SeminarSchedule.Fall2008 History
Hide minor edits - Show changes to markup
Changed lines 11-12 from:
to:
12/05/2008 | 3:00 PM | Bluetooth Security: Overview, Analysis, and Research Opportunities | John Padgette | ST2, Room 430A |
Changed lines 10-11 from:
to:
11/21/2008 | 3:00 PM | AITVS: Advanced Interactive Traffic Visualization System | Chang-Tien Lu | ST2, Room 430A |
Changed lines 9-10 from:
to:
11/14/2008 | 3:00 PM | Performance Engineering in Secure Distributed Systems | Sanjeev Setia | Golden Room, JC Please attend this joint VISTE/CS seminar. |
Added lines 8-9:
10/31/2008 | 3:00 PM | Reliable Bulk Data Dissemination in Wireless Sensor Networks | Sanjeev Setia | ST2, Room 430A |
Changed line 7 from:
10/17/2008 | 12:00 PM | A First Step Toward Live Botmaster Traceback | Xinyuan Wang | ST2, Room 430A |
to:
10/17/2008 | 3:00 PM | A First Step Toward Live Botmaster Traceback | Xinyuan Wang | ST2, Room 430A |
Added line 6:
Changed line 2 from:
to:
Changed line 5 from:
to:
09/26/2008 | 3:00 PM | BotTracer: Execution-based Bot-like Malware Detection | Lei Liu | ST2, Room 430A |
Changed lines 4-5 from:
09/12/2008 | 3:00 PM | Clone Attack and Insider Attack Detection in Wireless Sensor Networks | Susan Cheng | ST2, Room 430A |
to:
09/12/2008 | 3:00 PM | Clone Attack and Insider Attack Detection in Wireless Sensor Networks | Susan Cheng | ST2, Room 430A |
Changed lines 4-6 from:
09/12/2008 | 3:00 PM | [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/wsn| Clone Attack and Insider Attack Detection in Wireless Sensor Networks |
]] || Susan Cheng || ST2, Room 430A ||
to:
09/12/2008 | 3:00 PM | Clone Attack and Insider Attack Detection in Wireless Sensor Networks | Susan Cheng | ST2, Room 430A |
Changed lines 4-6 from:
09/05/2008 | 3:00 PM | TBA | TBA | ST2, Room 430A |
to:
09/12/2008 | 3:00 PM | [[ http://www.cs.gmu.edu/~sqchen/SANG/abs/2008F/wsn| Clone Attack and Insider Attack Detection in Wireless Sensor Networks |
]] || Susan Cheng || ST2, Room 430A ||
Deleted line 0:
Changed lines 4-12 from:
08/31/2007 | 3:00 PM | Enabling "Out-of-the-Box" Malware Detection with Virtual Machines | Xuxian Jiang | ST2, Room 320 |
09/14/2007 | 3:00 PM | Intrusion Detection on Rootkit | Jing Jin | ST2, Room 320 |
09/28/2007 | 3:00 PM | Billing Attacks on SIP-Based VoIP Systems | Xinyuan Wang | ST2, Room 430 |
10/12/2007 | 12:00 PM | The Future of Internet Security | Steve Bellovin | Room E, Johnson Center |
10/26/2007 | 3:00 PM | OpenTor: Anonymity as a Commodity Service | Angelos Stavrou | ST2, Room 430 |
11/08/2007 | 12:00 PM | Online Buffer Management | Fei Li | ST2, Room 430 |
11/30/2007 | 3:00 PM | Scaling Properties of Worst-Case Delays in Networks | Florin Ciucu | ST2, Room 430 |
12/06/2007 | 10:30 AM | The Wireless Networks Program at the National Science Foundation | Jie Wu | ST2, Room 430 |
to:
09/05/2008 | 3:00 PM | TBA | TBA | ST2, Room 430A |
Added line 1:
Changed line 3 from:
to:
Deleted lines 4-17:
01/25/2008 | 3:00 PM | Dynamic Bi-Overlay Rotation for Streaming with Heterogeneous Devices | Dongyu Liu | ST2, Room 430A |
02/07/2008 | 2:00 PM | VoIP over 802.11 | Henning Schulzrinne | Room 5&6, Sub II |
02/22/2008 | 1:30 PM | Exploiting Hardware/Software Interactions for Embedded Systems Design | Sibin Mohan | ST2, Room 430A |
03/07/2008 | 3:00 PM | Secure Structures for Symmetric Key Ciphers and Their Applications | Debra Cook | ST2, Room 430A |
03/21/2008 | 3:00 PM | SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks | Anyi Liu | ST2, Room 430A |
04/04/2008 | 3:00 PM | Routing in Delay Tolerant Networks | Muhammad Abdulla | ST2, Room 430A |
04/18/2008 | 3:00 PM | Roving Bugnet: Distributed Surveillance Threat and Mitigation | Ryan Farley | ST2, Room 430A |
Date | Time | Topic | Speaker | Location |
