Search this site
Embedded Files

CANSec Overview Home Call for Paticipation Keynote Program Logistics Registration

Program of 2013 KanSec workshop

Check in 9:00 – 9:30 a.m.

Welcome and Keynote Session 9:30 – 10:40 a.m.

  • Keynote: Digital Identity Protection - Concepts and Issues
    Elisa Bertino
    Purdue University

Coffee Break 10:40a.m. – 11:00 a.m.

Session 1: Introductions(tentative) 11:40a.m. – 12:40 a.m.

  • Daniel Massey – Colorado State University

  • Eric Chan-tin – Oklahoma State University

  • Eugene Vasserman - Kansas State University

  • James Sterbenz – University of Kansas

  • Miaoqing Huang – University of Arkansas

  • Murtuza Jadliwala – Wichita State University

  • Perry Alexander – University of Kansas

  • Samuel Cheng – University of Oklahoma

  • Thomas Johnson – Oklahoma State University

  • Will Metcalf – Emerging Threats

Lunch and Poster Session 12:40p.m. – 2:20 p.m.

  1. A Comparative Simulation Study of Transport Protocols

  2. Accurate Internet-scale measurements for secure network coordinate systems

  3. Android Phone Penetration Testing for Anti-forensics technical and Data analysis

  4. Exploration to the Methods for Enhancing College Students' Information Security Awareness in China

  5. In-Home Video Monitoring to Support Caregivers of Dementia Patients

  6. Investigative Response Modeling and Predictive Data Collection

  7. Modelling Critical Node Attacks in MANETs

  8. Multilevel graphs used in Internet modeling

  9. Network Security Comparison between China and US

  10. Performance Comparison of MANET routing protocol in ns-3

  11. Protocols for Highly-Dynamic Airborne Networks

  12. Review Spamming Detection exploiting Social Network

  13. Revisiting Circuit Clogging Attacks on Tor

  14. SafeExit: Protecting Exit Nodes in Anonymous Internet Routing

  15. Securing Localization in Wireless Networks using Jamming

  16. Smart Grid Communications: Security and Privacy

  17. The Privacy Preserving Data Matching Software

  18. Why iOS is more Secure than Android

Session 2: Research Presentations 2:20 p.m. – 3:40 p.m.

  1. Generalized Epidemic Mean-Field Model for Spreading Processes over Multi-Layer Complex Networks
    Faryad Darabi Sahneh, Caterina Scoglio, Piet Van Mieghem
    Kansas State University

  2. A Look at BGP Security Threats With BGPmon
    Lawrence Weikum, and Daniel Massey
    Colorado State University

  3. Peer-Ad: A Novel Privacy-Preserving Online Advertising Scheme using Pervasive Communications
    Ketan Paithankar, Navid Reza Alamatsaz, Murtuza Jadliwala
    Wichita State University

  4. HealthTrust: Assessing the Trustworthiness of Healthcare Information on the Internet
    Meeyoung Park, Bo Luo, Xue-wen Chen
    University of Kansas, Wayne State University

Coffee Break 3:40 p.m. – 4:00 p.m.

Session 3: Research Presentations 4:00 p.m. – 5:00 p.m.

  1. A Delay-based PUF Design Using Multiplexers on FPGA
    Shiming Li, and Miaoqing Huang
    University of Arkansas

  2. An Integrated IPS with Honeynet Support System - A Case Study of Active Defense to Unknown Attacks
    Yanyan Li, Keyu Jiang
    Fort Hays State University

  3. Setting Up and Using a Cyber Security Lab for Education Purposes
    Alexandru G. Bardas and Xinming Ou
    Kansas State University

Closing Remarks 5:00 p.m.

© Copyright 2012-2013, TheGreater Kansas Area Security Workshop - All rights reserved.

Disclaimer: Any opinions, findings, and conclusions or recommendtions expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse