Annual Symposium on Information Assurance >> ASIA

Share

Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu

Connect

Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA '15. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of ASIA '15: 10th Annual Symposium on Information Assurance (ASIA '15), June 2-3, 2015, Empire State Plaza, Albany, NY.

>>
Download full ASIA '15 Proceedings

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the ASIA General Chair (Sanjay Goel), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii - iv

Keynote: Day 1
>> Cyber Security End-to-End: What Each of Us Can Do Now, p. 1
Jane Holl Lute, CEO of the Center for Internet Security

Session 1: Behavioral Security
>> Paper: How Direct and Vicarious Experience Promotes Security Hygiene, pp. 2-6
Leigh A. Mutchler, University of Tennessee and Merrill Warkentin, Mississippi State University
>> Paper: Two Studies on Password Memorability and Perception, pp. 7-13
Delbert Hart, SUNY Plattsburgh


Session 2: Service Security
>> Paper: A Holistic Approach for Service Migration Decision, Strategy and Scheduling, pp. 14-17
Yanjun Zuo, University of Dakota, ND >> Invited Talk: Post-audit of Service Security Investment: Using Simulation Approach, p. 18
Hemantha Herath and Tejaswini Herath, Brock University, Canada

Session 3: Cyber Attacks
>> Paper: Crowdsourcing Computer Security Attack Trees, pp. 19-23
Matt Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Dan Bogaard, Bill Stackpole; Rochester Institute of Technology, NY, and George Markowsky, University of Maine, ME
>> Paper: A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, pp. 24-27
Bryan Harmat, Jared Stroud and Daryl Johnson, Rochester Institute of Technology, NY

Session 4: International Security Cooperation & Cyber Warfare
>> Paper:International Cooperation to Enhance Website Security, pp. 28-31
Manmohan Chaturvedi, CISO Academy, India and Srishti Gupta, VIT University, India
>> Invited Talk: Information Sharing to Manage Cyber Incidents: Deluged with Data Yet Starving for Timely Critical Data, p. 32
Sanjay Goel, University at Albany, SUNY, NY and Charles Barry, National Defense University, Washington, DC

Keynote: Day 2
>> Whose Job is it to Solve the Cybersecurity Problem?, p. 33
Bruce McConnell, Senior Vice President of the EastWest Institute, NY

Session 5: Digital Forensics
>> Paper: Shot Segmentation and Grouping for PTZ Camera Videos, pp. 34-37
Andrew Pulver, University at Albany, SUNY, NY, Ming-Ching Chang, GE Global Research, NY and Siwei Lyu, University at Albany, SUNY, NY
>> Invited Talk: Securing against Malicious Hardware Trojans, p. 38
Sanjay Goel, University at Albany, SUNY, NY, John G. Hartley, Colleges of Nanoscale Science and Engineering, SUNY, and Yuan Hong, University at Albany, SUNY, NY

Session 6: Cloud Computing and Internet of Things
>> Paper: Secure Audio Reverberation over Cloud, p. 39-43
M. Abukari Yakubu, University of Winnipeg, Canada, Pradeep K. Atrey, University at Albany, SUNY, NY and Namunu C. Maddage, University of Melbourne, Australia
>> Paper: Using Features of Cloud Computing to Defend Smart Grid against DDoS Attacks, pp. 44-50
Anthony Califano, Ersin Dincelli, and Sanjay Goel, University at Albany, SUNY, NY

Session 7: Disasters and Incident Response
>> Paper: Trust Management in Resource Constraint Networks, pp. 51-56
Thomas A. Babbitt and Boleslaw Szymanski, Rensselaer Polytechnic Institute, NY
>> Paper: Investigating Information Security Effectiveness after an Extreme Event, p. 57-59
Victoria Kisekka, University at Buffalo, NY

Session 8: Network Security
>> Paper: A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network, pp. 60-66
Reiner Campillo, Ministry of Higher Education, Science and Technology, Dominican Republic and Tae Oh, Rochester Institute of Technology, NY
>> Paper: Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks Approach, pp. 67-72
Neetesh Saxena, SUNY, Korea / Stony Brook University, NY and Narendra S Chaudhari, Visvesvaraya National Institute of Technology / Indian Institute of Technology Indore

Closing Pages
>> Author Biographies, pp. 79-84
>> Author Index, p. 85
Quotes

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense