IEEE ISI 2016 Table of Contents

Welcome Message from the Conference Co-Chairs ...... 2

Message from the Program Co-Chairs ...... 3

Keynote Speakers ...... 4

Conference Schedule at a Glance ...... 5

Detailed Program and Schedule ...... 6

Wednesday, September 28, 2016 ...... 6

Thursday, September 29, 2016 ...... 9

Friday, September 30, 2016 ...... 11

Invited Speakers and Panelists ...... 12

ISI 2016 Conference Organizers ...... 19

ISI 2016 Program Committee Members ...... 20

Conference and Local Information ...... 22

Wireless Network Access Instructions ...... 23

Map of Student Union ...... 24

Map of Campus and Hotels ...... 26

Conference Hosts and Sponsors ...... Back cover

1

IEEE ISI 2016 Welcome Message from the Conference Co-Chairs

We are extremely pleased to welcome you to the 2016 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2016), and to our beautiful campus here at The . Thank you very much for choosing to participate in IEEE ISI 2016. We hope that all of you will enjoy both the conference and your stay in Tucson, Arizona, USA.

IEEE ISI 2016 is the 14th event in the annual IEEE International ISI Conference series (http://www.isi-conf.org) started in 2003. The first two meetings were held in Tucson, Arizona; followed by meetings in Atlanta, Georgia; San Diego, California; New Brunswick, New Jersey; Taipei, Taiwan; Dallas, Texas; Vancouver, Canada; Beijing, China; Washington, DC; Seattle, Washington; the Hague, Netherlands; and Baltimore, Maryland. This event continues to be a unique venue, bringing together academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to present their work and discuss critical issues and views on cutting-edge ISI research and practice. ISI topics include information technologies, , computational criminology, public policy, bioinformatics, medical informatics, and social and behavior studies, as well as counterterrorism studies.

Over the past 13 years, the IEEE International ISI Conference has evolved from its traditional orientation of intelligence and security domain towards a more integrated alignment of multiple domains, including technology, humans, organization, and security. This year's conference theme is Cybersecurity and Big Data. Cybersecurity has become a major priority for businesses and organizations in all sectors. Big data analytics is offering new opportunities for an increased understanding of cybersecurity and ISI concerns.

The conference could not be a success without help from many people. Special thanks to all the authors and keynote and invited speakers and panelists for contributing to IEEE ISI 2016. We also express our sincere appreciation to the program chairs and the program committee members, our publication chair Dr. Alan Wang, our finance and local arrangements co-chairs Catherine A. Larson and Anji Siegel, our sponsorship co-chairs Drs. Paulo Goes and Matthew Hashim, and our student supporters from the University of Arizona for their active role in conference organization and logistical support. We would like to thank the host of the event, the University of Arizona, for their sponsorship and support. We are especially grateful to the IEEE Intelligent Transportation Systems Society, the National Science Foundation, the Office of the University of Arizona Vice President for Research, Eller College and Department of Management Information Systems at the University of Arizona, the Artificial Intelligence Lab at the University of Arizona, and Datalink for their financial support.

Hsinchun Chen, University of Arizona, USA Salim Hariri, University of Arizona, USA Bhavani Thuraisingham, University of Texas at Dallas, USA Daniel Zeng, University of Arizona, USA

