ISSN 2378-1432
Submission(Extended) | March 25, 2015 |
Acceptance | April 15, 2015 |
Camera Ready | April 30, 2015 |
Registration (Early Bird) | April 30, 2015 |
Conference | May 16-17,2015 |
The proceedings will be reviewd for possible inclusion within the Scopus, ISI, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. All the accepted papers will be included in IAASSE digital Library.
It is important that at least one author per accepted paper or participants register at the prescribed rates on or before the deadline. It is OPEN now!
VISA & TOUR
The delegates from other countries who wish to attend the Conference can be provided Invitation letter for Visa.
A tour package to Tourist Aattractions nearby Redlands can be arranged on Demand & Paid basis.
International Conference on Cyber Security 2015 will be held at
Pine, Calfornia State University, San Bernardino, CA
For Maps and directions pls visit
http://www.csusb.edu/mapsDirections/index.html
The registration desk will open. Conference sponsors will be available to visit with attendees.
Hear opening remarks from the Cyber Security Conference chairs as they welcome attendees to the conference and introduce the conference keynotes.
Chair: Frank Lin, Associate Dean, CBPA, CSUSB
09:45 a.m.-10:45 a.m.
Michael
Young
Principal Security
Architect, ESRI
10:45 a.m.-11:45 a.m.
Samuel Sudhakar
Chair: Frank Lin, Associate Dean, CBPA, CSUSB
01:00 p.m. -01:45 p.m.
Professor, Cal State University (CSUSB)
02:30 p.m. -03:15 p.m.
Anat Zeelim-Hovav
Professor, Korea University Business School, Korea
03:15 – 04:00 p.m. | Panel Discussion (Q & A with Speakers)
Grab a cup of coffee. Network with other attendees and take advantage to visit sponsor displays.
Stick around for closing remarks for the day 1.
Comparing victims of phishing and malware attacks. Unraveling risk factors and possibilities for situational crime prevention.
|
RutgerLeukfeldt Faculty of Humanities and Law Open University of the Netherlands, The Netherlands |
|
Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack |
FaeizAlserhani Dep. of Computer Engineering & Networks, Aljouf University, Saudi Arabia |
|
Networking technologies for robotic applications |
Vibekananda Dutta Faculty of Power and Aeronautical Engineering Warsaw University of Technology, Poland |
|
Using Syntactic Features for Phishing Detection |
Gilchan Park CIT, Purdue University West Lafayette, IN USA |
|
Dynamic Modeling for Representing Access Control Policies Effect |
Dr.KambizGhazinour Asst Professor, Department of Computer Science, Kent State University Kent, Ohio, USA |
|
Cyber Security’s Significance in Health Information Technology (HIT) |
Dr. Pushpender Kumar Adjunct Professor School of Management, Alliant International University, San Diego, USA |
Topics/Abstracts of Speech:
"Cyber Security in Higher Education: The Past, Present and Future." Samuel Sudhakar
"Cyber Security: Doing Old Things in a New Way." C. E.Tapie Rohm
"Drones are now becoming
ubiquitous devices. The technology is having a major impact, not
only on commerce, military strategy, but also for hobbyists.
Airplanes and automobiles are becoming more drone-like as well. Yet
drones are not just vehicles, they are complex computer and network
systems, and as such vulnerable to the myriad of threats and
vulnerabilities that require a cybersecurity perspective to secure.
This presentation will discuss why cybersecurity needs to be part
of any discussion of securing drones and why is should be part of
the cybersecurity curriculum."
Vincent
Nestler
"Traditionally information security has been
and is still considered a technical issue by most organizations.
This assertion is slowly dissipated as organizations are realizing
that peripheral security cannot defend against insiders and other
authorized users’ related incidents. According to a report by the
Ponemon Institute LLC (March 2012), 39% of security incidents
occurred due to negligence and 37% due to malicious attack most of
which are conducted by insiders. The report also states that
insiders’ attacks are more costly than attacks by external hackers.
The dilemma is that majority of these incidents are instigated by
organizational users who actual have been authorized to access the
data they are breaching. The literature divides these incidents
into two categories: misuse and compliance. Misuse refers to
unintentional actions that result in inappropriate use of computing
assets. Compliance refers to users intentions to knowingly
circumvent organizational policies."
Anat Zeelim
Hovav
"The purpose of this talk is to report on
our experience of using a Self-Organized Learning Environment
(SOLE) to facilitate our students learning of advanced networking
concepts. To set up a SOLE, students were divided into small groups
of 4~5 individuals and each group was given a virtual network
comprising of unconfigured virtual PCs, virtual routers and
switches, and a virtual firewall. The students were given the
freedom to learn collaboratively and configure the virtual devices
with as little (human) instruction as possible. We share our
experience in a manner that can serve to inform future SOLE-based
learning efforts and also a potential model for Information
Technology (IT) education. At the end of the talk, our
virtual lab and network will be
demonstrated."Jo0n
Son