SeminarSchedule.Fall2008 History

Hide minor edits - Show changes to output

Changed lines 11-12 from:
to:
|| 12/05/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/bluetooth | Bluetooth Security: Overview, Analysis, and Research Opportunities ]] || John Padgette || ST2, Room 430A ||
November 17, 2008, at 04:11 PM by 129.174.89.26 -
Changed lines 10-11 from:
to:
|| 11/21/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/aitvs | AITVS: Advanced Interactive Traffic Visualization System ]] || Chang-Tien Lu || ST2, Room 430A ||
Changed lines 9-10 from:
to:
|| 11/14/2008 || 3:00 PM || [[ http://cs.gmu.edu/events/seminar//F2008/Setia08.html | Performance Engineering in Secure Distributed Systems ]] || Sanjeev Setia || Golden Room, JC '^Please attend this joint VISTE/CS seminar.^' ||
Added lines 8-9:
|| 10/31/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/bdd | Reliable Bulk Data Dissemination in Wireless Sensor Networks ]] || Sanjeev Setia || ST2, Room 430A ||
October 06, 2008, at 03:17 PM by 129.174.89.26 -
Changed line 7 from:
|| 10/17/2008 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/botmaster | A First Step Toward Live Botmaster Traceback ]] || Xinyuan Wang || ST2, Room 430A ||
to:
|| 10/17/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/botmaster | A First Step Toward Live Botmaster Traceback ]] || Xinyuan Wang || ST2, Room 430A ||
October 04, 2008, at 06:04 PM by 129.174.89.26 -
Changed lines 6-7 from:
|| 10/02/2008 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/scit | Self Cleansing Intrusion Tolerance Next Generation Server Security ]] || Arun Sood || ST2, Room 430A ||
to:
|| 10/02/2008 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/scit | Self Cleansing Intrusion Tolerance Next Generation Server Security ]] || Arun Sood || ST2, Room 430A ||
|| 10/17/2008 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/botmaster | A First Step Toward Live Botmaster Traceback ]] || Xinyuan Wang
|| ST2, Room 430A ||
Added line 6:
|| 10/02/2008 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/scit | Self Cleansing Intrusion Tolerance Next Generation Server Security ]] || Arun Sood || ST2, Room 430A ||
Changed line 2 from:
||! [+++'''Seminar Schedule of Fall 2007'''+++] !||
to:
||! [+++'''Seminar Schedule of Fall 2008'''+++] !||
Changed line 5 from:
to:
|| 09/26/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/bottracer | BotTracer: Execution-based Bot-like Malware Detection ]] || Lei Liu || ST2, Room 430A ||
August 25, 2008, at 10:49 AM by 129.174.88.95 -
Changed lines 4-5 from:
|| 09/12/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/ab/2008F/wsn | Clone Attack and Insider Attack Detection in Wireless Sensor Networks ]] || Susan Cheng || ST2, Room 430A ||
to:
|| 09/12/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/wsn | Clone Attack and Insider Attack Detection in Wireless Sensor Networks ]] || Susan Cheng || ST2, Room 430A ||
August 25, 2008, at 10:45 AM by 129.174.88.95 -
Changed lines 4-6 from:
|| 09/12/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/wsn| Clone Attack and Insider Attack Detection in Wireless Sensor Networks
]] || Susan Cheng || ST2, Room 430A ||
to:
|| 09/12/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/ab/2008F/wsn | Clone Attack and Insider Attack Detection in Wireless Sensor Networks ]] || Susan Cheng || ST2, Room 430A ||
August 25, 2008, at 10:45 AM by 129.174.88.95 -
Changed lines 4-6 from:
|| 09/05/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008F/vm | TBA ]] || TBA || ST2, Room 430A ||
to:
|| 09/12/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/wsn| Clone Attack and Insider Attack Detection in Wireless Sensor Networks
]]
|| Susan Cheng || ST2, Room 430A ||
August 16, 2008, at 04:08 PM by 129.174.88.95 -
Deleted line 0:
Changed lines 4-12 from:
|| 08/31/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/vm | Enabling "Out-of-the-Box" Malware Detection with Virtual Machines]] || Xuxian Jiang || ST2, Room 320 ||
|| 09/14/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/rootkit| Intrusion Detection on Rootkit]] || Jing Jin || ST2, Room 320 ||
|| 09/28/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/voip | Billing Attacks on SIP-Based VoIP Systems]] || Xinyuan Wang || ST2, Room 430 ||
|| 10/12/2007 || 12:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/security | The Future of Internet Security ]] || Steve Bellovin || Room E, Johnson Center ||
|| 10/26/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/tor | OpenTor: Anonymity as a Commodity Service ]] || Angelos Stavrou || ST2, Room 430 ||
|| 11/08/2007 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/buffer | Online Buffer Management ]] || Fei Li || ST2, Room 430 ||
|| 11/30/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/scaling | Scaling Properties of Worst-Case Delays in Networks]] || Florin Ciucu || ST2, Room 430 ||
|| 12/06/2007 || 10:30 AM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/NeTS | The Wireless Networks Program at the National Science Foundation]] || Jie Wu || ST2, Room 430 ||
to:
|| 09/05/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008F/vm | TBA ]] || TBA || ST2, Room 430A ||
August 16, 2008, at 04:01 PM by 129.174.88.95 -
Added line 1:
Changed line 3 from:
||! [+++'''Seminar Schedule of Spring 2008'''+++] !||
to:
||! [+++'''Seminar Schedule of Fall 2007'''+++] !||
Deleted lines 4-17:
|| 01/25/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/mmcn-rotation | Dynamic Bi-Overlay Rotation for Streaming with Heterogeneous Devices]] || Dongyu Liu || ST2, Room 430A ||
|| 02/07/2008 || 2:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/voip | VoIP over 802.11 ]] || Henning Schulzrinne || Room 5&6, Sub II ||
|| 02/22/2008 || 1:30 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/realtime | Exploiting Hardware/Software Interactions for Embedded Systems Design ]] || Sibin Mohan || ST2, Room 430A ||
|| 03/07/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/securekey | Secure Structures for Symmetric Key Ciphers and Their Applications ]] || Debra Cook || ST2, Room 430A ||
|| 03/21/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/sql| SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks ]] || Anyi Liu || ST2, Room 430A ||
|| 04/04/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/dtn2| Routing in Delay Tolerant Networks ]] || Muhammad Abdulla || ST2, Room 430A ||
|| 04/18/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/roving| Roving Bugnet: Distributed Surveillance Threat and Mitigation ]] || Ryan Farley || ST2, Room 430A ||



