BITCQ

CERIAS

Size: 20.3 GB
Magnet link

Name Size
CERIAS/CERIAS 1999/Architectures and Components for High-Assurance Security.mp4 49 MB
CERIAS/CERIAS 1999/Balancing Big Brother.mp4 93.8 MB
CERIAS/CERIAS 1999/KHIP - A Scalable Protocol for Secure Multicast Routing.mp4 43.5 MB
CERIAS/CERIAS 2000/Automatic identification of classified documents.mp4 57.3 MB
CERIAS/CERIAS 2000/Commercial High-Resolution Satellite Imagery Polic.mp4 47.4 MB
CERIAS/CERIAS 2000/Developing Data Mining Techniques for Intrusion Detection - A Progress Report.mp4 54.3 MB
CERIAS/CERIAS 2000/Evolving the Internet.mp4 56.9 MB
CERIAS/CERIAS 2000/Implications of Mobile Code on Microsoft Platforms.mp4 59.9 MB
CERIAS/CERIAS 2000/Information Assurance Challenges for the 21st Century.mp4 42.5 MB
CERIAS/CERIAS 2000/Investigating Computer Security Incidents.mp4 56.6 MB
CERIAS/CERIAS 2000/Machine Learning Techniques for Anomaly Detection in Computer Security.mp4 54.3 MB
CERIAS/CERIAS 2000/NLP for IAS - Overview and Implementations.mp4 47.3 MB
CERIAS/CERIAS 2000/Open Source Issues and Opportunities for Tripwire.mp4 53.4 MB
CERIAS/CERIAS 2000/Richard Stotts, Jerome Webb &ampamp Matthew Beebe.mp4 54.6 MB
CERIAS/CERIAS 2000/Static Checking of Interrupt-Driven Software.mp4 51 MB
CERIAS/CERIAS 2000/The Challenge of Secure Software.mp4 60.2 MB
CERIAS/CERIAS 2000/The Future of Information Security Technologies.mp4 41.3 MB
CERIAS/CERIAS 2000/The Holy Grail of E-Business Risk Management - Creating and Sustaining the Ins..mp4 63.9 MB
CERIAS/CERIAS 2000/The IRDB Project - An Incident Response Database For Gathering Cost And Incide..mp4 51.1 MB
CERIAS/CERIAS 2000/Tracing Denial-of-Service Attacks or why we may never know who attacked Yaho..mp4 54.7 MB
CERIAS/CERIAS 2004/Administrative Scope and Role-Based Administration - CERIAS Security Seminar.mp4 46 MB
CERIAS/CERIAS 2004/An Anonymous Fair-Exchange E-Commerce Protocol.mp4 35.8 MB
CERIAS/CERIAS 2004/Attribute-Based Access Control.mp4 46.8 MB
CERIAS/CERIAS 2004/GTRBAC - A Generalized Temporal Role Based Access Control Model.mp4 44 MB
CERIAS/CERIAS 2004/Information Flow Analysis in Security Enhanced Linux - CERIAS Security Seminar.mp4 52.2 MB
CERIAS/CERIAS 2004/Robustness testing - black-box testing for software security - CERIAS Security Seminar.mp4 47 MB
CERIAS/CERIAS 2004/Secure Information Sharing within a Collaborative Environment - CERIAS Security Seminar.mp4 49.7 MB
CERIAS/CERIAS 2004/Towards Mining Syslog Data - Abe Singer - CERIAS Security Seminar.mp4 41.2 MB
CERIAS/CERIAS 2004/Using Statistical Analysis to Locate Spam Web Pages.mp4 34.1 MB
CERIAS/CERIAS 2005/A Demonstration in the Need for a Layered Security Model.mp4 57 MB
CERIAS/CERIAS 2005/A Framework for Identifying Compromised Nodes in Sensor Networks.mp4 44.1 MB
CERIAS/CERIAS 2005/An Introduction to Biometric Technologies - Stephen Elliott.mp4 46.8 MB
CERIAS/CERIAS 2005/Architectural Considerations for Anomaly Detection.mp4 34.6 MB
CERIAS/CERIAS 2005/CERIAS - Defining a Digital Forensic Investigation.mp4 42 MB
CERIAS/CERIAS 2005/Clouseau - A practical IP spoofing defense through route-based filtering.mp4 46 MB
CERIAS/CERIAS 2005/Dr. Kate Cherry and Dr. Wendy Hamilton - CERIAS Security Seminar.mp4 50.4 MB
CERIAS/CERIAS 2005/Hidden Access Control Policies with Hidden Credentials.mp4 42.6 MB
CERIAS/CERIAS 2005/Knowing Where, When and What Hazards Occur.mp4 53 MB
CERIAS/CERIAS 2005/Minimizing Trust Liabilities in Secure Group Messaging Infrastructures.mp4 32.9 MB
CERIAS/CERIAS 2005/Obfuscated Databases - Definitions and Constructions.mp4 47.1 MB
CERIAS/CERIAS 2005/Perturbation of Multivariable Public-key Cryptosystems.mp4 33.5 MB
CERIAS/CERIAS 2005/Privacy and anonymity in Trust Negotiations.mp4 43.1 MB
CERIAS/CERIAS 2005/Privacy-preserving Policy-driven Access Control with Mixed Credentials.mp4 38.8 MB
CERIAS/CERIAS 2005/Real World Web Application Security.mp4 42.2 MB
CERIAS/CERIAS 2005/Secret Handshakes.mp4 47.9 MB
CERIAS/CERIAS 2005/Securing the Internet s Domain Name System.mp4 39.2 MB
CERIAS/CERIAS 2005/Survivable routing in wireless ad hoc networks.mp4 47.8 MB
CERIAS/CERIAS 2005/Toward Self-healing Software.mp4 47.5 MB
CERIAS/CERIAS 2005/Traust and PeerTrust2 - Applying Trust Negotiation to Real Systems.mp4 48.8 MB
CERIAS/CERIAS 2005/Using process labels to obtain forensic and traceback information.mp4 43.8 MB
CERIAS/CERIAS 2005/Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks.mp4 44.9 MB
CERIAS/CERIAS 2005/Watermarking Relational Databases.mp4 38.7 MB
CERIAS/CERIAS 2005/Where s the FEEB Effectiveness of Instruction Set Randomization.mp4 45.2 MB
CERIAS/CERIAS 2006/A Multi-layered Approach to Web Application Defense.mp4 43.7 MB
CERIAS/CERIAS 2006/A Policy Engineering Framework for Federated Access Management.mp4 44.9 MB
CERIAS/CERIAS 2006/Beyond Separation of Duty - An Algebra for Specifying High-level Security Poli..mp4 37.6 MB
CERIAS/CERIAS 2006/Categories of Digital Forensic Investigation Techniques.mp4 49 MB
CERIAS/CERIAS 2006/Chaos, Complexity, Cybernetics and Therminator.mp4 47.4 MB
CERIAS/CERIAS 2006/Cross-Drive Forensic Analysis.mp4 35.3 MB
CERIAS/CERIAS 2006/Developing an Operational Framework for Integrated System Security.mp4 49.1 MB
