HotSoS 2016
  HotSoS 2016 proceedings are in the ACM Digital Library
| TUESDAY, APRIL 19 | ||
| 6:00pm - 9:00pm | Evening Reception at Phipps Conservatory | |
| WEDNESDAY, APRIL 20 | ||
| 8:00am - 9:00am | Breakfast at Cohon University Center | |
| SESSION 1 | ||
| 9:00am - 10:30am | Welcome and Introduction Keynote: Lorrie Cranor Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy Paper: Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbararczyk, and Ravishankar Iyer Safety-critical Cyber-Physical Attacks: Analysis, Detection, and Mitigation | |
| 10:30am - 11:00am | Break | |
| SESSION 2 | ||
| 11:00am - 12:30pm | Paper: Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos Optimal Thresholds for Intrusion Detection Systems Paper: Atul Bohara, Uttam Thakore, and William Sanders Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data Paper: Jeffrey Carver, Morgan Burcham, Sedef Akinli Kocak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, and Laurie Williams Establishing a Baseline for Mesauring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings | |
| 12:30pm - 2:00pm | Posters and Lunch | |
| SESSION 3 | ||
| 2:00pm - 3:00pm | Keynote: Greg Shannon Science Challenges in the Federal Cybersecurity R&D Strategic Plan | |
| 3:00pm - 3:30pm | Posters and Break | |
| SESSION 4 | ||
| 3:30pm - 5:20pm | Paper: Bradley Potteiger, Goncalo Martins, and Xenofon Koutsoukos Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment Tutorial: Hanan Hibshi Systematic Analysis of Qualitative Data in Security | |
| 5:30pm - 6:00pm | Break | |
| 6:00pm - 9:00pm | Dinner at Carnegie Museum of Natural History | |
| THURSDAY, APRIL 21 | ||
| 8:00am - 9:00am | Breakfast at Cohon University Center | |
| SESSION 5 | ||
| 9:00am - 10:30am | Keynote: Christos Faloutsos Anomaly Detection in Large Graphs Paper: Kevin Bush, Antonio Roque, and Christopher Degni Security is About Control: Insights from Cybernetics Paper: Zhenqi Huang, Yu Wang, Sayan Mitra, and Geir Dullerud Controller Synthesis for Linear Time-varying Systems with Adversaries | |
| 10:30am - 11:00am | Break | |
| SESSION 6 | ||
| 11:00am - 12:20pm | Tutorial: Tao Xie, William Enck Text Analytics for Security | |
| 12:20pm - 1:20pm | Lunch | |
| SESSION 7 | ||
| 1:20pm - 3:10pm | Keynote: Matt Briggs The Threat Environment Paper: Carl Pearson, Allaire Welk, William Boettcher, Roger Mayer, Sean Streck, Joseph Simons-Rudolph, and Christopher Mayhorn Difference in Trust Between Human and Automated Decision Aids Paper: Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer A Framework for Generation, Replay and Analysis of Real-World Attack Variants | |
| 3:10pm - 3:30pm | Ice Cream Social | |
 
    