Image description

Tourist Attractions Nearby San Bernardino, California

  • HOLLYWOOD
  • UNIVERSAL STUDIOS
  • DISNEYLAND
  • SANTA MONICA
  • MORONGO CASINO
  • CABAZONE OUTLETS
  • PALMSPRINGS
  • NEWPORT BEACH
  • BIG BEAR LAKE

Deadlines to Remember

 Submission(Extended)              March 25, 2015
 Acceptance            April 15, 2015
 Camera Ready            April 30, 2015 
 Registration (Early Bird)            April 30, 2015
 Conference            May 16-17,2015

Conference Proceedings


The proceedings will be reviewd for possible inclusion within the Scopus, ISI, EI, DBLP, Microsoft Academic Research, ResearchGate, and Google Scholar DatabasesAll the accepted papers will be included in IAASSE digital Library.

Registration


It is important that at least one author per accepted paper or participants register at the prescribed rates on or before the deadline. It is OPEN now!


VISA & TOUR

The delegates from other countries who wish to attend the Conference can be provided Invitation letter for Visa.

A tour package to Tourist Aattractions nearby Redlands can be arranged on Demand & Paid basis.

International Conference on Cyber Security 2015 will be held at 


Pine, Calfornia State University, San Bernardino, CA


 For Maps and directions pls visit 

http://www.csusb.edu/mapsDirections/index.html



May 16, 2015 (Saturday)                                 

9:00 – 09:30 a.m. | Registration, Sponsor Exhibit

The registration desk will open. Conference sponsors will be available to visit with attendees. 

 

09:30 – 09:45 a.m. | Conference Welcome & Inaugural Session

Hear opening remarks from the Cyber Security Conference chairs as they welcome attendees to the conference and introduce the conference keynotes.

 

09:45 – 11:45 a.m. | Session 1 (Keynote Speakers)

Chair: Frank Lin, Associate Dean, CBPA, CSUSB

09:45 a.m.-10:45 a.m.

Michael Young
Principal Security Architect, ESRI

10:45 a.m.-11:45 a.m.

Samuel Sudhakar

CIO, Cal State Univeristy (CSUSB) 

 

11:45 – 01:00 p.m. | Lunch is Served: It's a Fiesta

We invite you to join colleagues for a lunchtime roundtable discussion and informal networking. At the roundtable, you can network with those who share similar interests or responsibilities and discuss topics of particular interest to you.

 

01:00 – 03:15 p.m. | Session 2 (Invited Speakers)

Chair: Frank Lin, Associate Dean, CBPA, CSUSB

01:00 p.m. -01:45 p.m.

C. E. Tapie Rohm Jr.
Professor, Cal State University (CSUSB) 

01:45p.m. -02:30 p.m.

Vincent Nestler    

Professor, Cal State University (CSUSB)

02:30 p.m. -03:15 p.m.

Anat Zeelim-Hovav

Professor, Korea University Business School, Korea


03:15 – 04:00 p.m. | Panel Discussion (Q & A with Speakers)

  

4:00 – 4:25 p.m. | Coffee with the Sponsors

Grab a cup of coffee. Network with other attendees and take advantage to visit sponsor displays.


4:30 – 4:45 p.m. | Closing 

Stick around for closing remarks for the day 1.


 

May 17, 2015 (Sunday)

 

09:00 – 09:40 a.m. | Self Organizing Learning Enviornrment (SOLE) using Virtual Machine Lab                

Vincent Nestler & Joon Son

Faculty, Cal State Univeristy, USA

 

09:40 – 11:45 a.m. | Session-3

Chair: Vipin Gupta, Associate Dean, CBPA, CSUSB

 

Comparing victims of phishing and malware attacks. Unraveling risk factors and possibilities for situational crime prevention.

 

 

RutgerLeukfeldt

Faculty of Humanities and Law Open University of the Netherlands,

The Netherlands

 

 

Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack

 


FaeizAlserhani

Dep. of Computer Engineering & Networks,  Aljouf University, Saudi Arabia

 

Networking technologies for robotic applications

 


Vibekananda Dutta

Faculty of Power and Aeronautical Engineering

Warsaw University of Technology, Poland

 

Using Syntactic Features for Phishing Detection

 


Gilchan Park

CIT, Purdue University

West Lafayette, IN USA

 

Dynamic Modeling for Representing Access Control Policies Effect

 


Dr.KambizGhazinour

Asst Professor, Department of Computer Science, Kent State University

Kent, Ohio, USA

 

Cyber Security’s Significance in Health Information Technology (HIT)

 

 Dr. Pushpender Kumar

Adjunct Professor School of Management,

Alliant International University, San Diego, USA

 



11:40 a.m. – 12:05 p.m. |  Farewell/Closing Session

Stick around for closing remarks and Certificate Distribution


12:05 p.m. – 12:55 p.m. | Lunch is Served: It's a Fiesta

We invite you to join colleagues for a lunchtime roundtable discussion and informal networking. At the roundtable, you can network with those who share similar interests or responsibilities and discuss topics of particular interest to you.

Topics/Abstracts of Speech:


"Cyber Security in Higher Education: The Past, Present and Future." Samuel Sudhakar


"Cyber Security:  Doing Old Things in a New Way." C. E.Tapie Rohm


"Drones are now becoming ubiquitous devices. The technology is having a major impact, not only on commerce, military strategy, but also for hobbyists. Airplanes and automobiles are becoming more drone-like as well. Yet drones are not just vehicles, they are complex computer and network systems, and as such vulnerable to the myriad of threats and vulnerabilities that require a cybersecurity perspective to secure. This presentation will discuss why cybersecurity needs to be part of any discussion of securing drones and why is should be part of the cybersecurity curriculum." Vincent Nestler



"Traditionally information security has been and is still considered a technical issue by most organizations. This assertion is slowly dissipated as organizations are realizing that peripheral security cannot defend against insiders and other authorized users’ related incidents. According to a report by the Ponemon Institute LLC (March 2012), 39% of security incidents occurred due to negligence and 37% due to malicious attack most of which are conducted by insiders. The report also states that insiders’ attacks are more costly than attacks by external hackers. The dilemma is that majority of these incidents are instigated by organizational users who actual have been authorized to access the data they are breaching. The literature divides these incidents into two categories: misuse and compliance. Misuse refers to unintentional actions that result in inappropriate use of computing assets. Compliance refers to users intentions to knowingly circumvent organizational policies." Anat Zeelim Hovav


"The purpose of this talk is to report on our experience of using a Self-Organized Learning Environment (SOLE) to facilitate our students learning of advanced networking concepts. To set up a SOLE, students were divided into small groups of 4~5 individuals and each group was given a virtual network comprising of unconfigured virtual PCs, virtual routers and switches, and a virtual firewall. The students were given the freedom to learn collaboratively and configure the virtual devices with as little (human) instruction as possible. We share our experience in a manner that can serve to inform future SOLE-based learning efforts and also a potential model for Information Technology (IT) education.  At the end of the talk, our virtual lab and network will be demonstrated."Jo0n Son