CERIAS/CERIAS 2006/Digital Identity Management and Theft Protection.mp4 42.6 MB
CERIAS/CERIAS 2006/Dynamic and Efficient Key Management for Access Hierarchies.mp4 34.5 MB
CERIAS/CERIAS 2006/Forensics Characterization of Printers and Image Capture devices.mp4 40 MB
CERIAS/CERIAS 2006/Identity Management Strategies and Integration Perspectives.mp4 63.8 MB
CERIAS/CERIAS 2006/Invasive Browser Sniffing and Countermeasures.mp4 39.2 MB
CERIAS/CERIAS 2006/Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstru..mp4 37.7 MB
CERIAS/CERIAS 2006/Net Trust - Identification Through Social Context.mp4 48.3 MB
CERIAS/CERIAS 2006/Network Security Begins at Home - Changing Consumer Behavior for i-Safety.mp4 59.9 MB
CERIAS/CERIAS 2006/OS-Level Taint Analysis for Malware Investigation and Defense.mp4 54.5 MB
CERIAS/CERIAS 2006/On the Evolution of Adversary Models for Security Protocols - from the Beginn..mp4 50.2 MB
CERIAS/CERIAS 2006/One Step Forward, Two Steps Back, or Two Steps Forward, One Step Back - A Ten ..mp4 55.8 MB
CERIAS/CERIAS 2006/Prioritizing Processes and Controls for Effective and Measurable Security.mp4 51.7 MB
CERIAS/CERIAS 2006/Privacy Policies in Web-based Healthcare.mp4 42.1 MB
CERIAS/CERIAS 2006/Provable security in mobile ad hoc networks.mp4 51.1 MB
CERIAS/CERIAS 2006/Real-Time Visualization of Network Attacks on High-Speed Links.mp4 56 MB
CERIAS/CERIAS 2006/Recent Attacks on MD5.mp4 50.6 MB
CERIAS/CERIAS 2006/Semantic Attacks and Security.mp4 48.7 MB
CERIAS/CERIAS 2006/Spoofing-resistant Packet Routing for the Internet.mp4 53.2 MB
CERIAS/CERIAS 2006/The Psychology of Computer Deviance - How it can assist in digital evidence a..mp4 53.4 MB
CERIAS/CERIAS 2006/The Secure Information Sharing Problem and Solution Approaches.mp4 57.2 MB
CERIAS/CERIAS 2006/Toward Autonomic Security Policy Management.mp4 32.4 MB
CERIAS/CERIAS 2006/Verification of Integrity for Outsourced Content Publishing and Database Quer..mp4 50.6 MB
CERIAS/CERIAS 2007/A quant looks at the future.mp4 57.4 MB
CERIAS/CERIAS 2007/Applying Recreational Mathematics to Secure Multiparty Computation.mp4 43.4 MB
CERIAS/CERIAS 2007/Assured Information Sharing between Trustworthy, Semi-trustworthy and Untrust..mp4 59.5 MB
CERIAS/CERIAS 2007/Automatic Debugging and Verification of RTL-Specified Real-Time Systems via I..mp4 47.5 MB
CERIAS/CERIAS 2007/CANDID - Preventing SQL Injection Attacks using Dynamic Candidate Evaluations.mp4 36.9 MB
CERIAS/CERIAS 2007/Computer-Related Incidents - Factors Related to Cause and Prevention.mp4 49.8 MB
CERIAS/CERIAS 2007/Cyber Security and the - NEW - world enterprise.mp4 48.9 MB
CERIAS/CERIAS 2007/Dumb Ideas in Computer Security.mp4 47.6 MB
CERIAS/CERIAS 2007/From Securing Navigation Systems to Securing Wireless Communication.mp4 45.2 MB
CERIAS/CERIAS 2007/Hiding the Message Behind the Words - Advances in Natural Language Watermarkin..mp4 31.9 MB
CERIAS/CERIAS 2007/Intrusion Detection Event Correlation - Approaches, Benefits and Pitfalls.mp4 49 MB
CERIAS/CERIAS 2007/Mathematically Defining Privacy.mp4 47.1 MB
CERIAS/CERIAS 2007/Passwords Decay, Words Endure - Towards Secure and Re-usable Multiple Password..mp4 59.6 MB
CERIAS/CERIAS 2007/Protecting Data Privacy - A Practical Guide to Managing Risk.mp4 31.8 MB
CERIAS/CERIAS 2007/Protocols and Systems for Privacy Preserving Protection of Digital Identity.mp4 44.7 MB
CERIAS/CERIAS 2007/Research Challenges in Assured Information Sharing.mp4 40.6 MB
CERIAS/CERIAS 2007/Role Discovery.mp4 42.9 MB
CERIAS/CERIAS 2007/Scenario-Driven Construction of Enterprise Information Policy.mp4 54.9 MB
CERIAS/CERIAS 2007/Secure Virtualization.mp4 54.8 MB
CERIAS/CERIAS 2007/Security issues within embedded software development.mp4 42.3 MB
CERIAS/CERIAS 2007/Security, Soft Boundaries, and oh-so-subtle Strategies How to Play Chess Whil..mp4 55.9 MB
CERIAS/CERIAS 2007/The Effect of Rootkits on the Corporate Environment.mp4 35.3 MB
CERIAS/CERIAS 2007/Towards Effective and Efficient Behavior-based Trust Models.mp4 45.3 MB
CERIAS/CERIAS 2007/WHAT IS INFORMATION.mp4 53.4 MB
CERIAS/CERIAS 2007/What Every Engineer Needs To Know About Security And Where To Learn It.mp4 45.9 MB
CERIAS/CERIAS 2007/Wireless Router Insecurity - The Next Crimeware Epidemic.mp4 46.2 MB
CERIAS/CERIAS 2008/Access Control and Resiliency for WS-BPEL.mp4 26.6 MB
CERIAS/CERIAS 2008/Automatic Signature Generation for Unknown Vulnerabilities.mp4 41.8 MB
CERIAS/CERIAS 2008/Beyond the Enclave - Evolving Concepts in Security Architectures.mp4 46.1 MB
CERIAS/CERIAS 2008/Electronic Voting - Danger and Opportunity.mp4 46.4 MB
CERIAS/CERIAS 2008/Exploitable Redirects on the Web - Identification, Prevalence, and Defense.mp4 48.4 MB
CERIAS/CERIAS 2008/Exploiting Opportunistic Scheduling in Cellular Data Networks.mp4 39.3 MB
CERIAS/CERIAS 2008/Extending anonymity research to high-tech white collar crimes and IT Insider ..mp4 40.6 MB
CERIAS/CERIAS 2008/Fingerprint Sensor Interoperability - Analysis of Error Rates for Fingerprint ..mp4 46.9 MB
CERIAS/CERIAS 2008/Hacking the Mobile Workforce.mp4 42.8 MB
CERIAS/CERIAS 2008/John Oritz, SRA International.mp4 58.8 MB
CERIAS/CERIAS 2008/Managing Security Polarities.mp4 50.5 MB
CERIAS/CERIAS 2008/Measuring the Attack Surfaces of Enterprise Software Systems.mp4 44.8 MB
