Personal tools
You are here: Home Program SAM'09: July 15, 2009 Schedule
Current Event
Click Here
Other Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'06 & '07
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


SAM'09: July 15, 2009 Schedule

Last modified 2009-06-20 16:17

To select a different schedule CLICK HERE

6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)

08:00 - 11:20am:  During this period, SAM'09 attendees are encouraged to participate
                  in sessions belonging to IPCV'09, GCA'09, ICWN'09, ICOMP'09,
                  SWWS'09, IKE'09, or FECS'09. These sessions discuss topics that
                  significantly overlap the scope of SAM'09.

11:20a - 12:40p:  LUNCH (On Your Own)

                  Co-Chairs: Francis J. Manning III* and Dr. Muhammad Ali**
                  *Nova Southeastern University, Florida, USA
                  **Tuskegee University, Alabama, USA
                  July 15, 2009 (Wednesday); 12:40pm - 02:00pm
                  (LOCATION: Ballroom 8)

12:40 - 01:00pm:  Realistic Approach Against Worm Attack on Computer Network
                  by Emulating Human Immune System
                  Ossama Toutonji and Seong-Moo Yoo
                  The University of Alabama in Huntsville, Alabama, USA

01:00 - 01:20pm:  Data Mining and Collusion Resistance
                  Samuel Shepard, Ray Kresman, Larry Dunning
                  Bowling Green, Ohio, USA

01:20 - 01:40pm:  Simplified Single Packet Authorization
                  Rich Lundeen, Charles Burns
                  University of Idaho, Idaho, USA

01:40 - 02:00pm:  Artificial Neural Network for Mobile IDS Solution
                  N. El Kadhi, K. Hadjar,F. A. Barika
                  L.E.R.I.A. EPITECH France & AHLIA University, Bahrain &
                  LI3-ISG Tunis, Tunisia

                  Co-Chairs: Dr. Michael R. Grimaila* and Dr. S. C. Chiemeke**
                  *Air Force Institute of Technology, Wright-Patterson AFB, Ohio, USA
                  **University of Benin, Benin City, Nigeria
                  July 15, 2009 (Wednesday); 02:00pm - 06:00pm
                  (LOCATION: Ballroom 8)

02:00 - 02:20pm:  Design Considerations for a Cyber Incident Mission Impact
                  Assessment (CIMIA) Process
                  Michael R. Grimaila, Larry W. Fortson and Janet L. Sutton
                  Air Force Institute of Technology & Air Force Research Laboratory, USA

02:20 - 02:40pm:  Securing the Environment: A Methodology for Weighting and
                  Analyzing Attack Graphs
                  Francis J. Manning III
                  Nova Southeastern University, Florida, USA

02:40 - 03:00pm:  Tamper Detection and Localization for Categorical Data Using
                  Fragile Watermarks for Multi Owner Databases
                  Kanaka Rajanala, Huiping Guo
                  California State University at Los Angeles, California, USA

03:00 - 03:20pm:  BREAK

03:20 - 03:40pm:  Service Framework Based on Grades of IdPs and SPs
                  Sato Hiroyuki and Nishimura Takeshi
                  University of Tokyo, Japan

03:40 - 04:00pm:  The Stability of Trapdoor One Way Function Based on Finite Automata
                  Siranush H. Chopuryan
                  State Engineering University of Armenia, Republic of Armenia

04:00 - 04:20pm:  Security Metrics - Review and Research Directions
                  Guillermo Francia and Suprasith Jarupathirun
                  Jacksonville State University, USA & Ramkhamhaeng University

04:20 - 04:40pm:  Artificial Neural Networks as a Tool for Identifying Image Spam
                  Priscilla Hope, Jason R. Bowling, and Kathy J. Liszka
                  The University of Akron, Ohio, USA 

04:40 - 05:00pm:  Rule-Based Auditing System for Security Assurance in Ubiquitous Computing
                  Hyokyung Jang, Moohun Lee, Jeongseok Kim, Euiin Choi
                  Hannam University, Korea

05:00 - 05:20pm:  Phishpin: An Integrated, Identity-Based Anti-Phishing Approach
                  Hicham Tout
                  Cisco Systems, USA & Nova Southeastern University, Florida, USA

05:20 - 05:40pm:  Visualization for Rapid Assessment and Projection in Cyber
                  Situational Awareness
                  Robert F. Erbacher
                  Utah State University, Logan, Utah, USA

05:40 - 06:00pm:  A Framework for Building and Managing Secured ERP Landscape
                  Anton Romanov, Eiji Okamoto
                  University of Tsukuba, Japan

                  (Please see the lists at the begining of this booklet)

To select a different schedule CLICK HERE

Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)