Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
EISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA 11. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 6th Annual Symposium on Information Assurance (ASIA 11), June 7-8, 2011, Empire State Plaza, Albany, NY.

Download full ASIA '11 Proceedings

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the Symposium Chair (Sanjay Goel), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

Session 1: Modeling User / Hacker Behavior
>> Toward Cyber Crime Profiling: Cyber Stalking, pp. 1-5
Peter R. Stephenson, Norwich University & Richard D. Walter, Vidocq Society

>> Email Behavior Profiling based on Attachment Type and Language, pp. 6-10
Onur Polatcan, VA Medical Center; Sumita Mishra & Yin Pan, Rochester Institute of Technology

Session 2: Sensor Network / User Security
>> Enterprise Mobile Security using Wiresless Sensor Networks, pp. 11-17
Biswajit Panja, Kevin Highley & Priyanka Meharia, Morehead State University

>> Security of Computer Use Practice: The Case of Ordinary Users Survey, pp. 18-25
Leon Reznik, Vincent J. Buccigrossi III, Justin Lewis, Asif Dipon, Stefanie Milstead, Nathan LaFontaine, Kenneth Beck & Holden Silva, Rochester Institute of Technology

Symposium Keynote Address
>> Working to Achieve Cyber Security in the Energy Sector: A Public_Private Partnership Approach, p. 26
Diane T. Hooie, Principal Deputy Assistant Secretary, U.S. Department of Energy

Session 3: Data Privacy Protection
>> Understanding Data Leak Prevention, pp. 27-31
Preeti Raman, Hilmi Gunes Kayacik & Anil Somayaji, Carleton University

>> Breaching & Protecting an Anonymizing Network System, pp. 32-44
Jason W. Clark & Angelos Stavrou, George Mason University

Session 4: Impact of Breaches / Forensics
>> Framing Effects of Crisis Response: Communications of Market Valuation of Breached Firms, pp. 45-50
Manish Gupta, Raj Sharman & H. R. Rao, University at Buffalo, The State University of New York

>> Automatically Bridging the Semantic Gap Using C Interpreter, pp. 51-58
Hajime Inoue, Frank Adelstein, Matthew Donovan & Stephen Brueckner, Architecture Technology Corporation

Session 5: Secure Routing / InfoSec Education
>> Protection Profile-based Scenario-centric Taxonomy of Secure Routing Protocols in Ad-hoc Networks, pp. 59-66
Mohammad Iftekhar Husain & Ramalingam Sridhar, University at Buffalo, The State University of New York

>> A Holistic, Modular Approach to Infuse Cybersecurity into Undergraduate Computing Degree Programs, pp. 67-70
Trudy Howles, Carol Romanowski, Sumita Mishra, & Rajendra K. Raj, Rochester Institute of Technology

Closing Pages
>> Author Biographies, pp. 68-72
>> Author Index, pp. 73

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense