engineering lifecycle.mp4
|
161.8 MB
|
2010-04-28 CERIAS - Ontological Semantic Technology for Detecting Insider Threat and Socia....mp4
|
142.4 MB
|
2010-08-25 CERIAS - Secure Network Coding for Wireless Mesh Networks.mp4
|
134.6 MB
|
2010-09-01 CERIAS - Data in the Cloud Authentication Without Leaking.mp4
|
147.1 MB
|
2010-09-08 CERIAS - Rootkits.mp4
|
185.9 MB
|
2010-09-15 CERIAS - Side Channel Threats in the Software-as-a-Service Era Challenges and Respons....mp4
|
183.8 MB
|
2010-09-22 CERIAS - Security of Mobile Ad Hoc Networks (MANETs).mp4
|
145.3 MB
|
2010-09-29 CERIAS - Assured Processing through Obfuscation.mp4
|
124.0 MB
|
2010-10-06 CERIAS - Global Study of Web 2.0 Use in Organizations.mp4
|
130.2 MB
|
2010-10-13 CERIAS - Fast Regular Expression Matching using Small TCAMs for Network Intrusion Dete....mp4
|
150.4 MB
|
2010-10-20 CERIAS - Trust and Protection in the Illinois Browser Operating System.mp4
|
140.4 MB
|
2010-10-27 CERIAS - The role of automata theory in software verification.mp4
|
161.6 MB
|
2010-11-03 CERIAS - Tackling System-Wide Integrity.mp4
|
155.0 MB
|
2010-11-10 CERIAS - Detecting Coordinated Attacks with Traffic Analysis.mp4
|
128.6 MB
|
2010-11-17 CERIAS - Security Applications for Physically Unclonable Functions.mp4
|
151.4 MB
|
2010-12-01 CERIAS - Nudging the Digital Pirate Behavioral Issues in the Piracy Context.mp4
|
123.3 MB
|
2010.m3u
|
2.3 KB
|
/CERIAS 2011/
|
2011-01-12 CERIAS - Risk Perception and Trust in Cloud.mp4
|
104.4 MB
|
2011-01-19 CERIAS - Retrofitting Legacy Code for Security.mp4
|
114.0 MB
|
2011-01-26 CERIAS - User and Machine Authentication and Authorization Infrastructure for Distrib....mp4
|
137.6 MB
|
2011-02-09 CERIAS - Understanding insiders An analysis of risk-taking behavior.mp4
|
141.1 MB
|
2011-02-23 CERIAS - A couple of results about JavaScript.mp4
|
105.2 MB
|
2011-03-02 CERIAS - Modeling DNS Security Misconfiguration, Availability, and Visualizatio....mp4
|
137.7 MB
|
2011-03-09 CERIAS - Exploiting Banners for Fun and Profits.mp4
|
115.5 MB
|
2011-03-23 CERIAS - Wireless Technologies and how it relates to cyber security research.mp4
|
115.3 MB
|
2011-04-06 CERIAS - Society, Law Enforcement and the Internet Models for Give and Take.mp4
|
164.8 MB
|
2011-04-13 CERIAS - FuzzyFusion(tm), an application architecture for multisource informati....mp4
|
121.9 MB
|
2011-04-20 CERIAS - Semantic Security or How I Learned to Stop Worrying and Looooooove the....mp4
|
173.8 MB
|
2011-04-27 CERIAS - Mobile Phones and Evidence Preservation.mp4
|
150.7 MB
|
2011-08-24 CERIAS - Provisioning Protocol Challenges in an Era of gTLD Expansion.mp4
|
150.8 MB
|
2011-08-31 CERIAS - Non-homogeneous anonymizations.mp4
|
146.7 MB
|
2011-09-07 CERIAS - Detecting Bots in Online Games using Human Observational Proofs.mp4
|
154.6 MB
|
2011-09-14 CERIAS - What does Knowledge Discovery, Predictability, and Human Behavior have to do ....mp4
|
135.4 MB
|
2011-09-21 CERIAS - Methods and Techniques for Protecting Data in Real Time on the Wire.mp4
|
115.6 MB
|
2011-09-28 CERIAS - Weighted Multiple Secret Sharing.mp4
|
126.3 MB
|
2011-10-05 CERIAS - Trusted Computing and Security for Embedded Systems.mp4
|
123.7 MB
|
2011-10-12 CERIAS - Enterprise-Wide Intrusions Involving Advanced Threats.mp4
|
138.5 MB
|
2011-10-19 CERIAS - Ontological Semantic Technology Goes Phishing.mp4
|
142.0 MB
|
2011-10-26 CERIAS - Securing Application-Level Topology Estimation Networks Facing the Frog-Boil....mp4
|
74.1 MB
|
2011-11-02 CERIAS - SureView AMP, Active Malware Protection, detecting malware anti virus solutio....mp4
|
103.0 MB
|
2011-11-09 CERIAS - Process Implanting A New Active Introspection Framework for Virtualization.mp4
|
81.5 MB
|
2011-11-16 CERIAS - Jam me if you can Mitigating the Impact of Inside Jammers.mp4
|
160.0 MB
|
2011-11-30 CERIAS - Soundcomber A Stealthy and Context-Aware Sound Trojan for Smartphones.mp4
|
181.5 MB
|
2011.m3u
|
2.3 KB
|
/CERIAS 2012/
|
2012-01-11 CERIAS - Introduction to Biometrics.mp4
|
120.9 MB
|
2012-01-18 CERIAS - Secure Provenance Transmission for Data Streams.mp4
|
116.6 MB
|
2012-01-25 CERIAS - A Flexible System for Access Control.mp4
|
126.6 MB
|
2012-02-01 CERIAS - Is it time to add Trust to the Future Internet Web.mp4
|
130.5 MB
|
2012-02-08 CERIAS - Digital Citizenship A Target s View of Security and Life Online.mp4
|
123.3 MB
|
2012-02-15 CERIAS - Forensic Carving of Network Packets with bulk_extractor and tcpflow.mp4
|
116.9 MB
|
2012-02-22 CERIAS - Vulnerability Path and Assessment.mp4
|
146.4 MB
|
2012-02-29 CERIAS - Cryptographic protocols in the era of cloud computing.mp4
|
147.9 MB
|
2012-03-07 CERIAS - Privacy-Preserving Assessment of Location Data Trustworthiness.mp4
|
132.6 MB
|
2012-03-21 CERIAS - Adding a Software Assurance Dimension to Supply Chain Practices.mp4
|
112.7 MB
|
2012-03-28 CERIAS - Privacy preserving attribute based group key management.mp4
|
101.5 MB
|
2012-04-11 - K-Anonymity in Social Networks A Clustering Approach - CERIAS Security Seminar.mp4
|
148.2 MB
|
2012-04-18 - Firmware Risks The Next Frontier - Steve Battista, MITRE.mp4
|
104.7 MB
|
2012-08-22 CERIAS - The new frontier, welcome the Cloud Brokers.mp4
|
125.1 MB
|
2012-08-29 CERIAS - Challenges for R&D in the Security Field.mp4
|
524.0 MB
|
2012-08-29 CERIAS - Challenges for R&_D in the Security Field.mp4
|
174.2 MB
|
2012-09-05 CERIAS - The Inertia of Productivity.mp4
|
158.6 MB
|
2012-09-12 CERIAS - Trends in cyber security consulting.mp4
|
126.9 MB
|
2012-09-19 CERIAS - Global Revocation for the Intersection Collision Warning Safety Application.mp4
|
135.3 MB
|
2012-09-26 CERIAS - Leveraging internal network traffic to detect malicious activity Lessons lea....mp4
|
123.7 MB
|
2012-10-03 CERIAS - Defending Users Against Smartphone Apps Techniques and Future Directions.mp4
|
148.0 MB
|
2012-10-10 CERIAS - Understanding Spam Economics.mp4
|
160.5 MB
|
2012-10-17 CERIAS - The Boeing Company.mp4
|
142.0 MB
|
2012-10-24 CERIAS - Detecting Maliciousness Using Periodic Mobile Forensics.mp4
|
120.6 MB
|
2012-10-31 CERIAS - Risk perception of information security risks online.mp4
|
170.4 MB
|
2012-11-07 CERIAS - Publishing Microdata with a Robust Privacy Guarantee.mp4
|
137.4 MB
|
2012-11-14 CERIAS - Not the Who but the What -- New applications of Hardware Identity.mp4
|
72.5 MB
|
2012-11-28 CERIAS - A New Class of Buffer Overflow Attacks.mp4
|
123.4 MB
|
2012-12-05 CERIAS - You are Anonymous!!! Then you must be Lucky.mp4
|
126.7 MB
|
2012.m3u
|
2.2 KB
|
/CERIAS 2013/
|
2013-01-23 CERIAS - Differentially Private Publishing of Geospatial Data.mp4
|
133.4 MB
|
2013-01-30 CERIAS - A Semantic Baseline for Spam Filtering.mp4
|
126.4 MB
|
2013-02-06 CERIAS - Using Probabilistic Generative Models for Ranking Risks of Android Apps.mp4
|
120.1 MB
|
2013-02-13 CERIAS - I m not stealing, I m merely borrowing - Plagiarism in Smartphone App Markets.mp4
|
129.1 MB
|
2013-02-20 CERIAS - Minimizing Private Data Disclosures in the Smart Grid.mp4
|
95.7 MB
|
2013-03-06 CERIAS - Whole Genome Sequencing Innovation Dream or Privacy Nightmare.mp4
|
119.7 MB
|
2013-03-20 CERIAS - Active Cyber Network Defense with Denial and Deception.mp4
|
109.6 MB
|
2013-03-27 CERIAS - Regulatory Compliance Software Engineering.mp4
|
97.9 MB
|
2013-04-17 CERIAS - Towards Automated Problem Inference from Trouble Tickets.mp4
|
112.6 MB
|
2013-04-24 CERIAS - Identity-Based Internet Protocol Network.mp4
|
66.5 MB
|
2013-08-21 CERIAS - New possibilities of steganography based on Kuznetsov-Tsybakov problem.mp4
|
109.2 MB
|
2013-08-28 CERIAS - Information Security Challenges in an Academic Environment.mp4
|
97.3 MB
|
2013-09-04 CERIAS - BIOS Chronomancy Using Timing-Based Attestation to Detect Firmware Rootkits.mp4
|
89.1 MB
|
2013-09-18 CERIAS - Facebook Protecting a billion identities without losing (much) sleep.mp4
|
119.5 MB
|
2013-09-25 CERIAS - The Durkheim Project Privacy Considerations in Predicting Military and Vete....mp4
|
125.2 MB
|
2013-10-23 CERIAS - Systems of Systems Opportunities and Challenges.mp4
|
129.8 MB
|
2013-10-30 CERIAS - Membership Privacy A Unifying Framework For Privacy Definitions.mp4
|
139.5 MB
|
2013-11-06 CERIAS - Yahoo! Messenger Forensics on Windows Vista and Windows 7.mp4
|
73.7 MB
|
2013-11-20 CERIAS - Trust Management for Publishing Graph Data.mp4
|
141.7 MB
|
2013-12-04 CERIAS - Economic Policy and Cyber Challenges in Estonia.mp4
|
62.5 MB
|
2013.m3u
|
1.8 KB
|
GPRI Global Connections Lecture Series - Mr. Norman R. Augustine.mp4
|
397.6 MB
|
/CERIAS 2014/
|
15th Annual CERIAS Info. Sec. Symposium 2014 - Fireside Chat.mp4
|
84.0 MB
|
15th Annual CERIAS Info. Sec. Symposium 2014 - Keynote Day 2.mp4
|
75.1 MB
|
15th Annual CERIAS Info. Sec. Symposium 2014 - Opening Keynote.mp4
|
73.1 MB
|
15th Annual CERIAS Info. Sec. Symposium 2014 - Panel 1.mp4
|
72.9 MB
|
15th Annual CERIAS Info. Sec. Symposium 2014 - Security Plus (not Versus) Privacy.mp4
|
114.0 MB
|
15th Annuall CERIAS Info. Sec. Symposium 2014 - Panel 2.mp4
|
100.5 MB
|
2014-01-29 CERIAS - Secure and Private Outsourcing to Untrusted Cloud Servers.mp4
|
129.1 MB
|
2014-02-12 CERIAS - Beehive Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp....mp4
|
93.3 MB
|
2014-02-19 CERIAS - Technical Tradeoffs in the NSA s Mass Phone Call Program.mp4
|
147.8 MB
|
2014-02-26 CERIAS - Delivering Always-on Services Despite Flaky Network Infrastructur....mp4
|
128.6 MB
|
2014-03-05 CERIAS - Machine Intelligence for Biometric and On-Line Security.mp4
|
68.7 MB
|
2014-03-12 CERIAS - General-Purpose Secure Computation and Outsourcing.mp4
|
163.1 MB
|
2014-03-26 CERIAS - Why so CERIAS! Why we re losing and what to do about it..mp4
|
166.7 MB
|
2014-04-02 CERIAS - CERIAS Poster Contest Winners.mp4
|
62.6 MB
|
2014-04-09 CERIAS - Integrity Levels A New Paradigm for Protecting Computing Systems.mp4
|
77.4 MB
|
2014-04-16 CERIAS - Online Privacy Agreements, is it Informed Consent.mp4
|
74.4 MB
|
2014-09-03 CERIAS - DSCRETE Automatic Rendering of Forensic Information from Memory Images via A....mp4
|
27.1 MB
|
2014.m3u
|
1.5 KB
|
CERIAS Info. Sec. Symposium 2014 - Awards - Purdue University.mp4
|
59.7 MB
|
/CERIAS 2015/
|
2015-01-14 CERIAS - Learning from Information Security Maturity A Textual Analysis.mp4
|
98.1 MB
|
2015-01-21 CERIAS - Security with Privacy - A Research Agenda.mp4
|
61.6 MB
|
2015-02-11 CERIAS - Code-Pointer Integrity.mp4
|
47.1 MB
|
2015-02-18 CERIAS - Privacy Notions for Data Publishing and Analysis.mp4
|
72.5 MB
|
2015-02-25 CERIAS - Software updates decisions and security implications.mp4
|
78.7 MB
|
2015-03-04 CERIAS - Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology.mp4
|
59.8 MB
|
2015-03-11 CERIAS - Virtual Android Malware Detection and Analysis (VAMDA).mp4
|
39.0 MB
|
2015.m3u
|
0.9 KB
|
CERIAS - 2015-03-24 Panel Discussion Advanced Persistent Gullibility.mp4
|
165.2 MB
|
CERIAS - 2015-03-24 Security Fireside Chat.mp4
|
144.9 MB
|
CERIAS - 2015-03-24 Technologies for Secure Medical Devices.mp4
|
90.9 MB
|
CERIAS - 2015-03-24 - Invited Talk Sam Curry - CTO and CSO, Arbor Networks.mp4
|
122.6 MB
|
CERIAS - 2015-03-25 Awards - 16th Annual Information Security Symposium.mp4
|
25.6 MB
|
CERIAS - 2015-03-25 Closing Comments.mp4
|
9.8 MB
|
CERIAS - 2015-03-25 Firewall Policy Language and Complexity.mp4
|
60.8 MB
|
CERIAS - 2015-03-25 Indiana - Information Sharing and Analysis Center.mp4
|
31.7 MB
|
CERIAS - 2015-03-25 Panel Discussion Financial Sector Security.mp4
|
139.6 MB
|
CERIAS - 2015-03-25 Program Overview CERIAS Sypris Cyber Range.mp4
|
29.3 MB
|
CERIAS - 2015-03-25 Trustworthy Data from Untrusted Services.mp4
|
47.3 MB
|
CERIAS - 2015-04-08 Privacy Potpourri Changing Privacy from the Bottom Up.mp4
|
287.3 MB
|
CERIAS 2015-03-24 Program Overview INSuRE, Melissa Dark.mp4
|
48.6 MB
|
CERIAS 2015-03-25 Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.mp4
|
335.1 MB
|
CERIAS 2015-04-01 Breaking Mobile Social Networks for Automated User Location Tracking.mp4
|
171.9 MB
|
CERIAS Annual Symposium 2015.m3u
|
0.9 KB
|
Regulatory Compliance Checking Over Encrypted Audit Logs.mp4
|
205.6 MB
|
/CERIAS 2016/
|
2016-08-24 CERIAS - Secure Coding - Patterns and anti-patterns in the design and architecture of ....en.transcribed.srt
|
108.7 KB
|
2016-08-24 CERIAS - Secure Coding - Patterns and anti-patterns in the design and architecture of ....mp4
|
197.2 MB
|