----------------------------------------------------------
|| border=1 width=100%
||! [+++'''Seminar Schedule of Fall 2007'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Location ||
Deleted lines 13-25:
----------------------------------------------------------
|| border=1 width=100%
||! [+++'''Seminar Schedule of Spring 2007'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Location ||
|| 02/02/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~menasce/papers/AutonomicComputing.pdf | Autonomic Computing ]] || Daniel Menasce || ST2, Room 430 ||
|| 02/16/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/dtn | Routing in Delay Tolerant Networks]] || Muhammad Abdulla || ST2, Room 430 ||
|| 03/02/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/sensor-leijun | Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks]] || Leijun Huang || ST2, Room 430 ||
|| 03/16/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/hement-abs | IP Telephony is Vulnerable to Overloading]] || Hemant Sengar || ST2, Room 430 ||
|| 03/30/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/sensor-roy | Attack-resilient Hierarchical Data Aggregation in Sensor Networks]] || Sankardas Roy || ST2, Room 430 ||
|| 04/13/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/abs-wang | Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems]] || Xinyuan Wang || ST2, Room 430 ||
|| 04/27/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/abs-devadas | System-level Power Management for Real-time Applications]] || Vinay Devadas || ST2, Room 430 ||
|| 05/11/2007 || 3:00 PM || exam week || cancelled || ST2, Room 430 ||
|| 05/25/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/pat| PAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous Devices]] || Dongyu Liu || ST2, Room 430 ||
August 16, 2008, at 03:59 PM by 129.174.88.95 -
Added lines 1-39:
|| border=1 width=100%
||! [+++'''Seminar Schedule of Spring 2008'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Location ||
|| 01/25/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/mmcn-rotation | Dynamic Bi-Overlay Rotation for Streaming with Heterogeneous Devices]] || Dongyu Liu || ST2, Room 430A ||
|| 02/07/2008 || 2:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/voip | VoIP over 802.11 ]] || Henning Schulzrinne || Room 5&6, Sub II ||
|| 02/22/2008 || 1:30 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/realtime | Exploiting Hardware/Software Interactions for Embedded Systems Design ]] || Sibin Mohan || ST2, Room 430A ||
|| 03/07/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/securekey | Secure Structures for Symmetric Key Ciphers and Their Applications ]] || Debra Cook || ST2, Room 430A ||
|| 03/21/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/sql| SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks ]] || Anyi Liu || ST2, Room 430A ||
|| 04/04/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/dtn2| Routing in Delay Tolerant Networks ]] || Muhammad Abdulla || ST2, Room 430A ||
|| 04/18/2008 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2008S/roving| Roving Bugnet: Distributed Surveillance Threat and Mitigation ]] || Ryan Farley || ST2, Room 430A ||



