...
12:30-12:45 | Goals and Approach for Cybersecurity Research Transition to Practice Acceleration | Florence Hudson, Internet2 |
12:45-1:00 | University CIO Perspective on Leveraging Cybersecurity Research | Bruce Maas, University of Wisconsin-Madison |
Identity & Access Management and Network Security | ||
1:00-1:15 | CILogon 2.0 - An Integrated Identity and Access Management Platform for Science Poster on CILogon 2.0 Provide feedback on Jim's cybersecurity research: http://bit.ly/JimBasney | Jim Basney, University of Illinois at Urbana-Champaign |
1:15-1:30 | Poster on Active DNS Monitoring Tools for Detecting and Tracking the Evolution of Malicious Domain Names Provide feedback on Roberto's cybersecurity research: http://bit.ly/RobertoPerdisci | Roberto Perdisci, University of Georgia |
1:30-1:45 | Data-Driven Cyber Vulnerability Maintenance Provide feedback on Ted's cybersecurity research: http://bit.ly/TedAllenTTP | Ted Allen, Ohio State University |
1:45-2:00 | Mitigating Insider Attacks in Provenance Systems Provide feedback on Christian's cybersecurity research: http://bit.ly/ChristianCollberg | Christian Collberg, University of Arizona |
Smart Grid | ||
2:00-2:15 | Cyber-Attack and Mitigation Demos for Wide-Area Control of Power Grids Poster on Cyber-Attack & Mitigation Demos for Wide-Area Control of Power Grids Provide feedback on Aranya's cybersecurity research: http://bit.ly/AranyaChakrabortty | Aranya Chakrabortty, North Carolina State University |
2:15-2:30 | Discussion | |
2:30-3:00 | BREAK | POSTER SESSION & NETWORKING |
Cloud Security & Storage | ||
3:00-3:15 | A Campus Pilot For A Privacy-Enabled Cloud Storage, Search, and Collaboration Portal for Education Provide feedback on Radu's cybersecurity research: http://bit.ly/RaduSion | Radu Sion, SUNY Stony Brook |
Data Analytics & Security | ||
3:15-3:30 | A Kit for Exploring Databases Under the Hood for Security, Forensics and Data Poster on Kit for Exploring Databases Under the Hood for Security, Forensics & Data Provide feedback on Alex's cybersecurity research: http://bit.ly/AlexRasin | Alex Rasin, DePaul University |
Internet of Things | ||
3:30-3:45 | A Distributed Visual Analytics Sandbox for High Volume Data Streams Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala1 | Raju Gottumukkala, University of Louisiana-Lafayette |
3:45-4:00 | Discusson | |
4:00-4:30 | BREAK | POSTER SESSION & NETWORKING |
Internet of Things | ||
4:30-4:45 | Cybersafety of Electric Vehicles and EVSE Equipment Provide feedback on Raju's cybersecurity research: http://bit.ly/RajuGottumukkala2 | Raju Gottumukkala, University of Louisiana-Lafayette |
4:45-5:00 | Hardware based Authentication and Trusted Platform Module functions (HAT) for IoTs Provide feedback on Fareena's cybersecurity research: http://bit.ly/FareenaSaqib | Fareena Saqib, Florida Institute of Technology |
5:00-5:15 | Toward Ethical Intelligent Autonomous Systems, A Case-Supported Principle-Based Behavior Paradigm Provide feedback on Michael's cybersecurity research: http://bit.ly/MichaelAndersonTTP | Michael Anderson, University of Hartford |
5:15-5:30 | Discussion/Closing | Florence Hudson, Internet2 Emily Nichols, Internet2 |