Annual Symposium on Information Assurance >> ASIA

Share

Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu

Connect

Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA Ď06. To see proceedings from other years, simply click on the appropriate button below the main menu. If citing from any papers, please use the following citation information: In the Proceedings of the 3rd Annual Symposium on Information Assurance (ASIA Ď06), June 14-15, 2006, Empire State Plaza, Albany, NY. >>
Download full ASIA '06 Proceedings

Beginning Pages
>> Cover informationpp.
>> Message from Symposium Chairspp. i
>> Symposium Agendapp. ii-iii
>> Table of Contentspp. iv

Session 1: Keynote Address (D-1)
>> Approving Attribution Confidence in Cyber Attackspp. 1
Peter Stephenson

Session 2: Network-Based Threats
>> Towards Phishing E-mail Detection Based on their Structural Propertiespp. 2-8
Madhusudhanan Chandrasekaran, Krishnan Karayanan, and Shambhu Upadhyaya

>> Development of the Higher Education Network Analysis Toolpp. 9-17
Steffani Burd, Johannes Ulrich, Efstatios Gavas, Boris Kochergin, Lois Lehman, and Nasir Memon
>> Download burd-ppt.pdf Presentation

Session 3: Security Management >> Information Systems Security Governance Research: A Behavioral Perspectivepp. 18-26
Sushma Mishra and Gurpreet Dhillon

>> Invited Talk: A Delphi Study on Priorities - Lessons Learned from the Gulf Coastpp. 27-36
Raj Sharman, Jin Ki Kim, H. R. Rao, and Shambhu Upadhyaya

Session 4: Keynote Address (D-2)
>> A Philosophy of Information Assurance and Thoughts on the Futurepp. 37
Stephen Bush

Session 5: Securing Wireless Networks
>> Securing Geographic Routing in Wireless Sensor Networkspp. 38-49
***WINNER BEST PAPER AWARD***
Kyoung-Don Kang, Ke Liu, and Nael Abu-Ghazaleh
>> Download kang_ppt.pdf Presentation

>> A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networkspp. 50-60
Sankalp Balachandran, Dipankar Disgupta, and Lan Wang
>> Download balachandran_ppt.pdf Presentation

Session 6: Information Security Education
>> Developing IA Courses Based on the CNSS 4016 Standardpp. 61-65
George Bailey and Melissa Dark
>> Download bailey_ppt.pdf Presentation

>> Model-Eliciting Activity for Problem Solving in Information Assurancepp. 66-71
Carol Manigault and Melissa Dark

Session 7: Intrusion Detection
>> Visual Network Forensic Techniques and Processespp. 72-80
Robert F. Erbacher, Kim Christiansen, and Amanda Sundberg
>> Download erbacher_ppt.pdf Presentation

>> Threat Evaluation for Intrusion Detection Based Upon Fuzzy Number Theorypp. 81-87
Yingbing Yu and James Graham

Closing Pages
>> Author Biographiespp. 88-95
>> Author Indexpp. 96
Important Dates

I do not fear computers. I fear the lack of them.

- Isaac Asimov

Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.

- Fred Langa

In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it canít.

- M. Dacier