Conference Co-Chairs

2

IEEE ISI 2016 Message from the Program Co-Chairs

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. ISI supports counterterrorism and homeland security’s missions of anticipation, prevention, preparedness and response to terrorist acts and other security events, in physical, cyber, enterprise, and societal spaces. The theme of the IEEE ISI 2016 is Cybersecurity and Big Data. In the past and present, the IEEE ISI conferences have provided an international forum for academic researchers, law enforcement and intelligence experts, and information technology consultants and practitioners to showcase their research and practices, and discuss their relevant ideas, experiences, and results on various topics about ISI. The ISI Conference series (http://www.isi-conf..org) was first started in Tucson, Arizona in 2003 and 2004. Sponsorship by the IEEE Intelligent Transportation Systems Society began with ISI 2005 and continues through the present. The ISI conference has also held many international events including the Pacific-Asian International Workshop on Intelligence and Security Informatics (PAISI) and the European Conference in Intelligence Security Informatics (EISIC), among others. ISI 2016 is hosted by the University of Arizona. The three-day conference program includes paper presentation sessions, keynote and invited speakers, panel discussions, a doctoral consortium, a poster session, workshops and special thematic sessions, and receptions and networking events. The conference proceedings of the ISI conference includes 33 long papers, 10 short papers, and 3 poster papers. These papers focus on four main areas: 1) cybersecurity analytics and threat intelligence, 2) data science and analytics in security informatics, 3) human behavior and factors in security applications, and 4) organizational, national, and international issues in counter-terrorism and other security applications. The proceedings also include 6 papers accepted by the Workshop on Big Data Analytics for Cybersecurity Computing, 8 papers accepted by the Workshop on Cybersecurity Education & Workforce, 3 papers accepted by the Workshop on Women in Cybersecurity, and 7 papers accepted by the Doctoral Consortium. We are grateful to the Program Committee members who provided high-quality and constructive review comments to help maintain the quality of the program. These members came from 27 different countries. We would like to express our gratitude to all authors for contributing their high-quality work to the program, and to session chairs and panel moderators for coordinating the exciting and interesting sessions. Our special thanks go to the publication chair, Dr. Alan Wang, who put forth much time and effort in preparing the proceedings. Our sincere gratitude goes to Drs. Hsinchun Chen, Salim Hariri, Bhavani Thuraisingham, and Daniel Zeng for their advice and leadership in the ISI Conference series.

Marielle den Hengst-Bruggeling Latifur Kahn Sidd Kaza Mark Patton ISI 2016 Program Co-Chairs

3 IEEE ISI 2016 Keynote Speakers

Plenary Keynote, Wednesday Ann Cox “DHS’s Internet Measurement and Attack Modeling Program” Dr. Ann Cox is Program Manager in the Cyber Security Division of the Homeland Security Advanced Research Projects Agency within the Science and Technology Directorate of the Department of Homeland Security (DHS). Dr. Cox manages the Internet Measurement and Attack Modeling project (IMAM), which seeks to solve national security threats related to cyberspace. Dr. Cox’s research focuses on Resilient Systems and Networks; Modeling of Internet Attacks; and Network Mapping and Measurement. Her research interests and related programs are in these areas. Prior to her work at DHS, Dr. Cox spent sixteen years at the National Security Agency (NSA) where she worked in the office of Weapons and Space before returning to research, focusing on network measurement projects. She provided leadership and technical direction for projects involving coordination with domestic and international technical experts from multiple government agencies, academic institutions, and private companies. Before coming to NSA, Dr. Cox taught full-time at Brigham Young University (BYU) for several years and was the owner and purchasing agent for a small business. She earned her Bachelor’s degree in Mathematics from BYU, Master’s degree in Mathematics from Idaho State University, Master’s degree in Computer Science from James Madison University, and her Ph.D. in Mathematics from Auburn University. Dr. Cox is the mother of six and grandmother of eleven. Dr. Cox is also a panelist for the Women in Cybersecurity panel Thursday afternoon.

Plenary Keynote, Wednesday Laretta Bickford “The Risk Management Framework and Big Data Requirements” Ms. Bickford is Director, Network Enterprise Technology Command (NETCOM) Cybersecurity at Fort Huachuca, Arizona. She has 20 years of experience in the information technology field including cybersecurity, database and applications development, service delivery and support, IT programming and budget, enterprise project management, enterprise capability implementation, information dissemination management, requirements development and management, and developmental and operational testing, all within the DOD and Army. Ms. Bickford graduated Summa Cum Laude from the University of Central Florida in 1998 with a Bachelor's degree in Accounting and an emphasis on accounting information systems. She earned her Master's degree in Information Systems from Western International University in 2003. Ms. Bickford is a certified Lean Six Sigma Black Belt, Certified Information Systems Security Professional, and Certified Authorization Professional.

Plenary Keynote, Thursday Dongwon Lee “NSF Funding Opportunities on Cybersecurity and Data Science” Dongwon Lee is a rotating program director at the National Science Foundation (NSF), currently co-managing cybersecurity education programs such as SFS and SaTC-EDU with a yearly budget of $50M. He is also a faculty member at Penn State University, currently on leave. He has published over 140 articles in competitive venues, researching broadly in Data Science, in particular, on the management and mining of data in diverse forms including structured records, text, multimedia, social media, and Web. He obtained his Ph.D. in Computer Science from UCLA in 2002. Dr. Lee will also be a panelist at the Doctoral Consortium.

