SAM'16: Monday, July 25, 2016 Schedule
To select a different schedule CLICK HERE
07:00a - 05:00p: REGISTRATION (Second Floor, Conference Lobby: 1-5)
08:45 - 09:00am: CONGRESS OPENING REMARKS - July 25, Monday:
Prof. Hamid R. Arabnia (Chair, Steering Committee & Coordinator)
Department of Computer Science, University of Georgia, USA;
Editor-in-Chief, The Journal of Supercomputing (Springer);
Fellow, Center of Excellence in Terrorism, Resilience,
Intelligence & Organized Crime Research (CENTRIC).
(LOCATION: East Ballrooms 7, 8, & 9)
09:05 - 10:00am: KEYNOTE LECTURE 1 - July 25, Monday:
SEARCH FOR EXTRATERRESTRIAL LIFE IN OUR SOLAR SYSTEM
Dr. Firouz Naderi
Former director of Solar System Exploration at NASA's JPL -
Oversaw robotic spacecraft dispatched to all corners of the
solar system; Prior position: NASA's Program Manager for
Mars Exploration; Recipient of NASA's outstanding Leadership
Medal and NASA's Distinguished Service Medal (NASA's highest
award); In appreciation of his contributions, The
International Astronomical Union (IAU) and NASA/JPL has named
an asteroid "Naderi" after his name.
(LOCATION: East Ballrooms 7, 8, & 9)
10:05 - 11:00am: KEYNOTE LECTURE 2 - July 25, Monday:
DATA SCIENCE FOR HIGH DIMENSIONAL DATASETS
Prof. Alfred Inselberg
Tel Aviv University, Israel; University of California,
Los Angeles (UCLA); University of Southern California (USC);
Senior Fellow at the San Diego Supercomputing Center,
California, USA. Author of "Parallel Coordinates: VISUAL
Multidimensional Geometry"; his work is praised by
Stephen Hawking among many others.
(LOCATION: East Ballrooms 7, 8, & 9)
11:05 - 11:40am: KEYNOTE LECTURE 3 - July 25, Monday:
INDUSTRIAL BIG DATA AND SMART ASSETS: THE FOURTH INDUSTRIAL
REVOLUTION BY THE MEANS OF DEATH AWARENESS CAPABILITIES
Prof. Diego Galar
Division of Operation and Maintenance Engineering,
Lulea University of Technology, Sweden; Coordinating several
H2020 projects in cyber physical systems, Industry 4.0, IoT
and industrial Big Data.
(LOCATION: East Ballrooms 7, 8, & 9)
11:40a - 01:00p: LUNCH (On Your Own)
SESSION 1-SAM: NETWORK SECURITY I
Chair: Prof. Kathy Liszka, Akron University, USA
July 25, 2016 (Monday); 01:00pm - 03:00pm
(LOCATION: Ballroom 2)
01:00 - 01:20pm: A Secure Routing Scheme for Networks with Unknown or
Dynamic Topology using A-star Algorithm
Joseph Flinn, Hen Su Choi Ortiz, Shengli Yuan
Whitworth University, Spokane, Washington, USA;
University of California San Diego, California, USA;
University of Houston-Downtown, Houston, Texas, USA
01:20 - 01:40pm: Baseline Operational Security Metrics for Industrial
Control Systems
Guillermo A. Francia, III
Center for Information Security and Assurance,
Jacksonville State University, USA
01:40 - 02:00pm: Anomaly Detection in Smart Grid Using Wavelet Transform
and Artificial Neural Network
Maryam Ghanbari, Ken Ferens, Witold Kinsner
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, Manitoba, Canada
02:00 - 02:20pm: Wormhole Attack Detection in Wireless Sensor Network using
Variance Fractal Dimension
Mohammad Nurul Afsar Shaon, Ken Ferens
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, Manitoba, Canada
02:20 - 02:40pm: Network Intrusion Detection Using Machine Learning
Md Nasimuzzaman Chowdhury, Ken Ferens
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, Manitoba, Canada