CERIAS/CERIAS 2008/Private Queries in Location Based Services - Anonymizers are not Necessary.mp4 39.1 MB
CERIAS/CERIAS 2008/Reading the Disclosures with New Eyes - Bridging the Gap between Information S..mp4 38.8 MB
CERIAS/CERIAS 2008/Resilient Systems for Mission Assurance.mp4 32 MB
CERIAS/CERIAS 2008/Responding to Anomalous Database Requests.mp4 27.7 MB
CERIAS/CERIAS 2008/Security in a Changing World.mp4 48 MB
CERIAS/CERIAS 2008/Shifting focus - Aligning security with risk management.mp4 51.2 MB
CERIAS/CERIAS 2008/Signature Analysis Coupled With Slicing Analysis for the Validation of Softwa..mp4 22.5 MB
CERIAS/CERIAS 2008/Static source code analysis.mp4 44.8 MB
CERIAS/CERIAS 2008/The - merge - of Anti-Tamper and Information Assurance - lessons lear..mp4 51.1 MB
CERIAS/CERIAS 2008/The Role Graph Model and its Extensions.mp4 41.3 MB
CERIAS/CERIAS 2008/Tor - Anonymous communications for government agencies, corporations, journali..mp4 59.7 MB
CERIAS/CERIAS 2008/Towards Event Source Location Privacy in Wireless Sensor Networks.mp4 46.1 MB
CERIAS/CERIAS 2008/Trends in Identity Management.mp4 49.6 MB
CERIAS/CERIAS 2008/Virtualization - Resource Coupling and Security across the Stack.mp4 41.4 MB
CERIAS/CERIAS 2008/What are CSO s thinking about Top information security initiatives for 2008 ..mp4 42.5 MB
CERIAS/CERIAS 2009/A Rules Based Statistical Algorithm for Keystroke Detection.mp4 43.4 MB
CERIAS/CERIAS 2009/Access Control and Resiliency for WS-BPEL.mp4 26.6 MB
CERIAS/CERIAS 2009/An Alternate Memory Architecture for Code Injection Prevention.mp4 35.9 MB
CERIAS/CERIAS 2009/An Analysis of Data Breach Disclosure.mp4 48.6 MB
CERIAS/CERIAS 2009/Cyber Security Trends and Disruptors.mp4 45.3 MB
CERIAS/CERIAS 2009/Database Assurance - Anomaly Detection for Relational Databases.mp4 41.6 MB
CERIAS/CERIAS 2009/Fake Picassos, Tampered History, and Digital Forgery - Protecting the Genealog..mp4 44.4 MB
CERIAS/CERIAS 2009/From Security Architecture to Implementation.mp4 34.8 MB
CERIAS/CERIAS 2009/Human Factors Approaches to Preserving Privacy.mp4 47 MB
CERIAS/CERIAS 2009/Information Security Management and IT Executives in a Top Management Team.mp4 41.1 MB
CERIAS/CERIAS 2009/Mace - Systems and Language Support for Building Correct, High-Performance Net..mp4 45.9 MB
CERIAS/CERIAS 2009/Measuring Privacy - A Risk-Based Approach.mp4 42.4 MB
CERIAS/CERIAS 2009/Multi-Policy Access Control for Healthcare using Policy Machine.mp4 23.2 MB
CERIAS/CERIAS 2009/PlugNPlay Trust for Embedded Communication Systems.mp4 50 MB
CERIAS/CERIAS 2009/Privacy from accessing databases to location based services.mp4 43.1 MB
CERIAS/CERIAS 2009/Providing Privacy through Plausibly Deniable Search.mp4 36.6 MB
CERIAS/CERIAS 2009/Quantitative Risk Assessment of Software Security and Privacy, and Risk Manag..mp4 48.8 MB
CERIAS/CERIAS 2009/Rick Clark, Ontario Systems.mp4 47 MB
CERIAS/CERIAS 2009/Safely Analyzing Sensitive Network Data.mp4 48.8 MB
CERIAS/CERIAS 2009/Security for the Next Internet over Heterogeneous Environments.mp4 46.8 MB
CERIAS/CERIAS 2009/Security in Infrastructureless and Decentralized Communication Networks - Pos..mp4 36.4 MB
CERIAS/CERIAS 2009/Software Assurance - Motivation, Background, and Acquisition Pursuits.mp4 48.5 MB
CERIAS/CERIAS 2009/Some Thoughts on the Pervasive Trust Foundation for the Future Internet Archi..mp4 41.1 MB
CERIAS/CERIAS 2009/Sphinx - A Compact and Provably Secure Mix Format.mp4 46.7 MB
CERIAS/CERIAS 2009/Starting Over After A Lost Decade, In Search of a Bold New Vision for Cyber S..mp4 51.9 MB
CERIAS/CERIAS 2009/The Best Defense is Information.mp4 40.6 MB
CERIAS/CERIAS 2009/The Building Security In Maturity Model (BSIMM).mp4 44.5 MB
CERIAS/CERIAS 2009/The Importance of Law in Cybersecurity, Recent Developments and Trends in Cyb..mp4 48.2 MB
CERIAS/CERIAS 2009/The dark side of software engineering and how to defend against it.mp4 42.3 MB
CERIAS/CERIAS 2009/USER AWARENESS OF SECURITY COUNTERMEASURES AND ITS IMPACT ON INFORMATION SYST..mp4 47.5 MB
CERIAS/CERIAS 2010/60 years of scientific research in cryptography - a reflection.mp4 64.9 MB
CERIAS/CERIAS 2010/A Platform for Creating Efficient, Robust, and Resilient Peer-to-Peer Systems.mp4 43 MB
CERIAS/CERIAS 2010/Applications of Biometric Technologies.mp4 40.6 MB
CERIAS/CERIAS 2010/Assured Processing through Obfuscation.mp4 52.9 MB
CERIAS/CERIAS 2010/Data in the Cloud - Authentication Without Leaking.mp4 51.4 MB
CERIAS/CERIAS 2010/Detecting Coordinated Attacks with Traffic Analysis.mp4 56 MB
CERIAS/CERIAS 2010/Detecting Insider Theft of Trade Secrets.mp4 42.9 MB
CERIAS/CERIAS 2010/Detection and protection from denial of service attacks in grids by accountab..mp4 45 MB
CERIAS/CERIAS 2010/Dissecting Digital Data - Context and Meaning through Analytics.mp4 48.3 MB
CERIAS/CERIAS 2010/Everything I Needed to Know about Security, I Learned in 1974.mp4 50.6 MB
CERIAS/CERIAS 2010/Fast Regular Expression Matching using Small TCAMs for Network Intrusion Dete..mp4 54.5 MB
CERIAS/CERIAS 2010/Global Study of Web 2.0 Use in Organizations.mp4 48.6 MB
CERIAS/CERIAS 2010/Making of the CWE Top-25, 2010 Edition.mp4 45.6 MB
CERIAS/CERIAS 2010/Nudging the Digital Pirate - Behavioral Issues in the Piracy Context.mp4 48.3 MB
CERIAS/CERIAS 2010/Ontological Semantic Technology for Detecting Insider Threat and Socia..mp4 48.5 MB
CERIAS/CERIAS 2010/Provenance-based Data Trustworthiness Assessment in Data Streams.mp4 36.6 MB
CERIAS/CERIAS 2010/Ribbons, A Partially-Shared Memory Programming Model.mp4 40.9 MB
CERIAS/CERIAS 2010/Rootkits.mp4 61 MB
CERIAS/CERIAS 2010/Secure Network Coding for Wireless Mesh Networks.mp4 51.2 MB
CERIAS/CERIAS 2010/Security Applications for Physically Unclonable Functions.mp4 52.7 MB
CERIAS/CERIAS 2010/Security of JavaScript in a Browser Environment.mp4 47.3 MB
CERIAS/CERIAS 2010/Security of Mobile Ad Hoc Networks (MANETs).mp4 52.8 MB
CERIAS/CERIAS 2010/Side Channel Threats in the Software-as-a-Service Era - Challenges and Respons..mp4 61.1 MB
CERIAS/CERIAS 2010/Tackling System-Wide Integrity.mp4 60.9 MB
CERIAS/CERIAS 2010/The role of System Security Engineering in the engineering lifecycle.mp4 59.2 MB
CERIAS/CERIAS 2010/The role of automata theory in software verification.mp4 57.6 MB
CERIAS/CERIAS 2010/Thinking Outside the Box.mp4 40.1 MB
CERIAS/CERIAS 2010/Trust and Protection in the Illinois Browser Operating System.mp4 50.1 MB
CERIAS/CERIAS 2011/A couple of results about JavaScript.mp4 36.4 MB
CERIAS/CERIAS 2011/Detecting Bots in Online Games using Human Observational Proofs.mp4 49 MB
CERIAS/CERIAS 2011/Enterprise-Wide Intrusions Involving Advanced Threats.mp4 59 MB
CERIAS/CERIAS 2011/Exploiting Banners for Fun and Profits.mp4 51.1 MB
CERIAS/CERIAS 2011/FuzzyFusion(tm), an application architecture for multisource informati..mp4 42.3 MB
CERIAS/CERIAS 2011/Jam me if you can - Mitigating the Impact of Inside Jammers.mp4 56.1 MB
CERIAS/CERIAS 2011/Methods and Techniques for Protecting Data in Real Time on the Wire.mp4 51.6 MB
CERIAS/CERIAS 2011/Mobile Phones and Evidence Preservation.mp4 50.1 MB
CERIAS/CERIAS 2011/Modeling DNS Security - Misconfiguration, Availability, and Visualizatio..mp4 49.1 MB
CERIAS/CERIAS 2011/Non-homogeneous anonymizations.mp4 52.7 MB
CERIAS/CERIAS 2011/Ontological Semantic Technology Goes Phishing.mp4 52.2 MB
CERIAS/CERIAS 2011/Process Implanting - A New Active Introspection Framework for Virtualization.mp4 25.2 MB
CERIAS/CERIAS 2011/Provisioning Protocol Challenges in an Era of gTLD Expansion.mp4 58.6 MB
CERIAS/CERIAS 2011/Retrofitting Legacy Code for Security.mp4 44.8 MB
CERIAS/CERIAS 2011/Risk Perception and Trust in Cloud.mp4 33.8 MB
CERIAS/CERIAS 2011/Securing Application-Level Topology Estimation Networks - Facing the Frog-Boil..mp4 26.1 MB
CERIAS/CERIAS 2011/Semantic Security - or How I Learned to Stop Worrying and Looooooove the..mp4 58.4 MB
CERIAS/CERIAS 2011/Society, Law Enforcement and the Internet - Models for Give and Take.mp4 74.1 MB
CERIAS/CERIAS 2011/Soundcomber - A Stealthy and Context-Aware Sound Trojan for Smartphones.mp4 57.4 MB
CERIAS/CERIAS 2011/SureView AMP, Active Malware Protection, detecting malware anti virus solutio..mp4 42.6 MB
CERIAS/CERIAS 2011/Trusted Computing and Security for Embedded Systems.mp4 49.7 MB
CERIAS/CERIAS 2011/Understanding insiders - An analysis of risk-taking behavior.mp4 43.1 MB
CERIAS/CERIAS 2011/User and Machine Authentication and Authorization Infrastructure for Distrib..mp4 54.9 MB
CERIAS/CERIAS 2011/Weighted Multiple Secret Sharing.mp4 50.5 MB
CERIAS/CERIAS 2011/What does Knowledge Discovery, Predictability, and Human Behavior have to do ..mp4 46.4 MB
CERIAS/CERIAS 2011/Wireless Technologies and how it relates to cyber security research.mp4 56.7 MB
CERIAS/CERIAS 2012/A Flexible System for Access Control.mp4 42 MB
CERIAS/CERIAS 2012/A New Class of Buffer Overflow Attacks.mp4 45.9 MB
CERIAS/CERIAS 2012/Adding a Software Assurance Dimension to Supply Chain Practices.mp4 40 MB
CERIAS/CERIAS 2012/Challenges for R&ampD in the Security Field.mp4 49.8 MB
CERIAS/CERIAS 2012/Cryptographic protocols in the era of cloud computing.mp4 43.7 MB
CERIAS/CERIAS 2012/Defending Users Against Smartphone Apps - Techniques and Future Directions.mp4 45.1 MB
CERIAS/CERIAS 2012/Detecting Maliciousness Using Periodic Mobile Forensics.mp4 43.9 MB
CERIAS/CERIAS 2012/Digital Citizenship - A Target s View of Security and Life Online.mp4 43.6 MB
CERIAS/CERIAS 2012/Firmware Risks - The Next Frontier - Steve Battista, MITRE.mp4 32.7 MB
CERIAS/CERIAS 2012/Forensic Carving of Network Packets with bulk_extractor and tcpflow.mp4 38.6 MB
CERIAS/CERIAS 2012/Global Revocation for the Intersection Collision Warning Safety Application.mp4 39 MB
CERIAS/CERIAS 2012/Introduction to Biometrics.mp4 43.5 MB
CERIAS/CERIAS 2012/Is it time to add Trust to the Future Internet Web.mp4 48.4 MB
CERIAS/CERIAS 2012/K-Anonymity in Social Networks - A Clustering Approach - CERIAS Security Seminar.mp4 42.1 MB
CERIAS/CERIAS 2012/Leveraging internal network traffic to detect malicious activity - Lessons lea..mp4 37.7 MB
CERIAS/CERIAS 2012/Not the Who but the What - New applications of Hardware Identity.mp4 31.5 MB
CERIAS/CERIAS 2012/Privacy preserving attribute based group key management.mp4 35.4 MB
CERIAS/CERIAS 2012/Privacy-Preserving Assessment of Location Data Trustworthiness.mp4 33.8 MB
CERIAS/CERIAS 2012/Publishing Microdata with a Robust Privacy Guarantee.mp4 38.8 MB
CERIAS/CERIAS 2012/Risk perception of information security risks online.mp4 45.5 MB
CERIAS/CERIAS 2012/Secure Provenance Transmission for Data Streams.mp4 35.1 MB
CERIAS/CERIAS 2012/The Boeing Company.mp4 47.5 MB
CERIAS/CERIAS 2012/The Inertia of Productivity.mp4 46.8 MB
CERIAS/CERIAS 2012/The new frontier, welcome the Cloud Brokers.mp4 46.7 MB
CERIAS/CERIAS 2012/Trends in cyber security consulting.mp4 43.4 MB
CERIAS/CERIAS 2012/Understanding Spam Economics.mp4 43.6 MB
CERIAS/CERIAS 2012/Vulnerability Path and Assessment.mp4 43.3 MB
CERIAS/CERIAS 2012/You are Anonymous Then you must be Lucky.mp4 41.4 MB
CERIAS/CERIAS 2013/A Semantic Baseline for Spam Filtering.mp4 42 MB
CERIAS/CERIAS 2013/Active Cyber Network Defense with Denial and Deception.mp4 42.7 MB
CERIAS/CERIAS 2013/BIOS Chronomancy - Using Timing-Based Attestation to Detect Firmware Rootkits.mp4 37.7 MB
CERIAS/CERIAS 2013/Differentially Private Publishing of Geospatial Data.mp4 42.9 MB
CERIAS/CERIAS 2013/Economic Policy and Cyber Challenges in Estonia.mp4 46.8 MB
CERIAS/CERIAS 2013/Facebook - Protecting a billion identities without losing (much) sleep.mp4 40.1 MB
CERIAS/CERIAS 2013/GPRI Global Connections Lecture Series - Mr. Norman R. Augustine.mp4 68.6 MB
CERIAS/CERIAS 2013/I m not stealing, I m merely borrowing - Plagiarism in Smartphone App Markets.mp4 39.7 MB
CERIAS/CERIAS 2013/Identity-Based Internet Protocol Network.mp4 22.6 MB
CERIAS/CERIAS 2013/Information Security Challenges in an Academic Environment.mp4 33 MB
CERIAS/CERIAS 2013/Membership Privacy - A Unifying Framework For Privacy Definitions.mp4 40.9 MB
CERIAS/CERIAS 2013/Minimizing Private Data Disclosures in the Smart Grid.mp4 32.5 MB
CERIAS/CERIAS 2013/New possibilities of steganography based on Kuznetsov-Tsybakov problem.mp4 36.3 MB
CERIAS/CERIAS 2013/Regulatory Compliance Software Engineering.mp4 36.8 MB
CERIAS/CERIAS 2013/Systems of Systems - Opportunities and Challenges.mp4 42.5 MB
CERIAS/CERIAS 2013/The Durkheim Project - Privacy Considerations in Predicting Military and Vete..mp4 36.5 MB
CERIAS/CERIAS 2013/Towards Automated Problem Inference from Trouble Tickets.mp4 38.1 MB
CERIAS/CERIAS 2013/Trust Management for Publishing Graph Data.mp4 45.2 MB
CERIAS/CERIAS 2013/Using Probabilistic Generative Models for Ranking Risks of Android Apps.mp4 33 MB
CERIAS/CERIAS 2013/Whole Genome Sequencing - Innovation Dream or Privacy Nightmare.mp4 44.7 MB
CERIAS/CERIAS 2013/Yahoo Messenger Forensics on Windows Vista and Windows 7.mp4 25.1 MB
CERIAS/CERIAS 2014/Awards - Purdue University.mp4 11.6 MB
CERIAS/CERIAS 2014/Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp..mp4 31.6 MB
CERIAS/CERIAS 2014/DSCRETE - Automatic Rendering of Forensic Information from Memory Images via A..mp4 15.4 MB
CERIAS/CERIAS 2014/Delivering - Always-on - Services Despite Flaky Network Infrastructur..mp4 36.2 MB
CERIAS/CERIAS 2014/Fireside Chat.mp4 55.5 MB
CERIAS/CERIAS 2014/General-Purpose Secure Computation and Outsourcing.mp4 42.8 MB
CERIAS/CERIAS 2014/Integrity Levels - A New Paradigm for Protecting Computing Systems.mp4 39.8 MB
CERIAS/CERIAS 2014/Keynote Day 2.mp4 59.9 MB
CERIAS/CERIAS 2014/Machine Intelligence for Biometric and On-Line Security.mp4 44.1 MB
CERIAS/CERIAS 2014/Online Privacy Agreements, is it Informed Consent.mp4 43.9 MB
CERIAS/CERIAS 2014/Opening Keynote.mp4 48.7 MB
CERIAS/CERIAS 2014/Panel 1.mp4 48.2 MB
CERIAS/CERIAS 2014/Panel 2.mp4 66.6 MB
CERIAS/CERIAS 2014/Poster Contest Winners.mp4 31.4 MB
CERIAS/CERIAS 2014/Secure and Private Outsourcing to Untrusted Cloud Servers.mp4 42.4 MB
CERIAS/CERIAS 2014/Security Plus (not Versus) Privacy.mp4 75.6 MB
CERIAS/CERIAS 2014/Technical Tradeoffs in the NSA s Mass Phone Call Program.mp4 40.5 MB
CERIAS/CERIAS 2014/Why so CERIAS Why we re losing and what to do about it.mp4 72.8 MB
CERIAS/CERIAS 2015/Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.en.srt 84 KB
CERIAS/CERIAS 2015/Aiding Security Analytics - From Dempster-Shafer Theory to Anthropology.mp4 35.7 MB
CERIAS/CERIAS 2015/Breaking Mobile Social Networks for Automated User Location Tracking.en.srt 63 KB
CERIAS/CERIAS 2015/Breaking Mobile Social Networks for Automated User Location Tracking.mp4 28.8 MB
CERIAS/CERIAS 2015/Code-Pointer Integrity.en.srt 66 KB
CERIAS/CERIAS 2015/Code-Pointer Integrity.mp4 27.5 MB
CERIAS/CERIAS 2015/Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.en.srt 40 KB
CERIAS/CERIAS 2015/Detecting Camouflaged Attacks with Stat. Learning Guided by Program Analysis.mp4 22.4 MB
CERIAS/CERIAS 2015/Evaluation of Urban Vehicle Tracking Algorithms.en.srt 63 KB
CERIAS/CERIAS 2015/Evaluation of Urban Vehicle Tracking Algorithms.mp4 29.4 MB
CERIAS/CERIAS 2015/Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.en.srt 87 KB
CERIAS/CERIAS 2015/Gender Gaps in Cybersecurity Engagement and Self-Efficacy Growth Trajectories.mp4 41.5 MB
CERIAS/CERIAS 2015/Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.en.srt 101 KB
CERIAS/CERIAS 2015/Invited Talk Michelle Dennedy, VP & CPO McAfee Intel Security.mp4 57.5 MB
CERIAS/CERIAS 2015/Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.en.srt 99 KB
CERIAS/CERIAS 2015/Lawful Hacking Using Existing Vulnerabilities for Wiretapping on the Internet.mp4 51 MB
CERIAS/CERIAS 2015/Learning from Information Security Maturity A Textual Analysis.en.srt 79 KB
CERIAS/CERIAS 2015/Learning from Information Security Maturity A Textual Analysis.mp4 42.7 MB
CERIAS/CERIAS 2015/Microsemi Security Solutions and Threat Driven Security.mp4 45.6 MB
CERIAS/CERIAS 2015/Preventing or Penalizing Equivocation in Decentralized Environments.mp4 38.6 MB
CERIAS/CERIAS 2015/Privacy Notions for Data Publishing and Analysis.mp4 46.1 MB
CERIAS/CERIAS 2015/Privacy Potpourri Changing Privacy from the Bottom Up.en.srt 95 KB
CERIAS/CERIAS 2015/Privacy Potpourri Changing Privacy from the Bottom Up.mp4 48.1 MB
CERIAS/CERIAS 2015/Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.en.srt 72 KB
CERIAS/CERIAS 2015/Privacy in Big Data Thinking Outside the Anonymity Confidentiality Box.mp4 45.1 MB
CERIAS/CERIAS 2015/Regulatory Compliance Checking Over Encrypted Audit Logs.en(transcribed).srt 75 KB
CERIAS/CERIAS 2015/Regulatory Compliance Checking Over Encrypted Audit Logs.mp4 38.2 MB
CERIAS/CERIAS 2015/SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.en.srt 52 KB
CERIAS/CERIAS 2015/SUPOR Precise and Scalable Sensitive User Input Detection for Mobile Apps.mp4 31 MB
CERIAS/CERIAS 2015/Samuel Jero - Purdue University.en.srt 68 KB
CERIAS/CERIAS 2015/Samuel Jero - Purdue University.mp4 34.5 MB
CERIAS/CERIAS 2015/Security with Privacy - A Research Agenda.mp4 37.9 MB
CERIAS/CERIAS 2015/Software updates decisions and security implications.en.srt 106 KB
CERIAS/CERIAS 2015/Software updates decisions and security implications.mp4 48.2 MB
CERIAS/CERIAS 2015/Verification Techniques for Checking Compliance of Computer Systems and Protocols.mp4 39 MB
CERIAS/CERIAS 2015/Verifying Computations with (Private) State.en.srt 87 KB
CERIAS/CERIAS 2015/Verifying Computations with (Private) State.mp4 45.8 MB
CERIAS/CERIAS 2015/Virtual Android Malware Detection and Analysis (VAMDA).en.srt 57 KB
CERIAS/CERIAS 2015/Virtual Android Malware Detection and Analysis (VAMDA).mp4 23.6 MB
CERIAS/CERIAS 2015/Yonghwi Kwon - Purdue University.en.srt 56 KB
CERIAS/CERIAS 2015/Yonghwi Kwon - Purdue University.mp4 30.8 MB
CERIAS/CERIAS 2016/Annual Information Security Symposium Awards.en.srt 15 KB
CERIAS/CERIAS 2016/Annual Information Security Symposium Awards.mp4 13.5 MB
CERIAS/CERIAS 2016/Automatically Recovering Human-Understandable Evidence from Memory Images.en.srt 54 KB
CERIAS/CERIAS 2016/Automatically Recovering Human-Understandable Evidence from Memory Images.mp4 41.7 MB
CERIAS/CERIAS 2016/Batch Techniques for Practical Private Information Retrieval.en.srt 107 KB
CERIAS/CERIAS 2016/Batch Techniques for Practical Private Information Retrieval.mp4 78.3 MB
CERIAS/CERIAS 2016/Big Data Security and Privacy.mp4 64.6 MB
CERIAS/CERIAS 2016/Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.en.srt 91 KB
CERIAS/CERIAS 2016/Bottom Line Security Understanding the True Cost of Cybersecurity Attacks.mp4 48.2 MB
CERIAS/CERIAS 2016/CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.en.srt 54 KB
CERIAS/CERIAS 2016/CERIAS TechTalk Operational Dependencies and Cybersecurity in Complex Systems.mp4 44.2 MB
CERIAS/CERIAS 2016/Context Aware, Policy based approaches to Security.en.srt 91 KB
CERIAS/CERIAS 2016/Context Aware, Policy based approaches to Security.mp4 67.7 MB
CERIAS/CERIAS 2016/Digital Identity Protection.en.srt 70 KB
CERIAS/CERIAS 2016/Digital Identity Protection.mp4 41.9 MB
CERIAS/CERIAS 2016/Enforcing Least Privilege Memory Views for Multithreaded Applications.en.srt 41 KB
CERIAS/CERIAS 2016/Enforcing Least Privilege Memory Views for Multithreaded Applications.mp4 27.2 MB
CERIAS/CERIAS 2016/ErsatzPasswords - Ending Password Cracking.en.srt 48 KB
CERIAS/CERIAS 2016/ErsatzPasswords - Ending Password Cracking.mp4 30.1 MB
CERIAS/CERIAS 2016/Finding Specification Noncompliance and Attacks in Wireless Network..en.srt 82 KB
CERIAS/CERIAS 2016/Finding Specification Noncompliance and Attacks in Wireless Network..mp4 52.9 MB
CERIAS/CERIAS 2016/General Motors Product Cybersecurity Overview.en.srt 70 KB
CERIAS/CERIAS 2016/General Motors Product Cybersecurity Overview.mp4 59.8 MB
CERIAS/CERIAS 2016/Growing Up In Cyber, But Is Cyber Growing Up.en.srt 119 KB
CERIAS/CERIAS 2016/Growing Up In Cyber, But Is Cyber Growing Up.mp4 55.2 MB
CERIAS/CERIAS 2016/IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.en.srt 42 KB
CERIAS/CERIAS 2016/IEEE Try-CybSI a Collaborative and Interactive Platform for Cybersecurity Learning.mp4 31.6 MB
CERIAS/CERIAS 2016/IN-ISAC SOC, Security Awareness and More.mp4 71.8 MB
CERIAS/CERIAS 2016/Improving Outcomes with Services.en.srt 66 KB
CERIAS/CERIAS 2016/Improving Outcomes with Services.mp4 45.7 MB
CERIAS/CERIAS 2016/Information Security Through the Lens of Crisis Organizations.mp4 31.3 MB
CERIAS/CERIAS 2016/Life as a Target.en.srt 85 KB
CERIAS/CERIAS 2016/Life as a Target.mp4 71.7 MB
CERIAS/CERIAS 2016/New Research and Resources in NL IAS at Purdue.mp4 45.9 MB
CERIAS/CERIAS 2016/Predicting What Users Will do Next.en.srt 60 KB
CERIAS/CERIAS 2016/Predicting What Users Will do Next.mp4 43.7 MB
CERIAS/CERIAS 2016/Privacy-preserving payments in credit networks.mp4 42.3 MB
CERIAS/CERIAS 2016/Robust Secure Computation.mp4 44.3 MB
CERIAS/CERIAS 2016/Secure Coding - Patterns and anti-patterns in the design and architecture of ..en.srt 87 KB
