Personal tools
  •  
You are here: Home Program SAM'12: Tuesday, July 17, 2012 Schedule
Important Date
July 16-19, 2012
The WORLDCOMP'12
22 joint conferences


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
Current Event
WORLDCOMP'15
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'13
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'08
Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 

SAM'12: Tuesday, July 17, 2012 Schedule

Last modified 2012-07-08 18:20

To select a different schedule CLICK HERE


6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)


SESSION 3-SAM:    CYBERSECURITY + SECURITY EDUCATION
                  Co-Chairs: Prof. George Markowsky and Dr. Linda Markowsky
                  University of Maine, Orono, Maine, USA
                  July 17, 2012 (Tuesday); 08:00am - 03:00pm
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  Implementation Progress, Student Perceptions, and Refinement of a Virtual
                  Information Security Laboratory
                  Cory Cavanagh and Raymond Albert
                  University of Maine at Fort Kent, Maine, USA

08:20 - 08:40am:  On Conducting Cyber Security Labs from the Cloud
                  Nick Flower and Kevin Amorin
                  Northeastern University, Boston, MA, USA

08:40 - 09:00am:  Effectiveness of Cybersecurity Competitions
                  Ronald S. Cheung, Joseph P. Cohen, Henry Z. Lo, Fabio Elia, and
                  Veronica Carrillo-Marquez
                  University of Massachusetts Boston, MA, USA

09:00 - 09:20am:  Who's That Knocking At Your Cybercastle's Gate?
                  George Markowsky and Linda Markowsky
                  University of Maine, Orono, Maine, USA

09:20 - 09:40am:  Developing Small Team-based Cyber Security Exercises
                  Brandon Mauer, William Stackpole, Daryl Johnson
                  Rochester Institute of Technology, Rochester, New York, USA

09:40 - 10:00am:  Employing Entropy in the Detection and Monitoring of Network
                  Covert Channels
                  Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, Peter Lutz
                  Networking, Security & Systems Administration, Rochester Institute
                  of Technology, New York, USA

10:00 - 10:20am:  NAT Denial of Service: An Analysis of Translation Table Behavior on
                  Multiple Platforms
                  Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra
                  Rochester Institute of Technology, Rochester, New York, USA

10:20 - 10:40am:  BREAK

10:40 - 11:00am:  Toward a More Perfect Scoring System for the Northeast Collegiate
                  Cyber Defense Competions (NECCDC)
                  George Markowsky and Linda Markowsky
                  University of Maine, Orono, Maine, USA

11:00 - 11:20am:  UPnP Port Manipulation as a Covert Channel
                  Steve Monette, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

11:20 - 11:40am:  A Multi-Disciplined Security Engineering Education Approach
                  William D. Casper and Stephen M. Papa
                  Lockheed Martin, Southern Methodist University, Texas, USA

11:40 - 12:00pm:  Forensic Acquisition and Analysis of VMware Virtual Hard Disks
                  Manish Hirwani, Yin Pan, Bill Stackpole, Daryl Johnson
                  Rochester Institute of Technology, New York, USA

12:00 - 12:20pm:  A Covert Channel in the TTL Field of DNS Packets
                  Christopher Hoffman, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

12:20 - 12:40pm:  A Statistical Approach to Reduce Malware Inside an Information System
                  in Banking Sector
                  Gustavo A Valencia Zapata, Juan C Salazar Uribe
                  Universidad Nacional de Colombia, Escuela de Ciencias Estadisticas,
                  Medellin, Colombia

12:40 - 01:20pm:  LUNCH (On Your Own)

01:20 - 01:40pm:  Audio Steganography Using High Frequency Noise Introduction
                  David Wheeler, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

01:40 - 02:00pm:  Webpage Source Based Covert Channel
                  Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

02:00 - 02:20pm:  A Covert Channel Over Transport Layer Source Ports
                  James R. F. Gimbe, Daryl Johnson, Peter Lutz, Bo Yuan
                  Rochester Institute of Technology, New York, USA

02:20 - 02:40pm:  Covert Channel in the BitTorrent Tracker Protocol
                  Joseph Desimone, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

02:40 - 03:00pm:  A Physical Channel in a Digital World
                  Michael D. Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz
                  Rochester Institute of Technology, New York, USA

03:00 - 03:20pm:  BREAK


SESSION 4-SAM:    SECURITY APPLICATIONS + ABUSE PREVENTION METHODS +
                  SOFTWARE AND TOOLS
                  Co-Chairs: Dr. Nizar Al Holou, University of Detroit Mercy, USA
                             Prof. Srinivas Sampalli, Dalhousie University, Canada
                  July 17, 2012 (Tuesday); 03:20pm - 06:00pm
                  (LOCATION: Ballroom 6)

03:20 - 03:40pm:  A Bayesian Network Analysis of System Failure in the Presence of
                  Low-Probability External Correlating Events
                  Jack K. Horner
                  Independent Researcher, USA

