News
Conventional methods of the evaluation of cyber attacks on avionics networks do not meet the requirements of the ongoing Industry 4.0 (I4.0) revolution. The proposed alternative method is the use of ...
Frequent itemset mining is a core data mining task and has been studied extensively. Although by their nature, frequent itemsets are aggregates over many individuals and would not seem to pose a ...
This series of pages on intrusion detection resources was originally put together by Mark Crosbie as a graduate student at the COAST Laboratory.
Our annual security symposium will take place on April 1 & 2, 2025.
Marcus Rogers, professor and associate dean for faculty at Purdue Polytechnic, has been elected treasurer of the American Academy of Forensic Sciences (AAFS). This position puts Rogers onto AAFS’ ...
CERIAS Fellow, Edward Delp, the Charles William Harrison Distinguished Professor of Electrical and Computer Engineering and professor of biomedical engineering was awarded the 2014 Morrill Award. The ...
Recordings from the past symposium are below. Adobe Flash is required to view. The sound quality is not what we hoped to capture and we are unable to alter it to a better quality.
As more personal data is collected, analyzed, and published by tech companies, academic researchers, and government agencies, the concern for privacy protection increases. To address these concerns, ...
GEMINA aims to develop digital twin technology for advanced nuclear reactors and transform operations and maintenance (O&M) systems in the next generation of nuclear power plants. There is a need for ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results