ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - |
This is the proceedings for ASIA ‘10. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 5th Annual Symposium on Information Assurance (ASIA ‘10), June 16-17, 2010, Empire State Plaza, Albany, NY.
>> Download full ASIA '10 Proceedings
>> Cover | Back Cover, pp.
>> Message from the Symposium Chairs (Sanjay Goel & Laura Iwan), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii
Session 1: DNS Security
>> Invited Talk: Protecting the Internet, pp. 1
John Crain, ICANN
>> The Futility of DNSSec, pp. 2-8
Alex Cowperthwaite & Anil Somayaji, Carleton University
Session 2: Information Warfare
>> Invited Talk: Big Allied and Dangerous - Terrorist Networks, pp. 9
Victor Asal & R. Karl Rethemeyer, University at Albany, SUNY
>> Flow-Based Information Warfare Model, pp. 10-18
Sabah S. Al-Fedaghi, Kuwait University
Session 3: Security and Risk Analysis
>> A Multi-Staged Approach to Risk Management in IT Software Implementation, pp. 19-22
Sunjakta Das, Raj Sharman, Manish Gupta, Varun N. Kutty, & Yingying Kang, University at Buffalo, SUNY
>> A Survivability Decision Model for Critical Information System Based on Bayesian Network, pp. 23-30
Suhas Lande, Yunjun Zuo, & Malvika Pimple, University of North Dakota
Symposium Keynote Address
>> So You Wanna Be a Bot Master?, pp. 31
Billy Rios, Google, Inc.
Session 4: Intellectual Property Theft
>> A Week in the Life of the Most Popular BitTorrent Swarms, pp. 32-36
Mark Scanlon, Alan Hannaway, & Mohand-Tahar Kechadi, University College Dublin, Centre for Cybercrime Investigations
>> Information Assurance in Video Streaming: A Case Study, pp. 37-41
Sriharsha Banavara, Eric Ismand, & John A. Hamilton, Jr., Auburn University
Session 5: Security Management
>> Assessing the Impact of Security Culture and the Employee-Organization Relationship in IS Security Compliance, pp. 42-49
Gwen Greene, Towson University & John D'Arcy, University of Notre Dame
>> Invited Paper: Employee Emancipation and Protection of Information, pp. 50-55
Yurita Abdul Talib & Gurpreet Dhillon, Virginia Commonwealth University
Session 6: Security Education
>> Enhancing Security Education with Hands-On Laboratory Exercises, pp. 56-61
Wenliang Du, Karthick Jayaraman, & Noreen B. Guabatz, Syracuse University
***WINNER BEST PAPER AWARD***
>> A Digital Forensics Program to Retrain America's Veterans, pp. 62-66
Eric Ismand & John A. Hamilton, Jr., Auburn University
Session 7: Roundtable: Forensic Education
>> Roundtable: Forensic Education, pp. 67
Panelists: Fabio Auffant, NY State Police; Kevin Williams, UAlbany; John A. Hamilton Jr., Auburn University
>> Author Biographies, pp. 68-72
>> Author Index, pp. 73
Those who do not archive the past are condemned to retype it!
- Garfinkel and Spafford
As we know,
- Donald Rumsfeld, U.S. Secretary of Defense