Plenary Panel, Friday Security Analytics Panel ♦ Ahmed Abbasi, University of Virginia, IT/School of Commerce, “Socio-Technical Predictive Analytics for Cybersecurity: A People, Process, and Technology Perspective” ♦ Richard Frank, Simon Fraser University, Computational Criminology. “Illicit Payments for Illicit Goods – A study of Russian Online Drug Marketplaces” ♦ Paulo Shakarian, Arizona State University, School of Computing, Informatics and Decision Systems Engineering, “Reducing Risk in the Face of Adaptive Threats in Cyberspace” ♦ Beichuan Zhang, University of Arizona, Computer Science, “Internet Routing Security” ♦ Latifur Khan, University of Texas at Dallas, Computer Science, “Big Data Analytics in Cyber Security”

4 ISI 2016 Conference Schedule at a Glance Wednesday, September 28, 2016 Time Conference Event Location 7:30-8:30 am Registration and Breakfast North Ballroom 8:30-9:45 Plenary Session with Conference Opening. Speakers:Ann Cox South Ballroom (DHS), and Laretta Bickford (NETCOM) 9:45-10:40 Panel - Compliance & Infrastructure Building South Ballroom Panel - Security and Privacy Catalina Papers: Data Science & Analytics Rincon 10:40-10:50 Coffee Break North Ballroom 10:50-12:05 pm Panels - Dark Networks and Ideology, and Cyber Intelligence South Ballroom Papers: Threat Intelligence Catalina Papers: Big Data Analytics for Cybersecurity Rincon 12:05-1:05 Lunch North Ballroom 1:05-2:20 Panel - Information Sharing and Collaboration South Ballroom Papers: Data Science & Analytics Catalina Doctoral Consortium (starts at 1:00 pm) Rincon 2:20-2:30 Coffee Break North Ballroom 2:30-4:10 Papers: Policy and Behavioral Factors South Ballroom Papers: Threat Intelligence Catalina Doctoral Consortium continues Rincon 4:10-4:20 Coffee Break North Ballroom 4:20-5:50 Panel - Policy and Workforce Development South Ballroom Papers: Threat Intelligence Catalina Papers: Data Science & Analytics Rincon 6:00-8:00 pm Conference Reception and Networking Session Hall of Champions (see map) Thursday, September 29, 2016 7:30-8:30 am Registration and Breakfast North Ballroom 8:30-9:05 Plenary Session. Speaker: DongwonLee, National Science South Ballroom Foundation 9:05-10:45 Panel - Cybersecurity Education South Ballroom Papers: Big Data Analytics Catalina Capture the Flag Santa Rita 10:45-10:50 Coffee Break North Ballroom 10:50-12:30 pm Papers: Cybersecurity Education & Workforce South Ballroom Papers: Data Science and Analytics Catalina Capture the Flag continues Santa Rita 12:30-1:30 Lunch North Ballroom 1:30-2:30 Panel - Cybersecurity Challenges and Opportunities for Industy South Ballroom Papers: Cybersecurity Education & Workforce Catalina Capture the Flag continues Santa Rita 2:30-2:40 Coffee Break North Ballroom 2:40-4:10 Panel - Women in Cybersecurity South Ballroom Panel - Cybersecurity Deception Catalina Capture the Flag continues Santa Rita 4:10-5:10 Papers: Women in Cybersecurity South Ballroom Papers: Data Science & Analytics Catalina Capture the Flag continues Santa Rita 5:30-8:45 pm Reception, Poster Session and Awards (Board buses by 5:30 pm) Tanque Verde Guest Ranch Friday, September 30, 2016 7:30-8:30 am Registration and Breakfast North Ballroom 8:30-9:50 Panel - Data Infrastructure Building Blocks for ISI South Ballroom Papers: Data Science & Analytics Catalina 9:50-10:10 Coffee Break North Ballroom 10:10-12:00 Plenary Panel - Security Analytics South Ballroom 12:00 noon Conference Close and Grab and Go Lunch North Ballroom 12:00-2:00 pm Ad hoc Meetings North Ballroom, Catalina