CERIAS/CERIAS 2016/Secure Coding - Patterns and anti-patterns in the design and architecture of ..mp4 73.5 MB
CERIAS/CERIAS 2016/The Application of Natural Language Processing to Open Source Intelligence fo..en.srt 59 KB
CERIAS/CERIAS 2016/The Application of Natural Language Processing to Open Source Intelligence fo..mp4 33.9 MB
CERIAS/CERIAS 2016/The Internet of Value Privacy and Applications.mp4 40.3 MB
CERIAS/CERIAS 2016/The Role of the NSA in the Development of DES.en.srt 93 KB
CERIAS/CERIAS 2016/The Role of the NSA in the Development of DES.mp4 72.4 MB
CERIAS/CERIAS 2016/The role of cyber insurance in security and risk management.en.srt 104 KB
CERIAS/CERIAS 2016/The role of cyber insurance in security and risk management.mp4 61.9 MB
CERIAS/CERIAS 2016/Towards Safe In-memory Transactions.en.srt 99 KB
CERIAS/CERIAS 2016/Towards Safe In-memory Transactions.mp4 40.2 MB
CERIAS/CERIAS 2016/Usable Secure Webmail for Grassroots Adoption.mp4 55.4 MB
CERIAS/CERIAS 2016/Usable and Secure Human Authentication.en.srt 90 KB
CERIAS/CERIAS 2016/Usable and Secure Human Authentication.mp4 44.2 MB
CERIAS/CERIAS 2016/Xukai Zou - Indiana University-Purdue University Indianapolis.mp4 69.1 MB
CERIAS/CERIAS 2016/nesCheck Memory Safety for Embedded Devices.en.srt 57 KB
CERIAS/CERIAS 2016/nesCheck Memory Safety for Embedded Devices.mp4 37.7 MB
CERIAS/CERIAS 2017/A2C Self Destructing Exploit Executions via Input Perturbation.en.srt 68 KB
CERIAS/CERIAS 2017/A2C Self Destructing Exploit Executions via Input Perturbation.mp4 31.9 MB
CERIAS/CERIAS 2017/Behavioral and Computational Aspects of Network Security Games.en.srt 80 KB
CERIAS/CERIAS 2017/Behavioral and Computational Aspects of Network Security Games.mp4 50.3 MB
CERIAS/CERIAS 2017/Brig Gen. Greg Touhill, (USAF Ret.).en.srt 96 KB
CERIAS/CERIAS 2017/Brig Gen. Greg Touhill, (USAF Ret.).mp4 55.3 MB
CERIAS/CERIAS 2017/CIO Risk Appetite and Information Security Management.en.srt 74 KB
CERIAS/CERIAS 2017/CIO Risk Appetite and Information Security Management.mp4 36.4 MB
CERIAS/CERIAS 2017/Changing the Economics of the Network.en.srt 68 KB
CERIAS/CERIAS 2017/Changing the Economics of the Network.mp4 38.3 MB
CERIAS/CERIAS 2017/Cyber Security in Large Complex Corporations.en.srt 84 KB
CERIAS/CERIAS 2017/Cyber Security in Large Complex Corporations.mp4 57.8 MB
CERIAS/CERIAS 2017/DataShield Configurable Data Confidentiality and Integrity.en.srt 56 KB
CERIAS/CERIAS 2017/DataShield Configurable Data Confidentiality and Integrity.mp4 27.4 MB
CERIAS/CERIAS 2017/Day 2 Keynote - David Meltzer - Tripwire.en.srt 128 KB
CERIAS/CERIAS 2017/Day 2 Keynote - David Meltzer - Tripwire.mp4 123.4 MB
CERIAS/CERIAS 2017/Differential Guarantees for Cryptographic Systems.mp4 32.7 MB
CERIAS/CERIAS 2017/Emerging Cyber Threats.mp4 56.2 MB
CERIAS/CERIAS 2017/Enabling Trust and Efficiency in Provenance-Aware Systems.en.srt 103 KB
CERIAS/CERIAS 2017/Enabling Trust and Efficiency in Provenance-Aware Systems.mp4 59.7 MB
CERIAS/CERIAS 2017/Fireside Chat.en.srt 104 KB
CERIAS/CERIAS 2017/Fireside Chat.mp4 109.7 MB
CERIAS/CERIAS 2017/INSuRE Program Overview.en.srt 42 KB
CERIAS/CERIAS 2017/INSuRE Program Overview.mp4 42.9 MB
CERIAS/CERIAS 2017/Information Flow Security in Practical Systems.mp4 40.7 MB
CERIAS/CERIAS 2017/Lok Yan.en.srt 46 KB
CERIAS/CERIAS 2017/Lok Yan.mp4 61.8 MB
CERIAS/CERIAS 2017/MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ..en.srt 67 KB
CERIAS/CERIAS 2017/MPI Multiple Perspective Attack Investigation with Semantic Aware Execution ..mp4 38.6 MB
CERIAS/CERIAS 2017/Network Deception as a Threat Intelligence Platform.en.srt 103 KB
CERIAS/CERIAS 2017/Network Deception as a Threat Intelligence Platform.mp4 46.6 MB
CERIAS/CERIAS 2017/Panel 2 - Security Through Artificial Intelligence.mp4 94.5 MB
CERIAS/CERIAS 2017/Panel 3 - Securing Vehicles & Machinery.en.srt 109 KB
CERIAS/CERIAS 2017/Panel 3 - Securing Vehicles & Machinery.mp4 135.7 MB
CERIAS/CERIAS 2017/Panel 4 - Securing Smart Communities.en.srt 100 KB
CERIAS/CERIAS 2017/Panel 4 - Securing Smart Communities.mp4 135.2 MB
CERIAS/CERIAS 2017/Prof. Eugene Spafford.en.srt 4 KB
CERIAS/CERIAS 2017/Prof. Eugene Spafford.mp4 5.9 MB
CERIAS/CERIAS 2017/Prof. Mathias Payer.en.srt 61 KB
CERIAS/CERIAS 2017/Prof. Mathias Payer.mp4 80.4 MB
CERIAS/CERIAS 2017/Ron Ross - NIST.mp4 66.4 MB
CERIAS/CERIAS 2017/Security Through Formal Methods and Secure Architecture.en.srt 92 KB
CERIAS/CERIAS 2017/Security Through Formal Methods and Secure Architecture.mp4 103.5 MB
CERIAS/CERIAS 2017/TechTalk - Jeremiah M. Blocki.en.srt 44 KB
CERIAS/CERIAS 2017/TechTalk - Jeremiah M. Blocki.mp4 56.5 MB
CERIAS/CERIAS 2017/TechTalk - Making the Internet Fast Again..At The Cost of Security.en.srt 34 KB
CERIAS/CERIAS 2017/TechTalk - Making the Internet Fast Again..At The Cost of Security.mp4 38.7 MB
CERIAS/CERIAS 2017/TechTalk - Shreyas Sundaram.en.srt 57 KB
CERIAS/CERIAS 2017/TechTalk - Shreyas Sundaram.mp4 52.9 MB
CERIAS/CERIAS 2017/The Rise of Cyber-Crime A Legal Perspective.en.srt 102 KB
CERIAS/CERIAS 2017/The Rise of Cyber-Crime A Legal Perspective.mp4 68.4 MB
CERIAS/CERIAS 2017/The Stark Reality of Red vs. Blue and Why it's Not Working.en.srt 105 KB