02:40 - 03:00pm: Spectral Fractal Dimension Trajectory to Measure Cognitive
Complexity Of Malicious DNS Traffic
Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, and
Witold Kinsner
Department of Electrical and Computer Engineering,
University of Manitoba, Winnipeg, MB, Canada
03:00 - 03:20pm: MINI-POSTER SESSION A-SAM
(INCLUDES POSTER + SHORT & POSITION PAPERS)
July 25, 2016 (Monday)
(LOCATION: Hallways of Ballrooms 1-5)
SESSION 2-SAM: CRYPTOGRAPHIC TECHNOLOGIES I + ASSESSMENT
Chair: Dr. Jue-Sam Chou, Nanhua University, Taiwan
July 25, 2016 (Monday); 03:20pm - 06:00pm
(LOCATION: Ballroom 2)
03:20 - 03:40pm: A New Group-based Secret Function Sharing with Variate
Threshold
Anneke Soraya Hidayat, Dae-Soo Kim, Kee-Young Yoo
School of Computer Science and Engineering,
Kyungpook National University, Daegu, South Korea
03:40 - 04:00pm: Multilevel Threshold Secret Image Sharing Based on the
Chinese Remainder Theorem
Rosemary Koikara, Anneke Soraya Hidayat, Young-Ju Kim,
Anand Paul, Kee-Young Yoo
School of Computer Science and Engineering,
Kyungpook National University, Daegu, South Korea
04:00 - 04:20pm: Secure Computing Through Homomorphic Encryption on a
Peer-Servicing Public Cloud Computing Platform
Yin-Jun Chen, Sheng-Tzong Cheng
Department of Computer Science & Information Engineering,
National Cheng Kung University, Tainan, Taiwan
04:20 - 04:40pm: Applications and Evaluation of Ambiguous Multi-Symmetric
Cryptography in Vehicular Ad-hoc Networks
Ahmad Mansour, Richard Bassous, Kevin Miller, Huirong Fu,
Yakeen Alwishah, Ye Zhu
Department of Computer Science and Engineering, Oakland
University Rochester, USA; Department of Computer Science
& and Engineering, Michigan State University, Lansing,
Michigan, USA; Department of Computer Science, Wayne State
University, Detroit, Michigan, USA; Department of ECE,
Cleveland State University, Cleveland, Ohio, USA
04:40 - 05:00pm: Cryptanalyses on Secure and Efficient Privacy-preserving
Public Auditing Scheme for Cloud Storage
Yalin Chen, Jue-Sam Chou, Zhe-Yu Lin
Institute of Information Systems and Applications, National
Tsing Hua University, Taiwan; Department of Information
Management, Nanhua University, Taiwan
05:00 - 05:20pm: High Efficiency of Scalar Multiplication in Elliptic Curve
Cryptography
Chiaki Itaba, Noboru Takeuchi, Mayuko Hirose, Kaori Katsumata,
Matrazali Noorafiza, Itaru Koike, Toshiyuki Kinoshita
Graduate School of CS, Tokyo University of Technology, Japan
05:20 - 05:40pm: Design and Implementation of on Board Satellite Encryption
with SEU Error Detection and Correction Code on FPGA
Samah Mohamed, Khaled Shehata, Hanady Issa
Arab Academy for Science and Technology (AAST), Egypt
05:40 - 06:00pm: Examination of Possibility on Reuse of Certification Result
between Different Assessment Scheme for Certification Authority
Soshi Hamaguchi, Toshiyuki Kinoshita, Satoru Tezuka
School of Computer Science, Tokyo University of Technology,
Tokyo, Japan; Graduate School of Media and Governance,
Keio University, Kanagawa, Japan
06:00 - 08:30pm: TUTORIALS + DISCUSSIONS
(Please refer to the lists at the begining of the program
book for details)
08:30 - 11:30pm: CONFERENCE RECEPTION DINNER / SOCIAL
July 25 - Monday; 08:30pm - 11:30pm
(LOCATION: Ballrooms 2-5)To select a different schedule CLICK HERE