Personal tools
  •  
You are here: Home Program SAM'11: July 20, 2011 Schedule

SAM'11: July 20, 2011 Schedule

Last modified 2011-06-25 08:08

To select a different schedule CLICK HERE


6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)


SESSION 6-SAM:    ALGORITHMS & APPLICATIONS + MANAGEMENT INFRASTRUCTURES
                  Co-Chairs: Prof. Kevin Daimi
                             Professor and Director, Computer Science and Software
                             Engineering Programs, University of Detroit Mercy, Michigan, USA
                  July 20, 2011 (Wednesday); 08:00am - 02:20pm
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  Technology Risk Management Plan for an Online University
                  Frizella Donegan and Syed (Shawon) M. Rahman
                  Capella University, Minneapolis, USA;
                  University of Hawaii-Hilo, Hawaii, USA

08:20 - 08:40am:  New Detection Technique Using Correlation of Network Flows For NIDS
                  Payam Vahdani Amoli, Alireza Ghobadi, Roozbeh Karimi,
                  Ghazaleh Taherzadeh, and Sanam Maham
                  University of Technology Malaysia; Multimedia University;
                  SOHA Sdn. Bhd. Cyberjaya, Selangor, Malaysia

08:40 - 09:00am:  Application Resilience with Process Failures
                  Kathleen McGill and Stephen Taylor
                  Dartmouth College, Hanover, New Hampshire, USA

09:00 - 09:20am:  Tamper-resistant Monitoring for Securing Multi-core Environments
                  Ruchika Mehresh, Jairaj J. Rao, Shambhu J. Upadhyaya, Sulaksh Natarajan
                  State University of New York at Buffalo, New York, USA

09:20 - 09:40am:  Observation from Microsoft Zero-Day Vulnerability Examples
                  Nathaniel Evans and Xiaohong Yuan
                  North Carolina Agricultural & Technical State University, USA

09:40 - 10:00am:  Smart Grid Insecurity: A New Generation of Threats
                  Summer Olmstead and Ambareen Siraj
                  Tennessee Tech University, Tennessee, USA

10:00 - 10:20am:  A Generic Attribute-Improved RBAC Model by Using Context-aware Reasoning
                  Chen-chieh Feng and Liang Yu
                  National University of Singapore, Singapore

10:20 - 10:40am:  BREAK

10:40 - 11:00am:  A Fuzzy Clustering Algorithm for Fingerprint Enhancement
                  Charlie Obimbo and Wei Wang
                  University of Guelph, Toronto, ON, Canada

11:00 - 11:20am:  Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer
                  Yerzhan Seitkulov
                  Binghamton University, Binghamton, New York, USA

11:20 - 11:40am:  Implementation and Applications of a Fingerprint Encoding System
                  I-Fu Lin and Tzong-An Su
                  Feng Chia University, Taiwan

11:40 - 12:00pm:  Automatic Mission-Critical Data Discovery Based On Content:
                  Experimental Results
                  Jonathan White and Brajendra Panda
                  University of Arkansas, Fayetteville, Arkansas, USA

12:00 - 12:20pm:  Analysis of Current Snapshot Options
                  SrinvasaRao Seelam and Chengcheng Li
                  East Carolina University, Greenville, North Carolina, USA

12:20 - 12:40pm:  System-Manipulation Using Windows-Messaging-Hooks
                  Peter Schartner and Martin Foisner
                  System Security Group University of Klagenfurt Austria, Austria

12:40 - 01:20pm:  LUNCH (On Your Own)

01:20 - 01:40pm:  Following the Trail of Image Spam
                  Shruti Wakade, Robert Bruen, Kathy J. Liszka, and Chien-Chung Chan
                  The University of Akron, Ohio, USA; KnujOn.com

01:40 - 02:00pm:  Architecting for Disaster Recovery - A Practitioner View
                  Octavian Paul Rotaru
                  ACMS, Montreal, QC, Canada

02:00 - 02:20pm:  Risk Management in Healthcare Services
                  Montri Wiboonrat
                  Khon Kaen University, Bangkok, Thailand


SESSION 7-SAM:    POLICIES AND RELATED ISSUES + INTRUSION DETECTION + CLOUD
                  Co-Chairs: TBA
                  July 20, 2011 (Wednesday); 02:20pm - 04:40pm
                  (LOCATION: Ballroom 6)

02:20 - 02:40pm:  A Robust Trust Model for Named-Data Networks
                  Vahab Pournaghshband and Karthikeyan Natarajan
                  University of California, Los Angeles, California, USA

02:40 - 03:00pm:  Practical IDS Alert Correlation in the Face of Dynamic Threats
                  Sathya Chandran Sundaramurthy, Loai Zomlot, and Xinming Ou
                  Kansas State University, Kansas, USA

03:00 - 03:20pm:  BREAK

03:20 - 03:40pm:  Twitter on Drugs: Pharmaceutical Spam in Tweets
                  Chandra Shekar, Kathy J. Liszka, and Chien-Chung Chan
                  The University of Akron, Akron, Ohio, USA

03:40 - 04:00pm:  Information Security Policy Concerns as Case Law Shifts toward
                  Balance Between Employer Security and Employee Privacy
                  Kathleen Jungck and Syed (Shawon) M. Rahman
                  University of Hawaii-Hilo, Hawaii, USA;
                  Capella University, Minneapolis, MN, USA

04:00 - 04:20pm:  An Approach for Automatic Selection of Relevance Features in
                  Intrusion Detection Systems
                  Shan Suthaharan and Karthik Vinnakota
                  University of North Carolina at Greensboro, North Carolina, USA

04:20 - 04:40pm:  Security in Cloud Computing
                  Kazi Zunnurhain and Susan V. Vrbsky
                  University of Alabama, Tuscaloosa, Alabama, USA


SESSION 8-SAM:    MALICIOUS CODE + ATTACK DETECTION
                  Co-Chairs: TBA
                  July 20, 2011 (Wednesday); 04:40pm - 06:00pm
                  (LOCATION: Ballroom 6)

04:40 - 05:00pm:  Feasibility of Attacks: What is Possible in the Real World - A
                  Framework for Threat Modeling
                  Ameya M. Sanzgiri and Shambhu J. Upadhyaya
                  University at Buffalo, Buffalo, New York, USA

05:00 - 05:20pm:  Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over
                  Network Flows
                  S. Farzaneh Tabatabaei and Mazleena Salleh
                  University of Technology Malaysia, Malaysia

05:20 - 05:40pm:  A Secure Witness Based Approach to Combat Malicious Packets in
                  Wireless Sensor Network
                  Usman Tariq, Yasir Malik, Osama El sayed Kamel Abo Khozium, ManPong,
                  Bessam Abdulrazak
                  Imam Mohammad bin Saud University, Saudi Arabia;
                  Sherbrooke University, Canada; Umm Al-Qura University, Saudi Arabia;
                  Ajou University, Korea

05:40 - 06:00pm:  Detecting Undetectable Metamorphic Viruses
                  Sujandharan Venkatachalam and Mark Stamp
                  San Jose State University, San Jose, California, USA


06:00 - 09:00pm:  TUTORIALS

To select a different schedule CLICK HERE


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)