2016-08-31 CERIAS - Towards Safe In-memory Transactions.en.transcribed.srt
|
123.6 KB
|
2016-08-31 CERIAS - Towards Safe In-memory Transactions.mp4
|
81.3 MB
|
2016-09-07 CERIAS - Improving Outcomes with Services.en.transcribed.srt
|
82.6 KB
|
2016-09-07 CERIAS - Improving Outcomes with Services.mp4
|
97.4 MB
|
2016-09-14 CERIAS - General Motors Product Cybersecurity Overview.en.transcribed.srt
|
110.2 KB
|
2016-09-14 CERIAS - General Motors Product Cybersecurity Overview.mp4
|
142.6 MB
|
2016-09-21 CERIAS - The Internet of Value Privacy and Applications.mp4
|
117.4 MB
|
2016-09-28 CERIAS - The role of cyber insurance in security and risk management.en.transcribed.srt
|
131.4 KB
|
2016-09-28 CERIAS - The role of cyber insurance in security and risk management.mp4
|
144.2 MB
|
2016-10-05 CERIAS - Growing Up In Cyber, But Is Cyber Growing Up.en.transcribed.srt
|
149.5 KB
|
2016-10-05 CERIAS - Growing Up In Cyber, But Is Cyber Growing Up.mp4
|
127.7 MB
|
2016-10-12 CERIAS - Enforcing Least Privilege Memory Views for Multithreaded Applications.en.transcribed.srt
|
62.7 KB
|
2016-10-12 CERIAS - Enforcing Least Privilege Memory Views for Multithreaded Applications.mp4
|
33.0 MB
|
2016-10-19 CERIAS - Usable and Secure Human Authentication.en.transcribed.srt
|
113.7 KB
|
2016-10-19 CERIAS - Usable and Secure Human Authentication.mp4
|
98.0 MB
|
2016-10-26 CERIAS - New Research and Resources in NL IAS at Purdue.mp4
|
99.0 MB
|
2016-11-16 CERIAS - The Application of Natural Language Processing to Open Source Intelligence fo....en.transcribed.srt
|
74.7 KB
|
2016-11-16 CERIAS - The Application of Natural Language Processing to Open Source Intelligence fo....mp4
|
68.0 MB
|
2016-11-30 CERIAS - Digital Identity Protection.en.transcribed.srt
|
89.2 KB
|
2016-11-30 CERIAS - Digital Identity Protection.mp4
|
80.1 MB
|
CERIAS - 2015-01-20 - Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.en.transcribed.srt
|
90.5 KB
|
CERIAS - 2015-01-20 - Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.mp4
|
130.9 MB
|
CERIAS - 2015-01-20 - Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.srt
|
54.4 KB
|
CERIAS - 2016-01-27 - Big Data Security and Privacy.mp4
|
170.0 MB
|
CERIAS - 2016-02-03 - Robust Secure Computation.mp4
|
108.4 MB
|
CERIAS - 2016-02-10 - IN-ISAC SOC, Security Awareness and More.mp4
|
186.2 MB
|
CERIAS - 2016-02-17 - Predicting What Users Will do Next.en.transcribed.srt
|
75.9 KB
|
CERIAS - 2016-02-17 - Predicting What Users Will do Next.mp4
|
114.3 MB
|
CERIAS - 2016-02-17 - Predicting What Users Will do Next.srt
|
44.2 KB
|
CERIAS - 2016-02-24 - Xukai Zou - Indiana University-Purdue University Indianapolis.mp4
|
174.3 MB
|
CERIAS - 2016-03-09 - Batch Techniques for Practical Private Information Retrieval.en.transcribed.srt
|
170.0 KB
|
CERIAS - 2016-03-09 - Batch Techniques for Practical Private Information Retrieval.mp4
|
194.3 MB
|
CERIAS - 2016-03-09 - Batch Techniques for Practical Private Information Retrieval.srt
|
80.2 KB
|
CERIAS - 2016-03-23 - Usable Secure Webmail for Grassroots Adoption.en.transcribed.srt
|
147.5 KB
|
CERIAS - 2016-03-23 - Usable Secure Webmail for Grassroots Adoption.mp4
|
129.1 MB
|
CERIAS - 2016-03-23 - Usable Secure Webmail for Grassroots Adoption.srt
|
84.2 KB
|
CERIAS - 2016-03-30 - Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.en.transcribed.srt
|
115.8 KB
|
CERIAS - 2016-03-30 - Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.mp4
|
114.4 MB
|
CERIAS - 2016-03-30 - Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.srt
|
68.0 KB
|
CERIAS - 2016-04-06 - Finding Specification Noncompliance and Attacks in Wireless Network....en.transcribed.srt
|
101.6 KB
|
CERIAS - 2016-04-06 - Finding Specification Noncompliance and Attacks in Wireless Network....mp4
|
108.0 MB
|
CERIAS - 2016-04-06 - Finding Specification Noncompliance and Attacks in Wireless Network....srt
|
59.5 KB
|
CERIAS - 2016-04-13 - Privacy-preserving payments in credit networks.mp4
|
106.0 MB
|
CERIAS - 2016-04-20 - Life as a Target.en.transcribed.srt
|
109.0 KB
|
CERIAS - 2016-04-20 - Life as a Target.mp4
|
175.6 MB
|
CERIAS - 2016-04-20 - Life as a Target.srt