---|
Deleted lines 13-25:
Date | Time | Topic | Speaker | Location |
---|---|---|---|---|
02/02/2007 | 3:00 PM | Autonomic Computing | Daniel Menasce | ST2, Room 430 |
02/16/2007 | 3:00 PM | Routing in Delay Tolerant Networks | Muhammad Abdulla | ST2, Room 430 |
03/02/2007 | 3:00 PM | Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks | Leijun Huang | ST2, Room 430 |
03/16/2007 | 3:00 PM | IP Telephony is Vulnerable to Overloading | Hemant Sengar | ST2, Room 430 |
03/30/2007 | 3:00 PM | Attack-resilient Hierarchical Data Aggregation in Sensor Networks | Sankardas Roy | ST2, Room 430 |
04/13/2007 | 3:00 PM | Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems | Xinyuan Wang | ST2, Room 430 |
04/27/2007 | 3:00 PM | System-level Power Management for Real-time Applications | Vinay Devadas | ST2, Room 430 |
05/11/2007 | 3:00 PM | exam week | cancelled | ST2, Room 430 |
05/25/2007 | 3:00 PM | PAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous Devices | Dongyu Liu | ST2, Room 430 |
Added lines 1-39:
Date | Time | Topic | Speaker | Location |
---|---|---|---|---|
01/25/2008 | 3:00 PM | Dynamic Bi-Overlay Rotation for Streaming with Heterogeneous Devices | Dongyu Liu | ST2, Room 430A |
02/07/2008 | 2:00 PM | VoIP over 802.11 | Henning Schulzrinne | Room 5&6, Sub II |
02/22/2008 | 1:30 PM | Exploiting Hardware/Software Interactions for Embedded Systems Design | Sibin Mohan | ST2, Room 430A |
03/07/2008 | 3:00 PM | Secure Structures for Symmetric Key Ciphers and Their Applications | Debra Cook | ST2, Room 430A |
03/21/2008 | 3:00 PM | SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks | Anyi Liu | ST2, Room 430A |
04/04/2008 | 3:00 PM | Routing in Delay Tolerant Networks | Muhammad Abdulla | ST2, Room 430A |
04/18/2008 | 3:00 PM | Roving Bugnet: Distributed Surveillance Threat and Mitigation | Ryan Farley | ST2, Room 430A |
Date | Time | Topic | Speaker | Location |
---|---|---|---|---|
08/31/2007 | 3:00 PM | Enabling "Out-of-the-Box" Malware Detection with Virtual Machines | Xuxian Jiang | ST2, Room 320 |
09/14/2007 | 3:00 PM | Intrusion Detection on Rootkit | Jing Jin | ST2, Room 320 |
09/28/2007 | 3:00 PM | Billing Attacks on SIP-Based VoIP Systems | Xinyuan Wang | ST2, Room 430 |
10/12/2007 | 12:00 PM | The Future of Internet Security | Steve Bellovin | Room E, Johnson Center |
10/26/2007 | 3:00 PM | OpenTor: Anonymity as a Commodity Service | Angelos Stavrou | ST2, Room 430 |
11/08/2007 | 12:00 PM | Online Buffer Management | Fei Li | ST2, Room 430 |
11/30/2007 | 3:00 PM | Scaling Properties of Worst-Case Delays in Networks | Florin Ciucu | ST2, Room 430 |
12/06/2007 | 10:30 AM | The Wireless Networks Program at the National Science Foundation | Jie Wu | ST2, Room 430 |
Date | Time | Topic | Speaker | Location |
---|---|---|---|---|
02/02/2007 | 3:00 PM | Autonomic Computing | Daniel Menasce | ST2, Room 430 |
02/16/2007 | 3:00 PM | Routing in Delay Tolerant Networks | Muhammad Abdulla | ST2, Room 430 |
03/02/2007 | 3:00 PM | Energy-efficient Reliable Bulk Data Dissemination in Sensor Networks | Leijun Huang | ST2, Room 430 |
03/16/2007 | 3:00 PM | IP Telephony is Vulnerable to Overloading | Hemant Sengar | ST2, Room 430 |
03/30/2007 | 3:00 PM | Attack-resilient Hierarchical Data Aggregation in Sensor Networks | Sankardas Roy | ST2, Room 430 |
04/13/2007 | 3:00 PM | Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems | Xinyuan Wang | ST2, Room 430 |
04/27/2007 | 3:00 PM | System-level Power Management for Real-time Applications | Vinay Devadas | ST2, Room 430 |
05/11/2007 | 3:00 PM | exam week | cancelled | ST2, Room 430 |
05/25/2007 | 3:00 PM | PAT: Peer-Assisted Transcoding for Overlay Streaming to Heterogeneous Devices | Dongyu Liu | ST2, Room 430 |