CERIAS/CERIAS 2017/The Stark Reality of Red vs. Blue and Why it's Not Working.mp4 77.3 MB
CERIAS/CERIAS 2017/Welcome - Ian Steff, Indiana Economic Development Corporation.en.srt 39 KB
CERIAS/CERIAS 2017/Welcome - Ian Steff, Indiana Economic Development Corporation.mp4 24.7 MB
CERIAS/CERIAS 2017/Women in CyberSecurity Report.en.srt 36 KB
CERIAS/CERIAS 2017/Women in CyberSecurity Report.mp4 39.6 MB
CERIAS/CERIAS 2018/Awards.eng.srt 70 KB
CERIAS/CERIAS 2018/Awards.mp4 25.4 MB
CERIAS/CERIAS 2018/Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.eng.srt 176 KB
CERIAS/CERIAS 2018/Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years.mp4 64 MB
CERIAS/CERIAS 2018/Blockchains - A Technical Perspective on the Future of Decentralization.eng.srt 93 KB
CERIAS/CERIAS 2018/Blockchains - A Technical Perspective on the Future of Decentralization.mp4 29.8 MB
CERIAS/CERIAS 2018/CFIXX - Object Type Integrity for C.en.srt 75 KB
CERIAS/CERIAS 2018/CFIXX - Object Type Integrity for C.mp4 23.8 MB
CERIAS/CERIAS 2018/Cyber Center for Education and Innovation.eng.srt 38 KB
CERIAS/CERIAS 2018/Cyber Center for Education and Innovation.mp4 15.6 MB
CERIAS/CERIAS 2018/Developing a Public Private Cybersec Scorecard for the State of Indiana.eng.srt 83 KB
CERIAS/CERIAS 2018/Developing a Public Private Cybersec Scorecard for the State of Indiana.mp4 31.7 MB
CERIAS/CERIAS 2018/Eli Lilly 's Path to a Successful Threat Intelligence Program.en.srt 89 KB
CERIAS/CERIAS 2018/Eli Lilly 's Path to a Successful Threat Intelligence Program.mp4 45.3 MB
CERIAS/CERIAS 2018/Firesdie Chat - What’s Ahead - The Spirit of Cybersecurity Yet to Come.eng.srt 191 KB
CERIAS/CERIAS 2018/Firesdie Chat - What’s Ahead - The Spirit of Cybersecurity Yet to Come.mp4 69.6 MB
CERIAS/CERIAS 2018/Fireside Chat - Cybersecurity Past.eng.srt 176 KB
CERIAS/CERIAS 2018/Fireside Chat - Cybersecurity Past.mp4 77.4 MB
CERIAS/CERIAS 2018/Fireside Chat - The State of Cybersecurity Education.eng.srt 132 KB
CERIAS/CERIAS 2018/Fireside Chat - The State of Cybersecurity Education.mp4 61.8 MB
CERIAS/CERIAS 2018/History of CERIAS - Eugene Spafford.mp4 59.3 MB
CERIAS/CERIAS 2018/Human Biases Meet Cybersecurity of Embedded and Networked Systems.eng.srt 104 KB
CERIAS/CERIAS 2018/Human Biases Meet Cybersecurity of Embedded and Networked Systems.mp4 32.5 MB
CERIAS/CERIAS 2018/Indiana Cybersecurity Initiatives.eng.srt 94 KB
CERIAS/CERIAS 2018/Indiana Cybersecurity Initiatives.mp4 30.5 MB
CERIAS/CERIAS 2018/Keynote - Mark Spangler.eng.srt 162 KB
CERIAS/CERIAS 2018/Keynote - Mark Spangler.mp4 71.6 MB
CERIAS/CERIAS 2018/Keynote - Mark Weatherford.eng.srt 124 KB
CERIAS/CERIAS 2018/Keynote - Mark Weatherford.mp4 58.1 MB
CERIAS/CERIAS 2018/Lessons Learned From the Retrocomputing Community.en.srt 93 KB
CERIAS/CERIAS 2018/Lessons Learned From the Retrocomputing Community.mp4 30.6 MB
CERIAS/CERIAS 2018/Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai..en.srt 95 KB
CERIAS/CERIAS 2018/Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fai..mp4 45.2 MB
CERIAS/CERIAS 2018/Mind Your Credit Assessing the Health of the Ripple Credit Network.mp4 32.9 MB
CERIAS/CERIAS 2018/OBLIVIATE A Data Oblivious File System for Intel SGX.en.srt 108 KB
CERIAS/CERIAS 2018/OBLIVIATE A Data Oblivious File System for Intel SGX.mp4 40.4 MB
CERIAS/CERIAS 2018/Online Adversarial Learning of Nuclear Reactor Dynamical State.eng.srt 70 KB
CERIAS/CERIAS 2018/Online Adversarial Learning of Nuclear Reactor Dynamical State.mp4 26 MB
CERIAS/CERIAS 2018/State of Cybersecurity in Healthcare.en.srt 129 KB
CERIAS/CERIAS 2018/State of Cybersecurity in Healthcare.mp4 56.3 MB
CERIAS/CERIAS 2018/The Economics of Offline Password Cracking.en.srt 86 KB
CERIAS/CERIAS 2018/The Economics of Offline Password Cracking.mp4 36.8 MB
CERIAS/CERIAS 2018/Threats and Risks in Cryptocurrencies.en.srt 77 KB
CERIAS/CERIAS 2018/Threats and Risks in Cryptocurrencies.mp4 39.6 MB
CERIAS/CERIAS 2018/Welcome.eng.srt 53 KB
CERIAS/CERIAS 2018/Welcome.mp4 18.6 MB
CERIAS/CERIAS 2018/What Roles Can Empirical Research Play to Advance Software Security Knowledg..en.srt 88 KB
CERIAS/CERIAS 2018/What Roles Can Empirical Research Play to Advance Software Security Knowledg..mp4 39.9 MB
CERIAS/CERIAS 2019/A Data Privacy Primer.mp4 32.4 MB
CERIAS/CERIAS 2019/A Game Theoretic Approach for Adversarial Machine Learning - When Big Data M..en.srt 60 KB
CERIAS/CERIAS 2019/A Game Theoretic Approach for Adversarial Machine Learning - When Big Data M..mp4 30.3 MB
CERIAS/CERIAS 2019/Aniket Kate, GDPR Privacy vs. Blockchain Transparency.en.srt 58 KB
CERIAS/CERIAS 2019/Aniket Kate, GDPR Privacy vs. Blockchain Transparency.mp4 41.9 MB
CERIAS/CERIAS 2019/Awards.en.srt 19 KB
CERIAS/CERIAS 2019/Awards.mp4 16.6 MB
CERIAS/CERIAS 2019/Baiju Patel, Intel.mp4 53.5 MB
CERIAS/CERIAS 2019/CEIVE Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Infer..mp4 31.3 MB
CERIAS/CERIAS 2019/Closing Keynote.en.srt 98 KB
CERIAS/CERIAS 2019/Closing Keynote.mp4 85.4 MB
CERIAS/CERIAS 2019/Connected Intelligence.en.srt 0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
0 B
Name
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
CERIAS Video 20.3 GB 0
CERIAS Video 38.7 GB 8
Marihuana v zakone 1 ceria.avi Video 569.5 MB 2
CERIAS Video 38.8 GB 10
CERIAS Video 41.2 GB 10

Loading...