Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
CISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019



Sanjay Goel
Director of Research
NYS Center for Information Forensics and Assurance (CIFA)
Chair & Associate Professor, School of Business University at Albany, State University of New York
(518) 442-4925
goel (AT) albany (DOT) edu


Ali Alper Yayla
Assistant Professor
Management Information Systems
School of Management
Binghamton University - SUNY
ayayla (AT)


Karen Sorady, CISSP, CRISC
Deputy Director, Enterprise Information Security Office
NYS Office of Information Technology Services
Karen.Sorady (AT)


Damira Pon
Senior Research Analyst
NYS Center for Information Forensics and Assurance
University at Albany, SUNY
damira (AT) gmail (DOT) com


Yuan Hong
Assistant Professor
Information Technology Management
School of Business, University at Albany, SUNY
hong (AT)


H. Raghav Rao, University at Buffalo, SUNY
Gurpreet Dhillon, Virginia Commonwealth University
Ingrid Fisher, University at Albany, SUNY
Merrill Warkentin, Mississippi State University
Nasir Memon, NYU Polytechnic
Raj Sharman, Univ. at Buffalo, SUNY


Ersin Dincelli
Research Analyst, CIFA
University at Albany, SUNY
edincelli (AT)


Anil B. Somayaji, Carleton University, Canada
Arunabha Mukhopadhyay, IIM Lucknow
Ben Shao, Arizona State University
Bill Oblitey, Indiana University of Pennsylvania
Bill Stackpole, RIT
Bradley Malin, Vanderbilt University
Corey Schou, Idaho State University
Daniel Rice, Tech. Solutions Experts, Inc.
Daryl Johnson, RIT
Dipankar Dasgupta, University of Memphis
Douglas Maughan, Dept. of Homeland Security
Ernst Bekkering, Northeastern State University
Fabio R. Auffant, II, University at Albany, SUNY
Farookh Salam, UNC at Greensboro
Feng Chen, University at Albany, SUNY
Gaurav Bansal, University of Wisconsin
George Markowsky, University of Maine
Harris Weisman, RIT
Hoang Pham, Rutgers University
Hong C. Li, Intel Corporation
Jim Hoag, Champlain University
Jingguo Wang, UT at Arlington
Junjie Wu, Beihang University
Leon Reznik, RIT
Liyun Li, Linkedin
M.P. Gupta, Indian Institute of Technology, Delhi
Manish Gupta, UBuffalo, SUNY / M&T Bank
Mark Scanlon, University College Dublin
Martin Loeb, University of Maryland
Michael Oehler, l4311 Government Mitigations
Mohan Kankanhalli, National Univ. of Singapore
Murtuza Jadliwala, Wichita State University
Nan Zhang, George Washington University
Peter Stephenson, Norwich University
Petter Lovaas, Niagara University
Raghu Santanam, Arizona State University
Rick Mislan, RIT
Sanjay Misra, Federal Univ. of Technology, Minna
Shiu-Kai Chin, Syracuse University
Sylvia Perez-Hardy, RIT
Tae Oh, RIT
Tejaswani Herath, Brock University
Thu D. Nguyen, Rutgers University
W. Art Chaovalitwongse, Univ. of Washington
Wade Trappe, Rutgers University
Important Dates

If computers get too powerful, we can organize them into a committee - that will do them in.

- Bradley's Bromide

Quis custodiet ipsos custodes? (Latin for Who watches the watchers?)

- Juvenal, Roman poet

A hAx0r is a k3wl d00d, has l33t sKillZ with a r00t k1t and 0wNz y00. You too can be a hacker if you a.) read the "Buqtraq" mailing list but have no idea what any of it is about, b.) show your "mad skillz" by eventually figuring out how to download SNES ROMs and c.) have the requisite number of pimples.

- Jeffrey Carl