November 27 (Thursday), 2014 @ Building BC, Room North1, Burwood |
11:30-12:30 |
ATIS-2014 Registration
Location: Building T
|
12:00-13:00 |
Lunch (Level 1, Building T) |
13:00-13:05 |
Opening Welcome by ATIS-2014 Chair: Prof. Lynn Batten |
13:05-14:00
|
Invited Talk (I)
Speaker: Associate Professor Jinqiao Shi, National Engineering Laboratory for Information Security Technologies, China
Topic : Towards Protecting Service Accessibility of Anonymous Communication Systems: Catch Me if You Can!
Introduced by: Prof. Lynn Batten, Deakin University
|
14:00-15:10 |
Session 1: Digital Forensics
Session Chair: Andrei Kelarev
|
14:00-14:25 |
Testing Similarity Digests with Random Changes
Jonathan Oliver, Scott Forman and Chun Cheng
Trend Micro, Australia
|
14:25-14:40 |
Research of Password Recovery Method For RAR based on Parallel Random Search
Liang Ge and Lianhai Wang
Shandong Computer Science Center, China
|
14:40-14:55 |
Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com
Michael Monnik, Lei Pan
Deakin University, Australia
|
14:55-15:10 |
A Novel Method for Detecting Double Compressed Facebook JPEG Images
Allan NG, Lei Pan and Yang Xiang
Deakin University, Australia
|
15:10-15:35 |
Tea Break |
15:35-17:35 |
Session 2: Applications (I)
Session Chair: Lei Pan
|
15:35-16:00 |
Popularity Prediction of Tianya BBS Posts Based on User Behavior
Ge Li, Yue Hu and Yanyu Yu
University of Science and Technology Beijing, China
|
16:00-16:25 |
Design and Implementation of Network User Behaviors Analysis based on Hadoop for Big Data
Jian-feng Guan, SU YAO, Changqiao Xu, Hongke Zhang
Beijing University of Posts and Telecommunications, China
|
16:25-16:40 |
The Research of Extraction Algorithm for Target Feature of Chest Bitmap
Tianshi Liu, RuiXiang Liu, Hongwei Wang
Xi'an Shiyou University, China
|
16:40-16:55 |
A Method for Detecting Trojan Based on Hidden Network Traffic Analysis
Zhiwen Chen, YiZheng Tao, Gongliang Li
Chinese Academy of Engineering Physics, China
|
16:55-17:10 |
A survey on encrypted traffic classification
Zigang Cao, BUPT; Gang Xiong, Yong Zhao, Zhenzhen Li, Qingyun Liu, Li Guo
Beijing University of Posts and Telecommunications, China |
17:10-17:35 |
A Competitive Three-Level Pruning Technique for Information Security
Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai
Deakin University, Kyushu University |
17:35 |
Information about the conference dinner and transportation |
November 28 (Friday), 2014 @ G129 Greenwood Park |
09:00-09:55 |
Invited Talk (II)
Speaker: Associate Professor Lejla Batina, Radboud University Nijmegen, The Netherlands
Topic: Near-field Privacy
Introduced by: Dr Wenjia Niu, Chinese Academy of Sciences, China |
10:00-10:50 |
Session 3: Applications (II)
Session Chair: Lynn Batten
|
10:00-10:25 |
System-level Permission Management Mechanism of Android Device
Dali Zhu, Zheming Fan, Na Pang
Chinese Academy of Sciences, China
|
10:25-10:50 |
Enhancing Security of the Android Platform via Multi-Level Security Model
Ji-Soo Oh, Min-Woo Park and Tai-Myoung Chung
Sungkyunkwan University, Korea
|
10:50-11:20 |
Tea Break (G130) |
11:20-12:50 |
Session 4: Security Implementations
Session Chair: Lejla Batina
|
11:20-11:45 |
A New Sybil-Resist Algorithm Based on the Existing Work Sybil Defender in Social Networks
Wei Ma, Senzhe Hu, Qiong Dai, Tingting Wang, Yinfei Huang
Chinese Academy of Sciences, Beijing Special Vehicle Institute, Shanghai Stock Exchange, China |
11:45-12:10 |
PAITS: Detecting Masquerader via Short-lived Interventional Mouse Dynamics Xiaojun Chen, Jinqiao Shi, Rui Xu, S.M. Yiu, Bingxing Fang, Fei Xu
Chinese Academy of Sciences, China |
12:10-12:35 |
Social Engineering through Social Media: A Comprehensive Investigation on Enterprise Security
Rafiqul Islam, Maumita Bhattacharya
Charles Sturt University, Australia |
12:35-12:50 |
Efficient key pre-Distribution for wireless sensor networks: a case study on 6LoWPAN networks running Contiki-OS
Ruben Smeets, Kris Aerts, Dave Singelee, Nele Mentens
KU Leuven |
12:50-13:50 |
Lunch (G130) |
13:50-14:15 |
ATIS-2014 Awards |
14:15-15:55 |
Session 5: CyberCrime
Session Chair: Gang Li |
14:15-14:40 |
An approach to Detect The Internet Water Army via Dirichlet Process Mixture Model based GSP Algorithm
Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan, Li Guo
Chinese Academy of Sciences, China |
14:40-15:05 |
Modeling and Analysis of Network Survivability Under Attack Propagation
Su Yao, Jian-feng Guan, Hongke Zhang, HUA PAN, Fei Song
Beijing University of Posts and Telecommunications, China |
15:05-15:30 |
A Scalable Approach for Vulnerability Discovery based on Security Patches
Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee
CCS Lab, Korea University, Korea |
15:30-15:55 |
Modeling the Effect of Infection Time on Active Worm Propagations
Hui Liu, Xiaolong Ma, Bo Ding, Tianzuo Wang, Qiang Lu
Aliyun, China |
15:55-16:20 |
Tea Break (G130) |
16:20-18:00 |
Session 6: Data Privacy
Session Chair: Bernard Colbert
|
16:20-16:45 |
Location Privacy Preserving for Semantic-aware Applications
Lefeng Zhang, Ping Xiong, Tianqing Zhu
Zhongnan University of Economics and Law, China |
16:45-17:10 |
Analysis on the Reliability of Non-repairable and Repairable Network Storage Systems
Yin Mingyong, Chun Wu and Yizheng Tao
Chinese Academy of Engineering Physics, China |
17:10-17:35 |
Homomorphic Cryptography-based Privacy-Preserving Network Communications Christophe Bidan, Antoine Guellier, Nicolas Prigent
Suplec/Inria, France |
17:35-18:00 |
The 0-1 knapsack polytope - a starting point for cryptanalysis of knapsack ciphers? Vicky Mak-Hau
Deakin University, Australia |
18:00 |
Closing Remarks
Chair: Prof. Lynn Batten
|