5 ISI 2016 Conference Program Wednesday, September 28, 2016

7:30-8:30 BREAKFAST (North Ballroom)

PLENARY SESSION (South Ballroom) CONFERENCE OPENING: Kimberly Espy, University of Arizona Senior Vice-President for Research; Lisa Ordóñez, Vice Dean, Eller College of Management; Sue Brown, Interim MIS Department Head; Hsinchun Chen, Regents’ Session 1: Professor and Conference Chair 8:30-9:45 KEYNOTE SPEAKERS:

Session Chair: Hsinchun Chen

 Ann Cox, Program Manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS S&T. “DHS’’s Internet Measurement and Attack Modeling Program”  Laretta Bickford, Director of Cybersecurity for US Army NETCOM. “The Risk Management Framework and Big Data Requirements” A B C South Ballroom Catalina Rincon

Panel - Compliance & Infrastructure Panel - Security and Privacy Papers: Data Science & Building Analytics Moderator: Joe Valacich Moderator: Latifur Khan Session Chair: Marina Evangelou  Joe Valacich, University of  Tina Slankas, Cyber Security Arizona, MIS. “Validating Active Identifying the Socio-Spatial Program Coordinator for the City of Indicators for the Identification of Dynamics of Terrorist Attacks in the Session 2: Phoenix. “Cybersecurity During Insider Threats” Middle East (Ze Li, Duoyong Sun, 9:45-10:40 Super Bowl XLIX” Hsinchun Chen, and Shin-Ying  Laura Brandimarte, University of Huang)  Michael Foster, FBI, Tucson. Arizona, MIS. “How Does "Computer Network Exploitation Government Surveillance Affect Exploring the Online Underground (CNEs)" Perceived Online Security? Marketplaces through Topic-Based Preliminary Evidence from One Social Network and Clustering  Jason Denno, UA-South. “Cyber Year of Tweets” (Shin-Ying Huang and Hsinchun Virtual Learning Environment" Chen)  Matt Hashim, University of Arizona, MIS. “Human Exploits in Cybersecurity: A Social Engineering Study”

10:40-10:50 BREAK (North Ballroom) A B C South Ballroom Catalina Rincon

Panel - Dark Networks and Ideology Papers: Threat Intelligence Papers: Big Data Analytics for Moderator: Ahmed Abbasi Session Chair: Victor Benjamin Cybersecurity Session Chair: Xin Li  Al Bergesen, University of Arizona, Darknet and Deepnet Mining for Sociology. “The Theological Proactive Cybersecurity Threat Model-Based Clustering and New Foundations of the Lone Wolf Intelligence (Eric Nunes, Paulo Edge Modelling in Large Computer

Islamist Terrorist” Shakarian, Ahmad Diab, Ericsson Networks (Silvia Metelli and Nicholas Session 3: Marin, Andrew Gunn, Jana Shakarian, Heard) 10:50-12:05  Brint Milward, University of Arizona, John Robertson, Vivin Paliath, Government & Public Policy. “A Amanda Thart and Vineet Mishra) Automated Big Text Security Preliminary Theory of Dark Network Classification (Khudran Alzhrani, Resilience.” Exploring Key Hackers and Ethan Rudd, Terrance Boult and Cybersecurity Threats in Chinese Panel - Cyber Intelligence Edward Chow) Hacker Communities (Zhen Fang,  John Matherly, Shodan. Xinyi Zhao, Qiang Wei, Guoqing Near Real-time Atrocity Event Coding “Conversations with Your Chen, Yong Zhang, Chunxiao Xing, (Mohiuddin Solaimani, Sayeed Refrigerator” Weifeng Li and Hsinchun Chen) Salam, Latifur Khan, Patrick Brandt, Bhavani Thuraisingham and Ahmad  Christian Schreiber, FireEye. Mining Hospital Data Breach Records: Mustafa) “Finding the RIGHT Needle in a Emerging Cyber Threats to U.S.

