Image description

Tourist Attractions Nearby San Bernardino, California


Deadlines to Remember

 Submission(Extended)              March 25, 2015
 Acceptance            April 15, 2015
 Camera Ready            April 30, 2015 
 Registration (Early Bird)            April 30, 2015
 Conference            May 16-17,2015

Conference Proceedings

The proceedings will be reviewd for possible inclusion within the Scopus, ISI, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar DatabasesAll the accepted papers will be included in IAASSE digital Library.


It is important that at least one author per accepted paper or participants register at the prescribed rates on or before the deadline. It is OPEN now!


The delegates from other countries who wish to attend the Conference can be provided Invitation letter for Visa.

A tour package to Tourist Aattractions nearby Redlands can be arranged on Demand & Paid basis.

International Conference on Cyber Security 2015 will be held at 

Pine, Calfornia State University, San Bernardino, CA

 For Maps and directions pls visit

May 16, 2015 (Saturday)                                 

9:00 – 09:30 a.m. | Registration, Sponsor Exhibit

The registration desk will open. Conference sponsors will be available to visit with attendees. 


09:30 – 09:45 a.m. | Conference Welcome & Inaugural Session

Hear opening remarks from the Cyber Security Conference chairs as they welcome attendees to the conference and introduce the conference keynotes.


09:45 – 11:45 a.m. | Session 1 (Keynote Speakers)

Chair: Frank Lin, Associate Dean, CBPA, CSUSB

09:45 a.m.-10:45 a.m.

Michael Young
Principal Security Architect, ESRI

10:45 a.m.-11:45 a.m.

Samuel Sudhakar

CIO, Cal State Univeristy (CSUSB) 


11:45 – 01:00 p.m. | Lunch is Served: It's a Fiesta

We invite you to join colleagues for a lunchtime roundtable discussion and informal networking. At the roundtable, you can network with those who share similar interests or responsibilities and discuss topics of particular interest to you.


01:00 – 03:15 p.m. | Session 2 (Invited Speakers)

Chair: Frank Lin, Associate Dean, CBPA, CSUSB

01:00 p.m. -01:45 p.m.

C. E. Tapie Rohm Jr.
Professor, Cal State University (CSUSB) 

01:45p.m. -02:30 p.m.

Vincent Nestler    

Professor, Cal State University (CSUSB)

02:30 p.m. -03:15 p.m.

Anat Zeelim-Hovav

Professor, Korea University Business School, Korea

03:15 – 04:00 p.m. | Panel Discussion (Q & A with Speakers)


4:00 – 4:25 p.m. | Coffee with the Sponsors

Grab a cup of coffee. Network with other attendees and take advantage to visit sponsor displays.

4:30 – 4:45 p.m. | Closing 

Stick around for closing remarks for the day 1.


May 17, 2015 (Sunday)


09:00 – 09:40 a.m. | Self Organizing Learning Enviornrment (SOLE) using Virtual Machine Lab                

Vincent Nestler & Joon Son

Faculty, Cal State Univeristy, USA


09:40 – 11:45 a.m. | Session-3

Chair: Vipin Gupta, Associate Dean, CBPA, CSUSB


Comparing victims of phishing and malware attacks. Unraveling risk factors and possibilities for situational crime prevention.




Faculty of Humanities and Law Open University of the Netherlands,

The Netherlands



Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack



Dep. of Computer Engineering & Networks,  Aljouf University, Saudi Arabia


Networking technologies for robotic applications


Vibekananda Dutta

Faculty of Power and Aeronautical Engineering

Warsaw University of Technology, Poland


Using Syntactic Features for Phishing Detection


Gilchan Park

CIT, Purdue University

West Lafayette, IN USA


Dynamic Modeling for Representing Access Control Policies Effect



Asst Professor, Department of Computer Science, Kent State University

Kent, Ohio, USA


Cyber Security’s Significance in Health Information Technology (HIT)


 Dr. Pushpender Kumar

Adjunct Professor School of Management,

Alliant International University, San Diego, USA


11:40 a.m. – 12:05 p.m. |  Farewell/Closing Session

Stick around for closing remarks and Certificate Distribution

12:05 p.m. – 12:55 p.m. | Lunch is Served: It's a Fiesta

We invite you to join colleagues for a lunchtime roundtable discussion and informal networking. At the roundtable, you can network with those who share similar interests or responsibilities and discuss topics of particular interest to you.

Topics/Abstracts of Speech:

"Cyber Security in Higher Education: The Past, Present and Future." Samuel Sudhakar

"Cyber Security:  Doing Old Things in a New Way." C. E.Tapie Rohm

"Drones are now becoming ubiquitous devices. The technology is having a major impact, not only on commerce, military strategy, but also for hobbyists. Airplanes and automobiles are becoming more drone-like as well. Yet drones are not just vehicles, they are complex computer and network systems, and as such vulnerable to the myriad of threats and vulnerabilities that require a cybersecurity perspective to secure. This presentation will discuss why cybersecurity needs to be part of any discussion of securing drones and why is should be part of the cybersecurity curriculum." Vincent Nestler

"Traditionally information security has been and is still considered a technical issue by most organizations. This assertion is slowly dissipated as organizations are realizing that peripheral security cannot defend against insiders and other authorized users’ related incidents. According to a report by the Ponemon Institute LLC (March 2012), 39% of security incidents occurred due to negligence and 37% due to malicious attack most of which are conducted by insiders. The report also states that insiders’ attacks are more costly than attacks by external hackers. The dilemma is that majority of these incidents are instigated by organizational users who actual have been authorized to access the data they are breaching. The literature divides these incidents into two categories: misuse and compliance. Misuse refers to unintentional actions that result in inappropriate use of computing assets. Compliance refers to users intentions to knowingly circumvent organizational policies." Anat Zeelim Hovav

"The purpose of this talk is to report on our experience of using a Self-Organized Learning Environment (SOLE) to facilitate our students learning of advanced networking concepts. To set up a SOLE, students were divided into small groups of 4~5 individuals and each group was given a virtual network comprising of unconfigured virtual PCs, virtual routers and switches, and a virtual firewall. The students were given the freedom to learn collaboratively and configure the virtual devices with as little (human) instruction as possible. We share our experience in a manner that can serve to inform future SOLE-based learning efforts and also a potential model for Information Technology (IT) education.  At the end of the talk, our virtual lab and network will be demonstrated."Jo0n Son