|
57.8 KB
|
CERIAS - 2016-04-27 - ErsatzPasswords - Ending Password Cracking.en.transcribed.srt
|
60.0 KB
|
CERIAS - 2016-04-27 - ErsatzPasswords - Ending Password Cracking.mp4
|
74.9 MB
|
CERIAS - Annual Information Security Symposium Awards.en.transcribed.srt
|
19.2 KB
|
CERIAS - Annual Information Security Symposium Awards.mp4
|
34.2 MB
|
CERIAS - Automatically Recovering Human-Understandable Evidence from Memory Images.en.transcribed.srt
|
68.2 KB
|
CERIAS - Automatically Recovering Human-Understandable Evidence from Memory Images.mp4
|
82.2 MB
|
CERIAS - CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.en.transcribed.srt
|
67.8 KB
|
CERIAS - CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.mp4
|
88.0 MB
|
CERIAS - Context Aware, Policy based approaches to Security.en.transcribed.srt
|
142.1 KB
|
CERIAS - Context Aware, Policy based approaches to Security.mp4
|
185.2 MB
|
CERIAS - Context Aware, Policy based approaches to Security.srt
|
65.0 KB
|
CERIAS - IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.en.transcribed.srt
|
53.4 KB
|
CERIAS - IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.mp4
|
75.0 MB
|
CERIAS - Information Security Through the Lens of Crisis Organizations.mp4
|
68.2 MB
|
CERIAS - The Role of the NSA in the Development of DES.en.transcribed.srt
|
118.1 KB
|
CERIAS - The Role of the NSA in the Development of DES.mp4
|
183.7 MB
|
CERIAS - nesCheck Memory Safety for Embedded Devices.en.transcribed.srt
|
71.7 KB
|
CERIAS - nesCheck Memory Safety for Embedded Devices.mp4
|
81.5 MB
|
/CERIAS 2017/
|
2017-01-11 CERIAS - Differential Guarantees for Cryptographic Systems.mp4
|
57.2 MB
|
2017-01-18 CERIAS - Emerging Cyber Threats.mp4
|
119.8 MB
|
2017-01-25 CERIAS - Changing the Economics of the Network.en.transcribed.srt
|
85.1 KB
|
2017-01-25 CERIAS - Changing the Economics of the Network.mp4
|
73.9 MB
|
2017-02-01 CERIAS - Network Deception as a Threat Intelligence Platform.en.transcribed.srt
|
165.7 KB
|
2017-02-01 CERIAS - Network Deception as a Threat Intelligence Platform.mp4
|
103.9 MB
|
2017-02-08 CERIAS - Cyber Security in Large Complex Corporations.en.transcribed.srt
|
108.6 KB
|
2017-02-08 CERIAS - Cyber Security in Large Complex Corporations.mp4
|
123.6 MB
|
2017-02-15 CERIAS - Behavioral and Computational Aspects of Network Security Games.en.transcribed.srt
|
98.2 KB
|
2017-02-15 CERIAS - Behavioral and Computational Aspects of Network Security Games.mp4
|
77.6 MB
|
2017-02-22 CERIAS - A2C Self Destructing Exploit Executions via Input Perturbation.en.transcribed.srt
|
103.6 KB
|
2017-02-22 CERIAS - A2C Self Destructing Exploit Executions via Input Perturbation.mp4
|
55.8 MB
|
2017-03-08 CERIAS - The Rise of Cyber-Crime A Legal Perspective.en.transcribed.srt
|
128.1 KB
|
2017-03-08 CERIAS - The Rise of Cyber-Crime A Legal Perspective.mp4
|
167.7 MB
|
2017-03-29 CERIAS - DataShield Configurable Data Confidentiality and Integrity.en.transcribed.srt
|
69.6 KB
|
2017-03-29 CERIAS - DataShield Configurable Data Confidentiality and Integrity.mp4
|
54.9 MB
|
2017-04-26 CERIAS - Enabling Trust and Efficiency in Provenance-Aware Systems.en.transcribed.srt
|
160.9 KB
|
2017-04-26 CERIAS - Enabling Trust and Efficiency in Provenance-Aware Systems.mp4
|
136.3 MB
|
2017-08-23 CERIAS - MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ....en.transcribed.srt
|
103.3 KB
|
2017-08-23 CERIAS - MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ....mp4
|
86.9 MB
|
2017-08-30 CERIAS - The Stark Reality of Red vs. Blue and Why it's Not Working.en.transcribed.srt
|
169.7 KB
|
2017-08-30 CERIAS - The Stark Reality of Red vs. Blue and Why it's Not Working.mp4
|
190.1 MB
|
CERIAS - 03 22 2017 - CIO Risk Appetite and Information Security Management.en.transcribed.srt
|
116.5 KB
|
CERIAS - 03 22 2017 - CIO Risk Appetite and Information Security Management.mp4
|
70.2 MB
|
CERIAS - Symposium 2017 - Brig Gen. Greg Touhill, (USAF Ret.).en.transcribed.srt
|
122.0 KB
|
CERIAS - Symposium 2017 - Brig Gen. Greg Touhill, (USAF Ret.).mp4
|
91.2 MB
|
CERIAS - Symposium 2017 - Brig Gen. Greg Touhill, (USAF Ret.).srt
|
122.0 KB
|
