Professional Documents
Culture Documents
11:15 Copyright protection based on contextual web watermarking Mir Nighat, Effat University, Saudi Arabia 11:45 The Potential Impact of Cyber-terrorism on National Security of Saudi Arabia Alqahtani Abdulrahman, Hull University, UK, (PhD Research Paper) 12:15 Replication and Diversity for Survivability in Cyberspace: A Game Theoretic Approach Kamhoua Charles, Kevin Kwiat, Partick Hurley, Air Force Research Laboratory, Joon Park, Syracuse University, New York and Mainak Chatterjee, University of Central Florida, Orlando, USA 12:45 07/03/2013 12:46 Lunch
Identifying Tools and Technologies for Professional Offensive Cyber Operations Grant Tim, R-BAR and Ronald Prins, Fox-IT, Delft, Netherlands Situation Management in Aviation Security - A GraphTheoretic Approach Koelle Rainer Eurocontrol Brussels, Belguim and Denis Kolev, Lancaster University, UK The Emergence of Cyber Activity as a Gateway to Human Trafficking Greiman Virginia Boston University and Christina Bain Harvard Kennedy School, Cambridge USA
Deep Routing Simulation Irwin Barry and Alan Herbert, Rhodes University, Grahamstown, South Africa Towards a South African Crowd Control Model Modise Mapule, Zama Dlamini, Sifiso Simelane, Linda Malinga, Thami Mnisi and Sipho Ngobeni, CSIR, Pretoria, South Africa
Lunch 1
Room: Stream A: Technical issues Chair: Tim Grant 14:00 Functional Resilience, Functional Resonance, and Threat Anticipation for Rapidly Developed Systems Rohret David, Michael Kraft and Michael Vella, Computer Sciences Corporation Inc., San Antonio USA
Room: Stream C: Mini track on Modelling and Simulation for Cyber Defence Chairs: Joey Jansen van Vururen and Louise Leenen
The Adam & Eve Paradox A Vulnerability Modeling in a Bit-Induced Reality Kraft Michael, David Rohret, Michael Vella and Jonathon Moore Erik, Academic Computing Services, Adams 12 Five Holston Computer Sciences Corporation, San Antonio, USA Star School District, Thornton, Colorado, USA (Non-Academic Paper)
14:30 Analysis of Programmable Logic Controller Firmware for Hacking for the Homeland: Patriotic Hackers Versus Threat Assessment and Forensic Investigation Hacktervists: Basnight Zachry, Jonathon Butts, Juan Lopez and Dahan Michael, Sapir College, Israel Thomas Dube Air Force Institute of Technology, USA 15:00 Design of a Hybrid Command and Control Mobile Botnet Pieterse Heloise, CSIR, South Africa and Martin Olivier, University of Pretoria, South Africa 15:30 16:00 Refreshments Refreshments
A Taxonomy of Web Service Attacks Chan Ka Fai Peter and Renier van Heerden, CSIR, Martin Oliver, University of Pretoria, South Africa
Development of a South African Cybersecurity Policy Implementation Framework Jansen van Vuuren Joey, Louise Leenen, Jackie Phahlamohlaka, CSIR, Pretoria and Jannie Zaaiman, University of Venda, Limpopo, South Africa Refreshments
Room: Panel Discussion to be led by Leigh Armistead How to improve metrics and analysis of the testing for cyber security effectiveness Close of conference day Close of conference day Bus leaves to go to The Fort Restaruant for the conference dinner Bus returns to the Doubletree Hotel Close of conference day
07/03/2013 12:46
11:00 Consequences of Diminishing Trust in Cyberspace Results From a SCADA-Based Cyber Security Competition Dasgupta Dipankar and Denise Ferebee, The University Novak Heath and Daniel Likarish , Regis University, Dever, of Memphis, USA Colorado, USA
11:30 Offensive Cyber Initiative Framework (OCIF) Raid and Re-spawn Project Rohret David, Micheal Vella and Michael Kraft, Computer Sciences Corporation, USA (Non-Academic Paper) 12:00 Towards a Theory of Just Cyberwar Giesen Klaus-Gerd, Universit d'Auvergne, ClermontFerrand, France
Exercising state sovereignty in cyberspace: An international DUQUS DILEMMA: The Ambiguity Assertion and the cyber-order under construction? Futility of Sanitized Cyber War Liaropoulos Andrew, University of Piraeus, Greece Crosston Matthew, Bellevue University, USA
An Investigation of the Current State of Mobile Strategy Device Management within South Africa Burke Ivan, and F. Mouton CSIR, Pretoria, South Africa
Investigating Hypothesis Generation in Cyber Defense Analysis through an Analogue Task Vickhouse Rachel and Spencer Bryant, Right patterson Air Force Base, Adam Bryant, Riverside Research, Beavercreek, Ohio, USA Lunch
12:30
Lunch
Lunch
07/03/2013 12:46
14:00 Thirst for Information: the Growing Pace of Information What Lawyers Want: Legally Significant Questions That Warfare and Strengthening Positions of Russia, the USA Only IT Specialists Can Answer and China Shiryaev Yaroslav, University of Warwick, Coventry, UK Vasilyeva Inna and Yana Vasilyeva Kuban State University of Technology, Russian Federation 14:30 The Weakest Link The ICT Supply Chain and Information Warfare Shoemaker Daniel and Charles Wilson, University of Detroit Mercy, USA 15:00 Defamation in Cyber Space: Who Do You Sue? Godara Samiksha, Shamsher Bahadur Saxena College Of Law, India
Room: Stream C: Mini Track on The Human Factors of Cyber Operations Chair: Robert Mills Top-Level Goals in Reverse Engineering Executable Software Bryant Adam, Robert Mills, Michael Grimaila and Gilbert Peterson Air Force Institute of Technology, Ohio, USA
Room: A summary of issues raised during the conference Led by Dan Likarish and DougHart Prize for the best poster will be awarded Close of Conference Close of Conference Close of Conference
15:30
Work in Progress and Posters: To be displayed from noon on Thursday until Noon on Friday Poster presenters will stand by their posters to discuss research with others from 1000-1030 on Friday
Evaluation of Cryptographic Security Schemes for Air Traffic Controls Next Generation Upgrade Finke Cindy, Jonathan Butts, Robert Mills and Micheal Grimaila Air Force Institute of Technology, USA Attack-Aware Supervisory Control and Data Acquisition (SCADA) Alexander Otis, Sam Chung and Barbara EndicottPopovsky University of Washington, Seattle, USA Action and reaction: Strategies and tactics of the current political cyberwarfare in Russia Lysenko Volodymyr and Barbara Endicott-Popovsky, University of Washington, Seattle, USA Attack Mitigation Through Memory Encryption of SecurityEnhanced Commodity Processors Henson Michael and Stephen Taylor, Dartmouth College, USA Cyber Disarmament Treaties and the Failure to Consider Adequately Zero-Day Threats Baer Merritt, Harvard Law School, Cabridge, USA
07/03/2013 12:46