SAM'14: Tuesday, July 22, 2014 Schedule
Last modified
2014-07-16 19:42
To select a different schedule ![]() |
06:45a - 05:00p: REGISTRATION (Second Floor, Conference Lobby: 1-5) SESSION 4-SAM: NETWORK SECURITY + SECURITY MANAGEMENT Co-Chairs: Prof. Bon Sy, City University of New York, USA; Dr. Gary Lieberman, Caldwell College, USA July 22, 2014 (Tuesday); 08:00am - 10:20pm (LOCATION: Ballroom 2) 08:00 - 08:20am: Malicious Device Inspection in the HAN Smart Grid Eric McCary, Yang Xiao University of Alabama, Tuscaloosa, Alabama, USA 08:20 - 08:40am: Developing and Assessing a Multi-Factor Authentication Protocol for Revocable Distributed Storage in a Mobile Wireless Network Scott Bell, Eugene Vasserman, Daniel Andresen Kansas State University, Manhattan, Kansas, USA 08:40 - 09:00am: Smart Grid HAN Accountability with Varying Consumption Devices Eric McCary, Yang Xiao University of Alabama, Tuscaloosa, Alabama, USA 09:00 - 09:20am: Implementation of Oblivious Bloom Intersection in Private Set Intersection Protocol (PSI) Levent Ertaul, Aditya M. Mehta, Takai K. Wu California State University East Bay, Hayward, California, USA 09:20 - 09:40am: A Comparative Evaluation of Intrusion-Alert Prediction Techniques Kian-Moh Terence Tan, Neil C. Rowe, Christian J. Darken, and Farn-Wei J. Khong DSO National Laboratories, Singapore; U.S. Naval Postgraduate School, Monterey, California, USA; Defence Science & Technology Agency, Singapore 09:40 - 10:00am: Email Encryption: Discovering Reasons Behind its Lack of Acceptance Kendal Stephens, Lei Chen Sam Houston State University, Huntsville, Texas, USA 10:00 - 10:20am: IT Security Policies and Employee Compliance: The Effects of Organizational Environment Kendal Stephens, Narasimha Shashidhar Sam Houston State University, Huntsville, Texas, USA 10:20 - 10:40am: BREAK SESSION 5-SAM: BIOMETRICS & FORENSICS I + CRYPTOGRAPHIC TECHNOLOGIES Co-chairs: Dr. Audrey Gendreau, Saint Leo University, USA; Dr. Victor Gayoso Mart.nez, CSIC, Spain July 22, 2014 (Tuesday); 10:40am - 12:00pm (LOCATION: Ballroom 2) 10:40 - 11:00am: State of the Art in Similarity Preserving Hashing Functions V. Gayoso Martinez, F. Hernandez Alvarez, L. Hernandez Encinas CSIC, Spain; Institute of Physical and Information Technologies (ITEFI), Spain 11:00 - 11:20am: VOIP Forgery Detection Satish Tummala, Yanxin Liu, Qingzhong Liu Sam Houston State University, Huntsville, Texas, USA 11:20 - 11:40am: A Low-Complexity Procedure for Pupil and Iris Detection Suitable for Biometric Identification V. Gayoso Martinez, F. Hernandez Alvarez, L. Hernandez Encinas CSIC, Spain; Institute of Physical and Information Technologies (ITEFI), Spain 11:40 - 12:00pm: Towards Designing a Greener Advanced Encryption Standard (AES) S. Raghu Talluri, Swapnoneel Roy University of North Florida, Jacksonville, Florida, USA 12:00 - 01:00pm: LUNCH (On Your Own) SESSION 6-SAM: COMPUTER AND HARDWARE SECURITY Co-Chairs: Dr. Nicolas Sklavos, Technological Educational Institute of Western Greece, Greece; Dr. Samuel Ndueso John, Covenant University, Nigeria July 22, 2014 (Tuesday); 01:00am - 02:20pm (LOCATION: Ballroom 2) 01:00 - 01:20pm: Modeling and Attack for 4-MUXs Based PUF Shohei Kiryu, Kensaku Asahi, Masaya Yoshikawa Department of Information Engineering, Meijo University, Japan 01:20 - 01:40pm: Relationship Between Number of Stages in ROPUF and CRP generation on FPGA Muslim Mustapa, Mohammed Niamat Electrical Engineering and Computer Science, University of Toledo, USA 01:40 - 02:00pm: Autonomic Intrusion Detection System in Cloud Computing with Big Data Kleber M. M. Vieira, Fernando Schubert, Guilherme A. Geronimo, Rafael de Souza Mendes, Carlos B. Westphall The Federal University of Santa Catarina (UFSC), Santa Catarina, Brazil 02:00 - 02:20pm: Fourier Transform as Feature Extraction for Malware Classification Stanislav Ponomarev, Nathan Wallace, Travis Atkison Louisiana Tech University, Ruston, Louisiana, USA SESSION 7-SAM: SPECIAL TRACK ON IOT AND SCADA CYBERSECURITY EDUCATION Chair: Prof. George Markowsky; Professor & Associate Director, School of Computing & Information Science, University of Maine, Orono, Maine, USA July 22, 2014 (Tuesday); 02:20pm - 06:00pm (LOCATION: Ballroom 2) 02:20 - 02:40pm: MODBUS Covert Channel Carlos Leonardo, Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA 02:40 - 03:00pm: A Behavior-Based Covert Channel in a MMQ Brian Rowe, Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA 03:00 - 03:40pm: BREAK & POSTER/DISCUSSION SESSION A-SAM July 22, 2014 (Tuesday) (LOCATION: Hallways of Ballrooms 1-5) SESSION 7-SAM: Continued ... SPECIAL TRACK ON IOT AND SCADA CYBERSECURITY EDUCATION 03:40 - 04:00pm: CloudWhip: A Tool for Provisioning Cyber Security Labs in the Amazon Cloud Kevin Amorin, N. H. Shekar, Leena AlAufi College of Computer and Information Science, Northeastern University, Boston, Massachusetts, USA 04:00 - 04:20pm: SCADA Cybersecurity Education from a Curriculum and Instruction Perspective Raymond Albert University of Maine at Fort Kent, Fort Kent, Maine, USA 04:20 - 04:40pm: Audio Steganography Using Stereo Wav Channels Douglas C. Farmer, Daryl Johnson Networking, Security & Systems Administration, Rochester Institute of Technology, Rochester, New York, USA 04:40 - 05:00pm: Potential Vulnerabilities of the NextGen Air Traffic Control System Carl Giannatto, George Markowsky University of Maine, Orono, Maine, USA 05:00 - 05:20pm: From Air Conditioner to Data Breach George Markowsky, Linda Markowsky University of Maine, Orono, Maine, USA 05:20 - 05:40pm: Scanning for Vulnerable Devices on the Internet of Things Linda Markowsky, George Markowsky University of Maine, Orono, Maine, USA 05:40 - 06:00pm: The Maine Cybersecurity Cluster's (MCSC): Virtual Cybersecurity Virtual Cybersecurity Collaborative Learning Laboratory (VCCLL) Glenn Wilson, Lynn Lovewell, Edward Sihler University of Southern Maine, Portland, Maine, USA 06:00 - 09:00pm: TUTORIALS + PANEL DISCUSSIONS + ADDITIONAL INVITED LECTURES
To select a different schedule ![]() |