Annual Symposium on Information Assurance >> ASIA

Share

Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
Reviewers
NYS Cyber Security Conf.
Directions & Parking
Accomodations
EISO Website
UAlbany Business Website
Pictures
Contact Us
Want to Sponsor?
End of Menu

Connect

Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
These are the proceedings for ASIA '16. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of ASIA '16: 12th Annual Symposium on Information Assurance (ASIA '16), June 8-9, 2016, Empire State Plaza, Albany, NY.

>>
Download full ASIA '16 Proceedings


Keynote: Day 1
>> Focusing the Cyber Security Lens, p. 1
Tim Brown, Dell Fellow & CTIO, Dell Security

Session 1: Information Security
>> The Theory of Successful Behavior: A Theoretical Explanation of Successful Novice Cyber Security Practitioners, pp. 2-5
Justin S. Giboney and Adem Kotil, University at Albany, SUNY, NY
>> Countermeasures against Distributed Denial of Service - A Literature Review/a>, pp. 6-12
Manish Gupta, Gayathri Gopalakrishnan, and Raj Sharman, University at Buffalo, NY


Session 2: Cyber Physical System Security & Cryptography
>>
Industrial Control Systems Security Testbed, pp. 13-18
Emrah Korkmaz, Binghamton University and Turkish Military Academy; Adrey Dolgikh, Matthew Davis, and Victor Skormin, Binghamton University >> Franken SSL: Recombining Cryptographic Libraries for Software Diversity/a>, p. 19-25
Bheesham Persaud, Borke Obada-Obieh, Nilofar Mansourzadeh, Ashley Moni, and Anil Somayaji, Carleton University, Canada

Session 3: Cyber Threats and Incident Analysis
>>
A Sophistication Index for Evaluating Data Breaches, pp. 26-31
Nic DePaula and Sanjay Goel, University at Albany, SUNY, NY
>> Information Sharing to Manage Cyber Incidents: Deluged with Data, yet Starved for Timely Critical Data, pp. 32
Sanjay Goel, University at Albany, SUNY, NY and Charles Barry, National Defense University, Washington D.C.

Session 4: Security Education
>> Network Defense Exercises with Simulated Attacks, pp. 33-39
Delbert Hart, SUNY Plattsburgh

Keynote: Day 2
>> Reducing Cyber Risk Through Diplomacy, p. 40
Michele Markoff, U.S> Department of State
>> Lessons for a More Defensible Cyberspace, p. 41
Jason Healey, Columbia University

Session 5: Terrorism
>> Towards Cognitive Immunization of Potential Criminals against Cyberterrorism, pp. 42-45
Merrill Markentin, Mississippi State University; Joshua M. Regan, University of New Haven; and Amin G. Kosseim, New York City Police Department
>> Ranking Terrorist Nodes of 26/11 Mumbai Attack using Analytical Hierarchy Process with Social Network Analysis, p. 46-51
Pankaj Choudhary and Upasna Singh, Defence Institute of Advanced Technology, Pune, India

Session 6: Multimedia Forensics
>> Linguistic Features of Phone Scams: A Qualitative Survey, p. 52-58
Judith L. Tabron, Hofstra University, NY
>> Facebook Forensics for Windows 10, pp. 59-67
Pankaj Coudhary, Upasna Singh, Nitesh Bharadwaj, and Bhupendra Singh, Defence Institute of Advanced Technology, Pune, India.

Session 7: Web Security
>> Covert Channel in HTTP User-Agents, pp. 68-73
Susan Heilman, Jonathan Williams, and Daryl Johnson, Rochester Institute of Technology
>> Don't See Me, Just Edit Me: Towards Secure Cloud-based Video Editing, p. 74-78
Odd-Arlid Kristensen, University at Albany, SUNY, NY; Manoranjan Mohanty, New York University Abu Dhabi; and Pradeep Atrey, University at Albany, SUNY, NY

Session 8: Security Legislation
>> Cybersecurity Benefits of Executive Order 13,694, pp. 79-83
William Augustine, University at Albany, SUNY, NY

Quotes

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense