Check-in |
9am - 9:30am |
Welcome and Keynote Session |
9:30am - 10:40am |
- Keynote: Digital Identity Protection - Concepts and Issues
Elisa Bertino
Purdue University
|
Coffee Break |
10:40am - 11am |
Session 1: Introductions (tentative) |
11:00am - 12:40pm |
- Daniel Massey – Colorado State University
- Eric Chan-tin – Oklahoma State University
- Eugene Vasserman - Kansas State University
- James Sterbenz – University of Kansas
- Miaoqing Huang – University of Arkansas
- Murtuza Jadliwala – Wichita State University
- Perry Alexander – University of Kansas
- Samuel Cheng – University of Oklahoma
- Thomas Johnson – Oklahoma State University
- Will Metcalf – Emerging Threats
|
Lunch and Poster Session |
12:40pm - 2:20pm |
- A Comparative Simulation Study of Transport Protocols
- Accurate Internet-scale measurements for secure network coordinate systems
- Android Phone Penetration Testing for Anti-forensics technical and Data analysis
- Exploration to the Methods for Enhancing College Students' Information Security Awareness in China
- In-Home Video Monitoring to Support Caregivers of Dementia Patients
- Investigative Response Modeling and Predictive Data Collection
- Modelling Critical Node Attacks in MANETs
- Multilevel graphs used in Internet modeling
- Network Security Comparison between China and US
- Performance Comparison of MANET routing protocol in ns-3
- Protocols for Highly-Dynamic Airborne Networks
- Review Spamming Detection exploiting Social Network
- Revisiting Circuit Clogging Attacks on Tor
- SafeExit: Protecting Exit Nodes in Anonymous Internet Routing
- Securing Localization in Wireless Networks using Jamming
- Smart Grid Communications: Security and Privacy
- The Privacy Preserving Data Matching Software
- Why iOS is more Secure than Android
|
Session 2: Research Presentations |
2:20pm-3:40pm |
- Generalized Epidemic Mean-Field Model for Spreading Processes over Multi-Layer Complex Networks
Faryad Darabi Sahneh, Caterina Scoglio, Piet Van Mieghem
Kansas State University
- A Look at BGP Security Threats With BGPmon
Lawrence Weikum, and Daniel Massey
Colorado State University
- Peer-Ad: A Novel Privacy-Preserving Online Advertising Scheme using Pervasive Communications
Ketan Paithankar, Navid Reza Alamatsaz, Murtuza Jadliwala
Wichita State University
- HealthTrust: Assessing the Trustworthiness of Healthcare Information on the Internet
Meeyoung Park, Bo Luo, Xue-wen Chen
University of Kansas, Wayne State University
|
Coffee Break |
3:40pm - 4:00pm |
Session 3: Research Presentations |
4:00pm - 5:00pm |
- A Delay-based PUF Design Using Multiplexers on FPGA
Shiming Li, and Miaoqing Huang
University of Arkansas
- An Integrated IPS with Honeynet Support System - A Case Study of Active Defense to Unknown Attacks
Yanyan Li, Keyu Jiang
Fort Hays State University
- Setting Up and Using a Cyber Security Lab for Education Purposes
Alexandru G. Bardas and Xinming Ou
Kansas State University
|
Closing remarks |
5:00pm |
|