ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - |
This is the proceedings for ASIA Ď06. To see proceedings from other years, simply click on the appropriate button below the main menu. If citing from any papers, please use the following citation information: In the Proceedings of the 3rd Annual Symposium on Information Assurance (ASIA Ď06), June 14-15, 2006, Empire State Plaza, Albany, NY. >> Download full ASIA '06 Proceedings
>> Cover informationpp.
>> Message from Symposium Chairspp. i
>> Symposium Agendapp. ii-iii
>> Table of Contentspp. iv
Session 1: Keynote Address (D-1)
>> Approving Attribution Confidence in Cyber Attackspp. 1 Peter Stephenson
Session 2: Network-Based Threats
>> Towards Phishing E-mail Detection Based on their Structural Propertiespp. 2-8 Madhusudhanan Chandrasekaran, Krishnan Karayanan, and Shambhu Upadhyaya
>> Development of the Higher Education Network Analysis Toolpp. 9-17 Steffani Burd, Johannes Ulrich, Efstatios Gavas, Boris Kochergin, Lois Lehman, and Nasir Memon
>> Download burd-ppt.pdf Presentation
Session 3: Security Management >> Information Systems Security Governance Research: A Behavioral Perspectivepp. 18-26 Sushma Mishra and Gurpreet Dhillon
>> Invited Talk: A Delphi Study on Priorities - Lessons Learned from the Gulf Coastpp. 27-36 Raj Sharman, Jin Ki Kim, H. R. Rao, and Shambhu Upadhyaya
Session 4: Keynote Address (D-2)
>> A Philosophy of Information Assurance and Thoughts on the Futurepp. 37 Stephen Bush
Session 5: Securing Wireless Networks
>> Securing Geographic Routing in Wireless Sensor Networkspp. 38-49 ***WINNER BEST PAPER AWARD***
Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh
>> Download kang_ppt.pdf Presentation
>> A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networkspp. 50-60 Sankalp Balachandran, Dipankar Disgupta, and Lan Wang
>> Download balachandran_ppt.pdf Presentation
Session 6: Information Security Education
>> Developing IA Courses Based on the CNSS 4016 Standardpp. 61-65 George Bailey and Melissa Dark
>> Download bailey_ppt.pdf Presentation
>> Model-Eliciting Activity for Problem Solving in Information Assurancepp. 66-71 Carol Manigault and Melissa Dark
Session 7: Intrusion Detection
>> Visual Network Forensic Techniques and Processespp. 72-80 Robert F. Erbacher, Kim Christiansen, and Amanda Sundberg
>> Download erbacher_ppt.pdf Presentation
>> Threat Evaluation for Intrusion Detection Based Upon Fuzzy Number Theorypp. 81-87 Yingbing Yu and James Graham
>> Author Biographiespp. 88-95 >> Author Indexpp. 96
I do not fear computers. I fear the lack of them.
- Isaac Asimov
Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.
- Fred Langa
In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it canít.
- M. Dacier