10.07.2015 Views

DSS2015-final-lr

DSS2015-final-lr

DSS2015-final-lr

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONFERENCE 9456LOCATION: CONV. CTR. ROOM 324DSS PLENARY PRESENTATION .. MON 5:00 PM TO 6:00 PMLOCATION: CONV. CTR. BALLROOM 1, LEVEL 4Emerging Research and Engineering Capabilitiesfor NextGen WarfightersALAN R. SHAFFERPrincipal Deputy Assistant Secretary ofDefense Research and EngineeringDepartment of DefenseSee details page 9TUESDAY 21 APRILSESSION 4LOCATION: CONV. CTR. ROOM 324 ...........TUE 8:00 AM TO 9:20 AMCyber Crimes, Cyberterrorism, and LawEnforcement Technologies and SystemsSession Chairs: George Cybenko, Thayer School of Engineering atDartmouth (USA); Myron E. Hohil, U.S. Army Armament Research,Development and Engineering Ctr. (USA);Edward M. Carapezza, EMC Consulting, LLC (USA);Jordan Wexler, Raytheon Applied Signal Technology, Inc. (USA)8:00 am: Deep learning of behaviors (Keynote Presentation), GeorgeCybenko, Thayer School of Engineering at Dartmouth (USA) .....[9456-17]8:40 am: National Institute of Justice: Science and Technology Officeinitiatives (Keynote Presentation), William A. Ford, U.S. Dept of Justice(USA) ................................................[9456-18]SESSION 5LOCATION: CONV. CTR. ROOM 324 ..........TUE 9:20 AM TO 10:40 AMCyber Crimes, Cyberterrorism, and LawEnforcementSession Chairs: Jordan Wexler,Raytheon Applied Signal Technology, Inc. (USA); George Cybenko,Thayer School of Engineering at Dartmouth (USA)9:20 am: Quantification of moving target cyber defenses, Katheryn A Farris,George Cybenko, Thayer School of Engineering at Dartmouth (USA) . . [9456-19]9:40 am: Enterprise scale cyber risk assessment and management,Jeff Hughes, Tenet 3, LLC (USA); George Cybenko, Thayer School ofEngineering at Dartmouth (USA) ...............................[9456-20]10:00 am: Image encryption by redirection and cyclical shift,Artyom M. Grigoryan, Bryan A. Wiatrek, Sos S Again, The Univ. of Texasat San Antonio (USA)........................................[9456-21]10:20 am: An exact computational method for performance analysis ofsequential test algorithms for detecting network intrusions, Xinjia Chen,Frederick W. Lacy, Patrick Carriere, Southern Univ. and A&M College(USA) ....................................................[9456-22]Coffee Break ................................ Tue 10:40 am to 11:00 amSESSION 6LOCATION: CONV. CTR. ROOM 324 ..........TUE 11:00 AM TO 12:20 PMC3I Systems and Technologies 1Session Chairs: Myron E. Hohil, U.S. Army Armament Research,Development and Engineering Ctr. (USA);Tariq Manzur, Naval Undersea Warfare Ctr. (USA)11:00 am: Bayesian truthing as experimental verification of C4ISR sensors,Tomasz P. Jannson, Thomas C. Forrester, Physical Optics Corp. (USA);Volodymyr Romanov, Wenjian Wang, Thomas Nielsen, Andrew Kostrzewski,Physical Optics Corp (USA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [9456-23]11:20 am: Stochastic optimization of space-time constellations,Xinjia Chen, Patrick Carriere, Frederick W. Lacy, Southern Univ. and A&MCollege (USA) .............................................[9456-24]11:40 am: Improving situation awareness with the Android team awarenesskit (ATAK), Kyle Usbeck, Matthew Gillen, Joseph P. Loyall, Andrew Gronosky,Raytheon BBN Technologies (USA); Joshua Sterling, U.S. Army Night Vision &Electronic Sensors Directorate (USA); Ralph L. Kohler Jr., Air Force ResearchLab. (USA); Kelly Hanlon, Andrew Scally, WinTec Arrowmaker, Inc. (USA);Richard Newkirk, David Canestrare, Air Force Research Lab. (USA) ...[9456-25]12:00 pm: Adaptive randomized algorithms for analysis and design ofcontrol systems under uncertain environments, Xinjia Chen, Southern Univ.and A&M College (USA) .....................................[9456-26]Lunch/Exhibition Break .........................Tue 12:20 pm to 1:40 pmSESSION 7LOCATION: CONV. CTR. ROOM 324 ............TUE 1:40 PM TO 3:20 PMC3I Systems and Technologies IISession Chairs: Myron E. Hohil, U.S. Army Armament Research,Development and Engineering Ctr. (USA);Tariq Manzur, Naval Undersea Warfare Ctr. (USA)1:40 pm: Vulnerabilities in GSM technology and feasibility of selectedattacks, Miroslav Voznak, Martin Prokes, Miralem Mehic, Lukas Sevcik,Jaroslav Frnda, Martin Mikulec, Zdenka Chmelikova, VŠB Technical Univ. ofOstrava (Czech Republic) ....................................[9456-27]2:00 pm: PACT DSS: a decision support system for privacy impactassessment of future security investments, Stelios C. Thomopoulos,Dimitris Kyriazanos, Anastassios Bravakis, Olga Segou, National Ctr. forScientific Research Demokritos (Greece) ........................[9456-28]2:20 pm: Anomalies, singularities, and catastrophes in C3ISR systems,Tomasz P. Jannson, Pedram Boghrat, Thomas C. Forrester, Thomas Nielsen,Andrew A. Kostrzewski, Physical Optics Corp. (USA); Kevin Walter, PhysicalOptics Corp (USA)..........................................[9456-29]2:40 pm: The next generation of command post computing, Ross D Arnold,Aaron J Lieb, Jason M Samuel, Mitchell A Burger, U.S. Army ArmamentResearch, Development and Engineering Ctr. (USA) ...............[9456-30]3:00 pm: DXBC: a long distance wireless broadband communicationsystem for coastal maritime surveillance applications, Stelios CThomopoulos, George Vastianos, National Ctr. for Scientific ResearchDemokritos (Greece) ........................................[9456-31]Coffee Break ..................................Tue 3:20 pm to 3:50 pm56 SPIE DSS 2015 · www.spie.org/dss

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!