Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
EISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA 10. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 5th Annual Symposium on Information Assurance (ASIA 10), June 16-17, 2010, Empire State Plaza, Albany, NY.

Download full ASIA '10 Proceedings

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the Symposium Chairs (Sanjay Goel & Laura Iwan), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

Session 1: DNS Security
>> Invited Talk: Protecting the Internet, pp. 1
John Crain, ICANN

>> The Futility of DNSSec, pp. 2-8
Alex Cowperthwaite & Anil Somayaji, Carleton University

Session 2: Information Warfare
>> Invited Talk: Big Allied and Dangerous - Terrorist Networks, pp. 9
Victor Asal & R. Karl Rethemeyer, University at Albany, SUNY

>> Flow-Based Information Warfare Model, pp. 10-18
Sabah S. Al-Fedaghi, Kuwait University

Session 3: Security and Risk Analysis
>> A Multi-Staged Approach to Risk Management in IT Software Implementation, pp. 19-22
Sunjakta Das, Raj Sharman, Manish Gupta, Varun N. Kutty, & Yingying Kang, University at Buffalo, SUNY

>> A Survivability Decision Model for Critical Information System Based on Bayesian Network, pp. 23-30
Suhas Lande, Yunjun Zuo, & Malvika Pimple, University of North Dakota

Symposium Keynote Address
>> So You Wanna Be a Bot Master?, pp. 31
Billy Rios, Google, Inc.

Session 4: Intellectual Property Theft
>> A Week in the Life of the Most Popular BitTorrent Swarms, pp. 32-36
Mark Scanlon, Alan Hannaway, & Mohand-Tahar Kechadi, University College Dublin, Centre for Cybercrime Investigations

>> Information Assurance in Video Streaming: A Case Study, pp. 37-41
Sriharsha Banavara, Eric Ismand, & John A. Hamilton, Jr., Auburn University

Session 5: Security Management
>> Assessing the Impact of Security Culture and the Employee-Organization Relationship in IS Security Compliance, pp. 42-49
Gwen Greene, Towson University & John D'Arcy, University of Notre Dame

>> Invited Paper: Employee Emancipation and Protection of Information, pp. 50-55
Yurita Abdul Talib & Gurpreet Dhillon, Virginia Commonwealth University

Session 6: Security Education
>> Enhancing Security Education with Hands-On Laboratory Exercises, pp. 56-61
Wenliang Du, Karthick Jayaraman, & Noreen B. Guabatz, Syracuse University

>> A Digital Forensics Program to Retrain America's Veterans, pp. 62-66
Eric Ismand & John A. Hamilton, Jr., Auburn University

Session 7: Roundtable: Forensic Education
>> Roundtable: Forensic Education, pp. 67
Panelists: Fabio Auffant, NY State Police; Kevin Williams, UAlbany; John A. Hamilton Jr., Auburn University

Closing Pages
>> Author Biographies, pp. 68-72
>> Author Index, pp. 73

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense