TrackOne.pdf

(53 KB) Pobierz
MILCOM 2014
TRACK 1 - CYBER SECURITY AND TRUST COMPUTING - Monday 6 October 2014
Session
Code
CST-1
Session Title
Covert communications and related topics
Time
9:00 AM
9:25 AM
9:50 AM
10:35 AM
11:00 AM
Paper Title
Instructions-based Detection of Sophisticated Obfuscation and Packing
Leveraging Statistical Feature Points for Generalized Detection of Covert Timing Channels
Evaluation and Verification of Automated Covert Channel Modeling using a Real Network Platform
Ergodic Secrecy Rates of Secure Wireless Communications
Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting
Security Incident Origin Discovery - IP Transaction Tracking for Centralized Cyber Defense
Federated Access to Cyber Observables for Detection of Targeted Attacks
An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint
Your WiFi Is Leaking: Ignoring Encryption, Using Histograms to Remotely Detect Skype Traffic
Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems
Enhancing Trust-aware Routing by False Alarm DEtection and Recovery
Communities of Trust in Tactical Coalition Networks
Traffic flow confidentiality in federated networks
Reconfigurable Convolutional Codec for Physical Layer Communication Security Application
Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks
A DTN Routing Protocol for Vehicle Location Information Protection
Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking
Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
The Coordination of Cyber and Kinetic Deception for Operational Effect
Moustafa Saleh; Paul Ratazzi; Shouhuai Xu
Authors
Session Chair
Fahimeh Rezaei
Pradhumna L Shrestha; Michael Hempel; Fahimeh Rezaei; Hamid Sharif
Fahimeh Rezaei; Michael Hempel; Pradhumna L Shrestha; Hamid Sharif
Oluwatobi O Olabiyi; Annamalai Annamalai
Hiren Patel
Dylan Pecelli; Brandon Newman
Michael Atighetchi; John Griffith; Ian Emmons; David Mankins; Richard Guidorizzi
Bo Fu; Yang Xiao
John Stewart Atkinson; John Mitchell; Miguel Rio; George Matich
Francisco Javier Aparicio Navarro; Konstantinos G Kyriakopoulos; David Parish
Gang Qu; Youngho Cho
Anders Fongen; Mazda Salmanian
Ole Ingar Bentstuen; Per Carlen
Liang Tang; Angelo Ambrose; Sri Parameswaran; Sha Zhu
James Obert; Inna Pivkina; Hong Huang; Huiping Cao
Carson Dunbar; Gang Qu
Benjamin W. Ramsey; Barry E. Mullins; William M. Lowder; Ryan Speers
Johan Sigholm; Emil Larsson
David Ormrod
James Cannady
Peter Mell
Harold Zheng
Younghee Park
CST-2
Detection and analysis of cyber incidents
9:00 AM
9:25 AM
9:50 AM
10:35 AM
11:00 AM
11:25 AM
CST-3
Network protocols and security
2:00 PM
2:25 PM
2:50 PM
3:35 PM
4:00 PM
CST-4
Cyber Operations
2:00 PM
2:25 PM
2:50 PM
TRACK 1 - CYBER SECURITY AND TRUST COMPUTING - Tuesday 7 October 2014
Session
Code
CST-5
Session Title
Modeling, simulation and analysis in support
Time
9:00 AM
9:25 AM
9:50 AM
10:35 AM
11:00 AM
11:25 AM
National Cyber Range - Overview
Paper Title
Chip Ferguson; Denise Olsen; Anne Tall
Authors
Session Chair
George Elmasry
General Requirements of a Hybrid-Modeling Framework for Cyber Security
Analytical Frameworks to Assess the Effectiveness and Economic-Returns of Cybersecurity Investments
Diversity and System Security: A Game Theoretic Perspective
Cost-Aware Network Hardening with Limited Budget using Compact Attack Graphs