CERIAS - Symposium 2017 - Panel 2 Security Through Artificial Intelligence.mp4
|
126.0 MB
|
CERIAS - Symposium 2017 - Welcome - Ian Steff, Indiana Economic Development Corporation.en.transcribed.srt
|
62.3 KB
|
CERIAS - Symposium 2017 - Welcome - Ian Steff, Indiana Economic Development Corporation.mp4
|
51.2 MB
|
CERIAS - Symposium 2017 - Welcome - Ian Steff, Indiana Economic Development Corporation.srt
|
49.2 KB
|
CERIAS - Symposium 2017 - Women in CyberSecurity Report.en.transcribed.srt
|
58.7 KB
|
CERIAS - Symposium 2017 - Women in CyberSecurity Report.mp4
|
33.3 MB
|
CERIAS - Symposium 2017 - Women in CyberSecurity Report.srt
|
58.7 KB
|
CERIAS 2017-04-12- Information Flow Security in Practical Systems.en.transcribed.srt
|
178.4 KB
|
CERIAS 2017-04-12- Information Flow Security in Practical Systems.mp4
|
69.7 MB
|
CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire.en.transcribed.srt
|
202.3 KB
|
CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire.mp4
|
115.9 MB
|
CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire.srt
|
202.3 KB
|
CERIAS Symposium 2017 - Fireside Chat.en.transcribed.srt
|
164.1 KB
|
CERIAS Symposium 2017 - Fireside Chat.mp4
|
135.9 MB
|
CERIAS Symposium 2017 - Fireside Chat.srt
|
164.1 KB
|
CERIAS Symposium 2017 - INSuRE Program Overview.en.transcribed.srt
|
66.1 KB
|
CERIAS Symposium 2017 - INSuRE Program Overview.mp4
|
42.1 MB
|
CERIAS Symposium 2017 - INSuRE Program Overview.srt
|
66.1 KB
|
CERIAS Symposium 2017 - Lok Yan.en.transcribed.srt
|
73.8 KB
|
CERIAS Symposium 2017 - Lok Yan.mp4
|
49.3 MB
|
CERIAS Symposium 2017 - Panel 3 - Securing Vehicles & Machinery.en.transcribed.srt
|
173.9 KB
|
CERIAS Symposium 2017 - Panel 3 - Securing Vehicles & Machinery.mp4
|
166.7 MB
|
CERIAS Symposium 2017 - Panel 3 - Securing Vehicles & Machinery.srt
|
173.9 KB
|
CERIAS Symposium 2017 - Panel 4 - Securing Smart Communities.en.transcribed.srt
|
160.4 KB
|
CERIAS Symposium 2017 - Panel 4 - Securing Smart Communities.mp4
|
168.4 MB
|
CERIAS Symposium 2017 - Panel 4 - Securing Smart Communities.srt
|
160.4 KB
|
CERIAS Symposium 2017 - Prof. Eugene Spafford.en.transcribed.srt
|
6.6 KB
|
CERIAS Symposium 2017 - Prof. Eugene Spafford.mp4
|
6.9 MB
|
CERIAS Symposium 2017 - Prof. Eugene Spafford.srt
|
6.6 KB
|
CERIAS Symposium 2017 - Prof. Mathias Payer.en.transcribed.srt
|
94.7 KB
|
CERIAS Symposium 2017 - Prof. Mathias Payer.mp4
|
76.4 MB
|
CERIAS Symposium 2017 - Prof. Mathias Payer.srt
|
94.7 KB
|
CERIAS Symposium 2017 - Ron Ross - NIST.mp4
|
127.2 MB
|
CERIAS Symposium 2017 - TechTalk - Jeremiah M. Blocki - YouTube.mp4
|
73.4 MB
|
CERIAS Symposium 2017 - TechTalk - Jeremiah M. Blocki - YouTube.srt
|
69.1 KB
|
CERIAS Symposium 2017 - TechTalk - Jeremiah M. Blocki.en.transcribed.srt
|
69.1 KB
|
CERIAS Symposium 2017 - TechTalk - Jeremiah M. Blocki.mp4
|
43.3 MB
|
CERIAS Symposium 2017 - TechTalk - Shreyas Sundaram.en.transcribed.srt
|
90.3 KB
|
CERIAS Symposium 2017 - TechTalk - Shreyas Sundaram.mp4
|
53.5 MB
|
CERIAS Symposium 2017 - TechTalk - Shreyas Sundaram.srt
|
90.3 KB
|
CERIAS Symposium 2017 - TechTalk Making the Internet Fast Again...At The Cost of Security.en.transcribed.srt
|
43.2 KB
|
CERIAS Symposium 2017 - TechTalk Making the Internet Fast Again...At The Cost of Security.mp4
|
36.2 MB
|
CERIAS Symposium 2017 - TechTalk Making the Internet Fast Again...At The Cost of Security.srt
|
43.2 KB
|
Symposium 2017 - Panel 1 - Security Through Formal Methods and Secure Architecture.en.transcribed.srt
|
143.3 KB
|
Symposium 2017 - Panel 1 - Security Through Formal Methods and Secure Architecture.mp4
|
111.1 MB
|
Symposium 2017 - Panel 1 - Security Through Formal Methods and Secure Architecture.srt
|
115.8 KB
|
/CERIAS 2018/
|
2018-01-17 CERIAS - The Economics of Offline Password Cracking.en.transcribed.srt
|
136.7 KB
|
2018-01-17 CERIAS - The Economics of Offline Password Cracking.mp4
|
76.1 MB
|
2018-01-24 CERIAS - What Roles Can Empirical Research Play to Advance Software Security Knowledg....en.transcribed.srt
|
137.8 KB
|
2018-01-24 CERIAS - What Roles Can Empirical Research Play to Advance Software Security Knowledg....mp4
|
73.5 MB
|
2018-01-31 CERIAS - State of Cybersecurity in Healthcare.en.transcribed.srt
|
203.3 KB
|
2018-01-31 CERIAS - State of Cybersecurity in Healthcare.mp4
|
97.7 MB
|
2018-02-07 CERIAS - Eli Lilly 's Path to a Successful Threat Intelligence Program.en.transcribed.srt
|
140.9 KB
|
2018-02-07 CERIAS - Eli Lilly 's Path to a Successful Threat Intelligence Program.mp4
|
96.7 MB
|
2018-02-14 CERIAS - OBLIVIATE A Data Oblivious File System for Intel SGX.en.transcribed.srt
|
169.3 KB
|
2018-02-14 CERIAS - OBLIVIATE A Data Oblivious File System for Intel SGX.mp4
|
65.5 MB
|
2018-02-21 CERIAS - Lessons Learned From the Retrocomputing Community.en.transcribed.srt
|
148.2 KB
|
2018-02-21 CERIAS - Lessons Learned From the Retrocomputing Community.mp4
|
49.2 MB
|
2018-02-28 CERIAS - Threats and Risks in Cryptocurrencies.en.transcribed.srt
|
121.3 KB
|
2018-02-28 CERIAS - Threats and Risks in Cryptocurrencies.mp4
|
76.1 MB
|
2018-03-07 CERIAS - CFIXX -- Object Type Integrity for C++.en.transcribed.srt
|
116.1 KB
|
2018-03-07 CERIAS - CFIXX -- Object Type Integrity for C++.mp4
|
44.7 MB
|
2018-03-21 CERIAS - Mind Your Credit Assessing the Health of the Ripple Credit Network.mp4
|
71.2 MB
|
2018-03-28 CERIAS - Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai....en.transcribed.srt
|
152.5 KB
|
2018-03-28 CERIAS - Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai....mp4
|
87.3 MB
|
CERIAS - Symposium 2018 - Awards.en.transcribed.srt
|
71.6 KB
|
CERIAS - Symposium 2018 - Awards.mp4
|
48.1 MB
|
CERIAS - Symposium 2018 - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.en.transcribed.srt
|
180.0 KB
|
CERIAS - Symposium 2018 - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.mp4
|
109.0 MB
|
CERIAS - Symposium 2018 - Blockchains A Technical Perspective on the Future of Decentralization.en.transcribed.srt
|
95.4 KB
|
CERIAS - Symposium 2018 - Blockchains A Technical Perspective on the Future of Decentralization.mp4
|
46.7 MB
|
CERIAS - Symposium 2018 - Cyber Center for Education and Innovation.en.transcribed.srt
|
39.2 KB
|
CERIAS - Symposium 2018 - Cyber Center for Education and Innovation.mp4
|
25.8 MB
|
CERIAS - Symposium 2018 - Developing a Public Private Cybersec Scorecard for the State of Indiana.en.transcribed.srt
|
84.6 KB
|
CERIAS - Symposium 2018 - Developing a Public Private Cybersec Scorecard for the State of Indiana.mp4
|
50.7 MB
|
CERIAS - Symposium 2018 - Firesdie Chat What’s Ahead – The Spirit of Cybersecurity Yet to Come.en.transcribed.srt
|
195.8 KB
|
CERIAS - Symposium 2018 - Firesdie Chat What’s Ahead – The Spirit of Cybersecurity Yet to Come.mp4
|
166.1 MB
|
CERIAS - Symposium 2018 - Fireside Chat Cybersecurity Past.en.transcribed.srt
|
180.7 KB
|
CERIAS - Symposium 2018 - Fireside Chat Cybersecurity Past.mp4
|
178.4 MB
|
CERIAS - Symposium 2018 - Fireside Chat The State of Cybersecurity Education.en.transcribed.srt
|
134.9 KB
|
CERIAS - Symposium 2018 - Fireside Chat The State of Cybersecurity Education.mp4
|
154.6 MB
|
CERIAS - Symposium 2018 - History of CERIAS - Eugene Spafford.mp4
|
137.0 MB
|
CERIAS - Symposium 2018 - Human Biases Meet Cybersecurity of Embedded and Networked Systems.en.transcribed.srt
|
106.7 KB
|
CERIAS - Symposium 2018 - Human Biases Meet Cybersecurity of Embedded and Networked Systems.mp4
|
56.3 MB
|
CERIAS - Symposium 2018 - Indiana Cybersecurity Initiatives.en.transcribed.srt
|
96.0 KB
|
CERIAS - Symposium 2018 - Indiana Cybersecurity Initiatives.mp4
|
57.1 MB
|
CERIAS - Symposium 2018 - Keynote Mark Spangler.en.transcribed.srt
|
165.6 KB
|
CERIAS - Symposium 2018 - Keynote Mark Spangler.mp4
|
120.4 MB
|
CERIAS - Symposium 2018 - Keynote Mark Weatherford.en.transcribed.srt
|
127.4 KB
|
CERIAS - Symposium 2018 - Keynote Mark Weatherford.mp4
|
106.3 MB
|
CERIAS - Symposium 2018 - Online Adversarial Learning of Nuclear Reactor Dynamical State.en.transcribed.srt
|
71.2 KB
|
CERIAS - Symposium 2018 - Online Adversarial Learning of Nuclear Reactor Dynamical State.mp4
|
45.3 MB
|
CERIAS - Symposium 2018 - Welcome.en.transcribed.srt
|
54.3 KB
|
CERIAS - Symposium 2018 - Welcome.mp4
|
37.0 MB
|
/CERIAS 2019/
|
2019-01-09 CERIAS - CEIVE Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Infer....en.transcribed.srt
|
58.9 KB
|
2019-01-09 CERIAS - CEIVE Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Infer....mp4
|
76.3 MB
|
2019-01-16 CERIAS - A Data Privacy Primer.en.transcribed.srt
|
64.6 KB
|
2019-01-16 CERIAS - A Data Privacy Primer.mp4
|
90.0 MB
|
2019-01-23 CERIAS - Secure Information Forwarding through Fragmentation in Delay- tolerant Networ....en.transcribed.srt
|
77.1 KB
|
2019-01-23 CERIAS - Secure Information Forwarding through Fragmentation in Delay- tolerant Networ....mp4
|
121.7 MB
|
2019-02-06 CERIAS - Trustable Information for Security Applications Visual Analytics for Reliabl....en.transcribed.srt
|
100.4 KB
|
2019-02-06 CERIAS - Trustable Information for Security Applications Visual Analytics for Reliabl....mp4
|
187.4 MB
|
2019-02-20 CERIAS - Protection against Compromised Operating Systems on ARM Cortex-A Architecture.en.transcribed.srt
|
77.4 KB
|
2019-02-20 CERIAS - Protection against Compromised Operating Systems on ARM Cortex-A Architecture.mp4
|
48.2 MB
|
2019-02-27 CERIAS - A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data M....en.transcribed.srt
|
61.2 KB
|
2019-02-27 CERIAS - A Game Theoretic Approach for Adversarial Machine Learning -- When Big Data M....mp4
|
8.7 MB
|
2019-03-06 CERIAS - Game theoretic modeling of cyber deception in the Internet of Battlefield Thi....en.transcribed.srt
|
43.1 KB
|
2019-03-06 CERIAS - Game theoretic modeling of cyber deception in the Internet of Battlefield Thi....mp4
|
67.4 MB
|
2019-03-20 CERIAS - Securing IoT-based Cyber-Physical Human Systems against diverse attacks.mp4
|
27.1 MB
|
2019-03-27 CERIAS - Efficient and Constant-Round Secure Comparison through Function Transformati....en.transcribed.srt
|
98.6 KB
|
2019-03-27 CERIAS - Efficient and Constant-Round Secure Comparison through Function Transformati....mp4
|
32.4 MB
|
2019-04-03 CERIAS - Hardware Cybersecurity Attacks and Some Solutions.en.transcribed.srt
|
86.7 KB
|
2019-04-03 CERIAS - Hardware Cybersecurity Attacks and Some Solutions.mp4
|
144.2 MB
|
2019-04-10 CERIAS - The Rise of Unconventional Security Controls.en.transcribed.srt
|
106.3 KB
|
2019-04-10 CERIAS - The Rise of Unconventional Security Controls.mp4
|
19.9 MB
|
2019-04-24 CERIAS - The Purdue Live Security Analyzer (PULSAR ).en.transcribed.srt
|
77.1 KB
|
2019-04-24 CERIAS - The Purdue Live Security Analyzer (PULSAR ).mp4
|
117.7 MB
|
CERIAS - Symposium 2019 - Keynote Chris Inglis.en.transcribed.srt
|
171.0 KB
|
CERIAS - Symposium 2019 - Keynote Chris Inglis.mp4
|
203.1 MB
|
CERIAS Symposium 2019 - Aniket Kate, GDPR Privacy vs. Blockchain Transparency.en.transcribed.srt
|
58.9 KB
|
CERIAS Symposium 2019 - Aniket Kate, GDPR Privacy vs. Blockchain Transparency.mp4
|
84.0 MB
|
CERIAS Symposium 2019 - Baiju Patel, Intel.mp4
|
112.0 MB
|
CERIAS Symposium 2019 - Closing Keynote.en.transcribed.srt
|
100.3 KB
|
CERIAS Symposium 2019 - Closing Keynote.mp4
|
186.7 MB
|
CERIAS Symposium 2019 - Panel 04.en.transcribed.srt
|
117.9 KB
|
CERIAS Symposium 2019 - Panel 04.mp4
|
47.4 MB
|
CERIAS Symposium 2019 - Panel 1.en.transcribed.srt
|
113.3 KB
|
CERIAS Symposium 2019 - Panel 1.mp4
|
226.4 MB
|
CERIAS Symposium 2019 - Panel 2.en.transcribed.srt
|
100.5 KB
|
CERIAS Symposium 2019 - Panel 2.mp4
|
192.6 MB
|
CERIAS Symposium 2019 - Panel 3.en.transcribed.srt
|
110.0 KB
|
CERIAS Symposium 2019 - Panel 3.mp4
|
214.3 MB
|
CERIAS Symposium 2019 - Rob Hale, Lockheed Martin.en.transcribed.srt
|
58.6 KB
|
CERIAS Symposium 2019 - Rob Hale, Lockheed Martin.mp4
|
101.6 MB
|
CERIAS Symposium 2019 Awards.en.transcribed.srt
|
19.3 KB
|
CERIAS Symposium 2019 Awards.mp4
|
38.5 MB
|
CERIAS Symposium 2019 Keynote Ray Rothrock, Chairman and CEO, RedSeal, Inc..en.transcribed.srt
|
112.7 KB
|
CERIAS Symposium 2019 Keynote Ray Rothrock, Chairman and CEO, RedSeal, Inc..mp4
|
117.2 MB
|
CERIAS Symposium 2019 Teck Talk Umit Karabiyik.en.transcribed.srt
|
70.7 KB
|
CERIAS Symposium 2019 Teck Talk Umit Karabiyik.mp4
|
133.7 MB
|
/
|
CERIAS logo.jpg
|
5.1 KB
|
CERIAS thank you.txt
|
0.7 KB
|
Total files 563
|