The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

News & Blogs

Spafford Says National Cyber Security Spending Must Increase (Red Herring Magazine) Spafford Says National Cyber Security Spending Must Increase (Red Herring Magazine)

Mon, August 29, 2005CERIAS Media Citings

CERIAS Executive Director predicts grim future for national cybersecurity, citing growing threats from organized crime, increasing identity theft, and “national level” incidents.



IEEE J-SAC - High-speed Network Security CFP

Mon, August 29, 2005Call For Papers

The IEEE Journal on Selected Areas in Communications has released a Call for Papers for it’s upcoming issue on High-speed Network Security



SCMA 2005 Call for Papers

Wed, August 24, 2005Call For Papers

The Department of Mathematics and Statistics at Auburn University, and the Forum for Interdisciplinary Mathematics (FIM) are proud to co-organize a three-day International Conference on Statistics, Combinatorics Mathematics and Applications.  Abstracts are due October 10, 2005.



I3P Funding Opportunities List

Thu, August 18, 2005General

The Institute for Information Infrastructure Protection (I3P) maintains a comprehensive list, updated at least weekly, of funding opportunities for researchers in the growing field of information security.



Reports From The Computer Security Industry Alliance

Wed, July 27, 2005General

The Computer Security Industry Alliance
recently issued three reports of possible interest:



Zeitline: a forensic timeline editor

Mon, July 18, 2005Feature

The CERIAS computer forensics research group is proud to announce the
initial release of Zeitline: a forensic timeline editor.  Zeitline is
an open-sourced graphical tool written in Java used for the analysis
of forensic events.

Zeitline allows a forensic investigator to import events from various sources of a computing system or network and then order and classify them into one or more timelines of events. Events may be grouped together into super-events, creating a hierarchy of events. The organization of events and timelines as tree views allows the investigator to display and hide specific events, which makes it easy to focus on the relevant aspects of the investigation one at a time. This is further supported by the ability to filter events based on keywords as well as start and ending times.

More information



Examining Electronic Voting Systems

Mon, July 18, 2005Feature

Dr. Rebecca Mercuri, an internationally recognized experts on electronic voting, will speak at events in Indianapolis and West Lafayette about the promise and challenges of electronic voting.



2004 Information Security Symposium

Mon, July 18, 2005Feature

Energizing the Enterprise: Cyber Security In Context

The Center for Education and Research in Information Assurance and Security is pleased to join with Discovery Park and the e-Enterprise Center for our 2004 Symposium.

As we conclude our sixth year of research and education, we invite you to join us March 23-24 for the 5th Annual Information Security Symposium. Each year our goal is to provide an opportunity to meet students, staff and faculty; learn about educational initiatives; explore cutting-edge research; and interact with sponsors, affiliates, and friends.  More Information >>



Arxan Technologies finalist in 2003 Mira Awards Arxan Technologies finalist in 2003 Mira Awards

Mon, July 18, 2005Feature

Arxan Technologies, which uses software patents licensed from Purdue, was recognized May 16th at the 2003 Mira Awards. CERIAS Professors Mike Atallah and John Rice, and CS Assistant Department Head Tim Korb—founders and research scientists with Arxan—attended the ceremony in Indianapolis at the Indiana Roof Ballroom. Arxan Technologies received a finalist award in the Gazelle category.

  • More information



2003 Research Symposium

Mon, July 18, 2005Feature

As we conclude our fifth year of research and education, we invite you to join us April 8-9 for the Fourth Annual Information Security Symposium. Each year our goal is to provide an opportunity to meet students, staff and faculty; learn about educational initiatives; explore cutting-edge research; and interact with sponsors, affiliates, and friends.