Context Model Fusion for Multistage Network Attack Simulation
Exploring the Disruptive Edge of Coalition Network Management
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks
Towards Anonymous Group Setup across Multiple Domains
demonstration of a Cross Security domain service management capability for federated missions
Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks
Dynamic Policy Enforcement using Restriction Set Theoretic Expressions (RSTE)
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Identification in Encrypted Wireless Networks Using Supervised Learning
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Secure distance indicator leveraging wireless link signatures
Analysis and Mitigation of Interference to the LTE Physical Control Format Indicator Channel
Securing Cognitive Radio Networks with Dynamic Trust against Spectrum Sensing Data Falsification
High Assurance information exchange based on Publish-Subscribe and ABAC methods
Securing Derived Credentials on a Mobile Device
A Framework for Secure Cloud-Empowered Mobile Biometrics
Alessandro Oltramari; Noam Ben-Asher; Lorrie Cranor; Nicolas Christin; Lujo Bauer
Susmit Patel
Swastik Brahma; Kevin Kwiat; Pramod Varshney; Charles A Kamhoua
Beytüllah Yi?it; Gurkan Gur; Fatih Alagoz
Stephen Moskal; Ben Wheeler; Derek Kreider; Michael E Kuhl; Shanchieh Jay Yang
Todd Burnop; Francis St-Onge; John Haines; Peter George
Zhexiong Wei; Helen Tang; F. Richard Yu; Peter C Mason
Zhijie Wang; Bing Li; Dijiang Huang
Ioannis Dimou; Hermann Wietgrefe
Peter Mell; Richard Harang
Syed Yousaf Shah; Boleslaw K Szymanski
Jon R. Ward; Mohamed Younis
Christopher Swartz; Anupam Joshi
Jon R. Ward; Mohamed Younis
Tao Wang; Yao Liu
Jaber Kakar; Kevin McDermott; Vidur Garg; Marc Lichtman; Vuk Marojevic; Jeffrey Reed
Yalin E Sagduyu
Anders Fongen; Federico Mancini
Thomas S Messerges; Thomas Mihm, Jr.
Aruna Sri Bommagani; Matthew Valenti; Arun Ross
Michael Atighetchi
Wale Akinpelu
Anders Fongen
CST-6
Network security management
9:00 AM
9:25 AM
9:50 AM
10:35 AM
11:00 AM
11:25 AM
CST-7
Advances in wireless security
2:00 PM
2:25 PM
2:50 PM
3:35 PM
4:00 PM
4:25 PM
CST-8
Identification, Authentication and Access Control
2:00 PM
2:25 PM
2:50 PM
TRACK 1 - CYBER SECURITY AND TRUST COMPUTING - Wednesday 8 October 2014
Session
Code
CST-9
Session Title
Next generation network security
Time
9:00 AM
9:25 AM
9:50 AM
10:35 AM
Cyber Maneuvers and Maneuver Keys
Paper Title
Don Torrieri
Youngmi Lee; Younggi Kim; Younghee Lee
Authors
Session Chair
Sherry Wang
Untraceable Blind Packet Forwarding using Centralized path control
Fast, Secure Failover for IP
Implementation Software To Secure Virtual Machines With Remote Grid of Secure Elements
Android Market Reconstruction and Analysis
Using Security Logs for Collecting and Reporting Technical Security Metrics
A Framework for Managing Mission needs, compliance and Trust in the DevOps Environment
Saleem N Bhatti; Ditchaphong Phoomikiattisak; Randall Atkinson
Aissaoui Mehrez Hassane, AH; Pascal Urien; Guy Pujolle
Matthew Dering; Patrick McDaniel
Risto Vaarandi; Mauno Pihelgas
Bassam S Farroha; Deborah Farroha
Deborah Farroha
CST-10
Assorted topics in creating and managing secure enterprises
2:00 PM
2:25 PM
2:50 PM
Zgłoś jeśli naruszono regulamin