SAM'19 + ICWN'19 Schedules - Tuesday, July 30

by admin last modified Jul 24, 2019 10:25 PM

To select a different schedule  CLICK HERE

07:00a - 05:00p: REGISTRATION
(LOCATION: Lotus Ballrooms 1-2; Registration Counter/Desk)


SESSION 4-SAM: SECURITY MANAGEMENT + COMPUTER SECURITY
Chair: Professor Stefan Pickl, University of the
Federal Armed Forces Munich, Germany
July 30, 2019 (Tuesday); 08:20am - 10:20am
(LOCATION: Galleria A)

08:20 - 08:40am: Toward a Quantum Resistant SecretMatchTM Privacy Enhanced
Technology - A Case Study
Dwight Horne*, Suku Nair
AT&T Center for Virtualization at SMU, Southern Methodist
University, Dallas, Texas, USA

08:40 - 09:00am: Smart Voting Keys to e-Democracy
Andrew Wolfe, Arnold J. Sze, Yared Beyene
University of Washington, Tacoma, Washington, USA

09:00 - 09:20am: VKE: A Visual Analytics Tool for Cyber Security Data
Antonio Gonzalez-Torres, Vetria L. Byrd, Paul Parsons
ULACIT, Costa Rica;
Purdue University, Indiana, USA

09:20 - 09:40am: Identity Management using Blockchain
Gokay Saldamli, Sohil Sanjay Mehta, Pranjali Sanjay Raje,
Madhuri Shiva Kumar, Sumedh Sunil Deshpande
San Jose State University, California, USA

09:40 - 10:00am: Increasing the Robustness of Deep Learning with Colored
Noise Augmentation
Jules Chenou, George Hsieh, Tonya L. Fields
Computer Science, Norfolk State University, Norfolk,
Virginia, USA

10:00 - 10:20am: Novel Extended Federated Authentication and Authorization
Framework
Edward Rajah, Mathias Fonkam, Narasimha Rao Vajjhala
American University of Nigeria, Nigeria


10:20 - 10:40am: BREAK


SESSION 1-ICWN: WIRELESS NETWORKS, MOBILITY, SENSOR NETWORKS, AND
APPLICATIONS
Chair: Dr. Xiang Cao
Assistant Prof., School of Computing and Information
Systems, Grand Valley State University, Michigan, USA
July 30, 2019 (Tuesday); 10:40am - 12:20pm
(LOCATION: Galleria A)

10:40 - 11:00am: An Emergency Vehicle Navigation Algorithm Based on Subgraphs
Abdelfatah A. Tamimi, Ayman M. Abdalla, Hanaa' M. Abu-Ryash
Faculty of Science and Information Technology,
Al-Zaytoonah University of Jordan, Amman, Jordan

11:00 - 11:20am: A New Approach to Circle Formation in Multi-Agent Systems
R. Yang, A. Azadmanesh, H. Farhat
Computer Science, University of Nebraska, Omaha, USA

11:20 - 11:40am: Using the MIT Coffee Can Radar to Detect Moving Objects
Inside a Treeline
Steven Franzkowiak, Alexander Borders, Beruke Abera,
Chris Baker, Daren Wilcox
Kennesaw State University, Marietta, Georgia, USA

11:40 - 12:00pm: Cooperative Location Acquisition for Mobile Wireless Nodes
by Local Measurement of Migration Distance and Remote
Measurement of Observation Directions
Masaaki Namekata, Hiroaki Higaki
Department of Robotics and Mechatronics,
Tokyo Denki University, Adachi, Tokyo, Japan

12:00 - 12:20pm: Developing a Mobile Application for Locating Books Inside
a Library Using Open-Source or Free Tools
Sneha Pantam, Tong Lai Yu
School of Computer Science and Engineering, California
State University at San Bernardino, California, USA

12:20 - 01:20pm: LUNCH (On Your Own)


SESSION 5-SAM: KEYNOTE SPEECH:
PRESCRIPTIVE ANALYTICS IN INFRASTRUCTURE SECURITY:
FROM REHSTRAIN TO THE ERA OF QUANTUM ADVANTAGE
Keynote Speaker: Dr. Maximilian Moll, University of the
Federal Armed Forces Munich, Germany
July 30, 2019 (Tuesday); 01:30pm - 03:00pm
(LOCATION: Galleria A)


03:00 - 03:40pm: POSTER DISCUSSION SESSION B-SAM-ICWN
July 30, 2019 (Tuesday)
(LOCATION: Lotus Ballrooms 1-2)

o. ...


SESSION 6-SAM: INFORMATION ASSURANCE + BIOMETRICS + CYBER SECURITY
Chair: Katia Mayfield, Athens State University, USA
July 30, 2019 (Tuesday); 03:40am - 06:00pm
(LOCATION: Galleria A)

03:40 - 04:00pm: Probabilistic Classification for Industrial Cyber Risk
Using Deep Neural Network
Xichen Zhang, Arash Habibi Lashkari, Nasim Maleki,
Joseph F. Mudge, Ali A. Ghorbani
Canadian Institute for Cybersecurity, University of New Brunswick,
Canada; The Co-operators General Insurance Company, Canada

04:00 - 04:20pm: Vehicle Routing Optimization for Humanitarian Logistics in
Disaster Recovery: A Survey
Wadi Khalid Anuar, Maximilian Moll, Lai Soon Lee, Stefan Pickl,
Hsin-Vonn Seow
University Utara Malaysia, Malaysia; University Putra Malaysia,
Malaysia; University of Nottingham Malaysia, Malaysia;
Universitat der Bundeswehr Munchen, Germany

04:20 - 04:40pm: Component Selection Process in Assembling Cyberattack
Simulation Models
K. Mayfield*, M. Petty, T. Whitaker, A. Cantrell, S. Hice,
J. McClendon, P. Reyes
Department of Mathematical, Computing, and Natural Sciences,
Athens State University, Alabama, USA; Department of Computer
Science, The University of Alabama in Huntsville, Alabama, USA;
College of Computing and Technology, Lipscomb University,
Nashville, Tennessee, USA

04:40 - 05:00pm: Feature-level Data Fusion for Biometric Mobile Applications:
A Case Study
Sorin Soviany, Cristina Soviany, Sorin Puscoci
I.N.S.C.C., Romania; Features Analytics, Belgium

05:00 - 05:20pm: Attribute Stream-Based Access Control (ASBAC) - Functional
Architecture and Patterns
Dominic Heutelbeck
Forschungsinstitut fur Telekommunikation und Kooperation, Germany

05:20 - 05:40pm: A Survey of Layered Approach to Threats and Countermeasures
Dina S. Bujud, Ahmed S. AlGhamdi, Malik Najmus Saqib
Department of Information Technology, Marymount University,
Arlington, Virginia, USA; College of Computer Science and
Engineering, University of Jeddah, Saudi Arabia

05:40 - 06:00pm: Impact of Cyber Security Mechanisms on Employees' Behavior
Yasser M. Hausawi
Institute of Public Administration, Information Technology
Department, Jeddah Branch, Saudi Arabia