----------------------------------------------------------
|| border=1 width=100%
||! [+++'''Seminar Schedule of Fall 2007'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Location ||
|| 08/31/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/vm | Enabling "Out-of-the-Box" Malware Detection with Virtual Machines]] || Xuxian Jiang || ST2, Room 320 ||
|| 09/14/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/rootkit| Intrusion Detection on Rootkit]] || Jing Jin || ST2, Room 320 ||
|| 09/28/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/voip | Billing Attacks on SIP-Based VoIP Systems]] || Xinyuan Wang || ST2, Room 430 ||
|| 10/12/2007 || 12:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/security | The Future of Internet Security ]] || Steve Bellovin || Room E, Johnson Center ||
|| 10/26/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/tor | OpenTor: Anonymity as a Commodity Service ]] || Angelos Stavrou || ST2, Room 430 ||
|| 11/08/2007 || 12:00 PM || [[ http://www.cs.gmu.edu/~sqchen/group/abs/2007F/buffer | Online Buffer Management ]] || Fei Li || ST2, Room 430 ||
|| 11/30/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/scaling | Scaling Properties of Worst-Case Delays in Networks]] || Florin Ciucu || ST2, Room 430 ||
|| 12/06/2007 || 10:30 AM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007F/NeTS | The Wireless Networks Program at the National Science Foundation]] || Jie Wu || ST2, Room 430 ||

----------------------------------------------------------
|| border=1 width=100%
||! [+++'''Seminar Schedule of Spring 2007'''+++] !||
||! Date ||! Time ||! Topic ||! Speaker ||! Location ||
|| 02/02/2007 || 3:00 PM || [[ http://www.cs.gmu.edu/~menasce/papers/AutonomicComputing.pdf | Autonomic Computing ]] || Daniel Menasce || ST2, Room 430 ||
|| 02/16/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/dtn | Routing in Delay Tolerant Networks]] || Muhammad Abdulla || ST2, Room 430 ||
|| 03/02/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/sensor-leijun | Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks]] || Leijun Huang || ST2, Room 430 ||
|| 03/16/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/hement-abs | IP Telephony is Vulnerable to Overloading]] || Hemant Sengar || ST2, Room 430 ||
|| 03/30/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/sensor-roy | Attack-resilient Hierarchical Data Aggregation in Sensor Networks]] || Sankardas Roy || ST2, Room 430 ||
|| 04/13/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/abs-wang | Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems]] || Xinyuan Wang || ST2, Room 430 ||
|| 04/27/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/abs-devadas | System-level Power Management for Real-time Applications]] || Vinay Devadas || ST2, Room 430 ||
|| 05/11/2007 || 3:00 PM || exam week || cancelled || ST2, Room 430 ||
|| 05/25/2007 || 3:00 PM || [[http://www.cs.gmu.edu/~sqchen/group/abs/2007S/pat| PAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous Devices]] || Dongyu Liu || ST2, Room 430 ||