03:40 - 04:00pm:  Software Similarity and Metamorphic Detection
                  Mausami Mungale and Mark Stamp
                  San Jose State University, San Jose, California, USA

04:00 - 04:20pm:  Cyber Semantic Account Management - User Behavior Modeling,
                  Visualization and Monitoring
                  Keith Shapiro and Tony Stirtzinge
                  Securboration, Inc., Melbourne, Florida, USA

04:20 - 04:40pm:  Vulnerability Assessment in Cloud Computing
                  Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran
                  University of North Texas, Denton, Texas, USA

04:40 - 05:00pm:  A Deception Framework for Survivability Against Next Generation
                  Cyber Attacks
                  Ruchika Mehresh and Shambhu Upadhyaya
                  University at Buffalo, Buffalo, New York, USA

05:00 - 05:20pm:  Methods for Restricting Access in a Web Application
                  Grant Miller and Nader Nassar
                  International Business Machines (IBM), Boulder, Colorado, USA;
                  International Business Machines (IBM), Somers, New York, USA

05:20 - 05:40pm:  Infrared Technology Pinpoints Energy Loss in Buildings
                  Timmy Nguyen and Leonidas Deligiannidis
                  Wentworth Institute of Technology, Boston, MA, USA

05:40 - 06:00pm:  FREE SLOT


06:00 - 06:30pm:  POSTER/DISCUSSION SESSION A-SAM
                  July 17, 2012 (Tuesday)
                  (LOCATION: Hallways of Ballrooms 1-5)

                  O. Portsentry for Special Occasions
                     Linda Markowsky
                     University of Maine, Maine, USA
                  O. Stroke Based Graphical Password Scheme: Passtroke
                     Taehyoung Ko, Sukin Kang, Jonguk Kim, Manpyo Hong
                     Division of Computer Engineering, Graduate School, Ajou University, Korea
                  O. Impact of Security Measures and Algorithms on Operations at
                     Transportation Facilities
                     Marguerite Zarrillo and Elijah El Lazkani
                     University of Massachusetts, Dartmouth, MA, USA
                  O. PortSentry for Special Occasions
                     Linda Markowsky
                     University of Maine, Orono, Maine, USA
                  O. A Study on Secure User Authentication Protocols
                     Yu-jong Jang and Jin Kwak
                     Korea Information Security Department, Soonchunhyang University, Korea
                  O. A Facial Recognition System Based on User Authentication for Mobile Office
                     Environments
                     Yun-Sang Byun, Sung Yong Ryu and Jin Kwak
                     Korea Information Security Department, Soonchunhyang University, Korea
                  O. Robust ECC-based Three Factor User Authentication Preserving Biometric
                     Privacy
                     Tien-Ho Chen, Hsiu-Lien Yeh, Kuei-Jung Hu, and Wei-Kuan Shih
                     Institute of Information System and Applications, National TsingHua
                     University, Taiwan
                  O. Preliminary Study in Zoo Stability in Fingerprint Recognition
                     Kevin O'Connor and Stephen Elliott
                     Purdue University, USA


06:00 - 09:00pm:  TUTORIALS + INVITED PRESENTATIONS
                  (Please see the lists at the begining of this booklet)

To select a different schedule CLICK HERE
Announcements
All tracks of WORLDCOMP have received high citations
Click Here for details

Condolences
Click Here for details

WORLDCOMP'12 Exhibition
Click Here for details


2012 Co-Sponsors
Bioinformatics & Computational Biology Program
George Mason University, USA

Biomedical Cybernetics Laboratory
HST of Harvard University & MIT, USA

Minnesota Supercomputing Institute
University of Minnesota, USA

Center for Cyber Defense, NCAT

Argonne's Leadership Computing Facility of Argonne National Laboratory
Illinois, USA

The Center for Advanced Studies in Identity Sciences
(CASIS: NC A&T;, Carnegie Mellon, Clemson, UNC Wilmington

Knowledge Management & Intelligent System Center (KMIS)
University of Siegen, Germany

Intelligent Cyberspace Engineering Lab., ICEL
Texas A&M; University, Texas, USA
UMIT, Institute of Bioinformatics and Translational Research
Austria

Hawkeye Radiology Informatics
Department of Radiology, College of Medicine, University of Iowa, USA

The International Council on Medical and Care Compunetics
US Chapter of World Academy of Science

Supercomputer Software Department (SSD)
Institute of Computational Mathematics & Mathematical Geophysics, Russian Academy of Sciences


International Society of Intelligent Biological Medicine

Medical Image HPC & Informatics Lab (MiHi Lab)
University of Iowa, USA

High Performance Computing for Nanotechnology (HPCNano)

Manx Telecom

Computer Science Research, Education, and Applications Press;

World Academy of Biomedical Sciences and Technologies




Super Micro Computer, Inc.,
San Jose, California, USA


Intel Corporation


Altera Corporation


Hodges Health

Leading Knowledge


Science Publication

 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)