ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014|
Peter Stephenson, Norwich University Approving Attribution Confidence in Cyber Attacks
Biography: Dr. Peter Stephenson is a writer, consultant, researcher and lecturer in information protection and forensics on largescale computer networks with 40 years experience in electronic and computer technology, more than 20 of which have been spent in information security. He has spoken extensively on digital forensics and security, and has written or contributed to 14 books and several hundred articles in major national and international trade publications and technical/scientific journals. He has lectured and delivered consulting engagements for the past 18 years in eleven countries plus the United States. He currently holds the positions of Research Professor at the Research Institutes at Norwich University and Associate Director of the Master of Science in Information Assurance, School of Graduate Studies, Norwich University. His PhD is in computing from Oxford Brookes University (Oxford, UK) where his thesis was “Structured Investigation of Digital Incidents in Complex Computing Environments”. Dr Stephenson’scurrent research interests are cyber attack attribution, knowledge fusion and actionable intelligence, and cyber conflict.
Stephen F. Bush, GE Global Research Center A Philosophy of Information Assurance and Thoughts on the Future
Biography: Stephen is a researcher in Active Networking and Algorithmic Communications Network Theory at the GE Global Research Center. He explores novel concepts in complexity and algorithmic information theory for applications ranging from network management and wireless ad hoc networking to RNA sequence analyses and novel concepts in nanotechnology-based networking.He has been the Principal Investigator for many DARPA and Lockheed Martin sponsored research projects including: Active Networking (DARPA/ITO), Information Assurance andSurvivability Engineering Tools (DARPA/ISO), Fault Tolerant Networking (DARPA/ATO) and Connectionless Networks (DARPA/ATO), an energy aware sensor network project. Stephen coauthored a book on active network management, titled Active Networks and Active Network Management: A Proactive Management Framework, published by Kluwer Academic Publishers. Before joining GE Global Research, Stephen was a researcher at the Information and Telecommunications Technologies Center (ITTC) at the University of Kansas. He completed his Ph.D. research at the University of Kansas where he received a Strobel Scholarship Award.
I do not fear computers. I fear the lack of them.
- Isaac Asimov
Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.
- Fred Langa
In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it can’t.
- M. Dacier