CALL FOR PAPERS: POSTER SESSIONS

 

 

Consistent with EWI's reputation as a "think and do tank," the Summit fosters problem solving and solution recommendations for difficult international and consequential policy gaps in cyberspace, i. e. the internationally-focused Agreements, Standards, Policies and Regulations (ASPR) gaps. As part of the process, poster sessions will present juried papers on various topics pertaining to international cybersecurity by representatives of several research teams. Abstracts received include:

International Priority Communications

Stuart Goldman, NGN Priority

Telecommunications, Independent

contractor/consultant, Bell Labs Fellow (Ret.)

 

The organization of Islamic conference - Computer

emergency Response Team (Oic-Cert) - answering

Cross Border cooperation

Rahayu Azlina Ahmad ABCP, Manager,

Multilateral Engagement Department,

Government & Multilateral Engagement Division,

CyberSecurity Malaysia

 

The FATF as Model for Internet Governance

Kevin Newmeyer, Assistant Professor

(homeland Defense), Center for Hemispheric

Defence Studies

 

Towards Establishment of Cyberspace

Deterrence Strategy

Dmitri Alperovitch, Vice president, Threat Research,

McAfee, Inc.

 

Telecommunications Supply chain Integrity

John Kimmins, Executive Director/Fellow,

Telcordia Technologies

 

Malaysia National Cyber Security Policy - The

Country's Cyber defense Initiatives

Mohd Shamir B Hashim, Government &

Multilateral Engagement division,

CyberSecurity, Malaysia

 

A cloudy Future: Emerging Security Issues in the

Cloud Computing World

Federico Maggi and Stefano Zanero,

Politecnico di Milano

 

Threat Analysis of ICT Supply Chain Integrity

Xiaofend QIU, Beijing University of Posts and

Telecommunications, & Liang ZHAO, NSFOCUS

 

A Brief Study of SNMP Protocol and its Role in

Network Management

Waqqas ur Rehman Butt, Centre of Excellence

in Water Resources Engineering, University of

engineering and Technology

 

Genomic Processor for Malware

Ken Phillips, Business Development Manager,

OVERWATCH ® , Textron systems

 

Network Node Geo-Location

Ken Phillips, Business Development Manager,

OVERWATCH ®Textron Systems
 

The Reality of Cyber Conflict: Beyond Speculation

Eli Jellenc, Geopolitical Research Group, VeriSign

Information Security

 

Early Detection Approach of Attack Vectors

Ahmad Hassan, Team Leader/Monitoring &

Response, aeCERT

 

Ending the Scourge of Online child Pornography

John Carr OBE, Secretary, children's Charities'

coalition on Internet Safety

 

Youth Protection

Dave Miles, director - Europe, middle East & Africa,

Family Online Safety Institute

 

The IPV6 Forum Cyber Security Task Force: Create a

Worldwide Secure IPV6 Network

LAtif Ladid, President, IPv6 FORUM, Chair, European

IPv6 Task Force

 

Multi-Dimentional Challenges to the Digital Youth and Its

Consequence to Society and Governments

Salma Abbasi, chairperson and CEO, eWorldwide

Group, Sr. Associate Fellow, King's college London

 

Network Security Requires International Vulnerability

Database Alliance 

Quxi Liu, Yuqing Zhang, Chen zeng, National Computer

Network Intrusion Protection Center, GUCAS, Beijing, China

 

Peer- To - Peer Botnet Extraction

Ken Phillips, Business Development Manager, OVERWATCH ®,

Textron Systems

 

Emerging Social Media Threats: Technology to Policy

Perspectives

R. Chandramouli, Department of Electrical and computer

Engineering, Stevens Institute of Technology, USA

 

Deveyes Insider Threat Detection

Ken Phillips, Business Development Manager, OVERWATCH ®,

Textron systems

 

Gaming International Humanitarian Law: New opportunities

for the State and Non-state Actors in cyberspace

James Bret Michael, Ph.D., Professor of Computer Science

and Electrical Engineering, Naval Postgraduate School &

Thoman C. Wingfield, Professor of International Law,

George C. Marshall European Center for Security Studies

  

 

REGISTER NOW

Join EWI on facebook Follow EWI on twitter View EWI publications on issuu
Watch EWI videos on youtube Subscribe for EWI email alerts Subscribe to the EWI rss feed

NEWS

  • EWIcyber: RT @ewinstitute: Our Cyber Crime Working Group concludes: now is not the time for a comprehensive treaty on cyberspace http://bit.ly/ieV ...
  • EWIcyber: RT @ewinstitute: Our Senior #Cybersecurity Advisor Gen. Harry Raduege lauds the Obama administration's cyber policies: http://bit.ly/hyo ...
  • EWIcyber: RT @ewinstitute: Our Distinguished Fellow Karl Rauscher previews the upcoming joint Chinese-U.S. anti-spam publication: http://bit.ly/dLSzOP

VIDEO

PHOTOS