Field of Big Data Haystacks” Hospitals (Travis Floyd, Matthew Grieco and Edna Reid)

6 Wednesday, September 28, 2016, cont.

12:05-1:05 LUNCH (North Ballroom)

A B C

South Ballroom Catalina Rincon

Panel - Information Sharing and Papers: Data Science and Doctoral Consortium Collaboration Analytics Starts at 1:00 pm Moderator: Mark Patton Session Chair: Mandy Dang Facilitators: Chris Yang and Richard  Julie Dunn, National Cyber- Measuring Online Affects in a White Frank Forensics & Training Alliance. Supremacy Forum (Léo Figea, Lisa Oral Presentations (1:00-2:45 pm) Session 4: “NCFTA’s Malware Portal and Kaati and Ryan Scrivens) Internet Fraud Alert System"  Approaches to Understanding the 1:05-2:20 Automatic Detection of Xenophobic Motivations Behind Cyber Attacks  Frank Grimmelmann, Arizona Cyber Narratives: A Case Study on (Sumeet Kumar, Carnegie Mellon Threat Response Alliance. Swedish Alternative Media (Lisa University) Kaati, Amendra Shrestha, Katie “Cybersecurity’s Human Factor in  Modeling Cyber-Attacks on Industrial Cohen and Sinna Lindquist) Operationalizing Threat Control Systems (Vivin Palliate, Intelligence" Identifying Features for Detecting Arizona State University)  Brett L. Scott, Arizona Cyber Fraudulent Loan Requests on P2P  Using Social Network Analysis to Warfare Range. "The Bad Guys Platforms (Jennifer Xu, Dongyu Chen Identify Key Hackers for Keylogging Collaborate to Clobber You. Why and Michael Chau) Tools in Hacker Forums (Sagar Aren’t You Collaborating?" Samtani, University of Arizona)  Targeting Key Data Breach Services in Underground Supply Chain (Weifeng Li, University of Arizona) 2:20-2:30 BREAK  Soft Computing and Hybrid Intelligence for Decision Support in A B Forensics Science (Andrii Shalaginov, Norwegian University of South Ballroom Catalina Science and Technology)  Detecting Radicalization Trajectories Papers: Policy & Behavioral Papers: Threat Intelligence Using Graph Pattern Matching Factors Algorithms (Benjamin Hung, Session Chair: Patrick Rubin-Delanchy Colorado State University) Session Chair: Sunita Moonka Using Cyber Defense Exercises to The Impact of US Cyber Policies on Obtain Additional Data for Attacker Mentoring session (for selected Cyber-Attacks Trend (Sumeet Kumar, Profiling (Joel Brynielsson, Ulrik doctoral students only) (2:45 - 3:10 Matthew Benigni and Kathleen Franke, Muhammad Adnan Tariq and pm) Carley) Stefan Varga) Session 5: Panel - How to Prepare for a Career Rights Management to Enable a True PhishMonger: A Free and Open 2:30-4:10 in ISI as a Doctoral Internet of Things (Robert Newman, Source Public Archive of Real-World Student (3:10-4:10 pm) Pat Doody, Mira Trebar and Uchenna Phishing Websites (David Dobolyi and Okeke) Ahmed Abbasi) Moderator: Chris Yang Trust and Distrust as Distinct Topic Modelling of Authentication Panelists: Constructs: Evidence from Data Theft Events in an Enterprise Computer  Hsinchun Chen, University of Environments (Steven Simon) Network (Nick Heard, Konstantina Arizona Palla and Maria Skoularidou) (Short Phishing Susceptibility: The Good, the Paper)  Lisa Daniels, KPMG Bad, and the Ugly (Ahmed Abbasi and Mariam Zahedi) SCADA Honeypots: An In-depth  Dongwon Lee, National Science Analysis of Conpot (Arthur Jicha, Mark Foundation Patton and Hsinchun Chen) (Short  Richard Frank, Simon Fraser Paper) University

7 Wednesday, September 28, 2016, cont.

4:10-4:20 BREAK (North Ballroom)

A B C

South Ballroom Catalina Rincon

Panel - Policy and Workforce Papers: Threat Intelligence Papers: Data Science & Analytics Development Session Chair: Gavin Zhang Session Chair: Xiao Liu Moderator: Siddharth Kaza AZSecure Hacker Assets Portal: Effective Prioritization of Network  Seymour Goodman, Georgia Tech, Cyber Threat Intelligence and Intrusion Alerts to Enhance Situational Sam Nunn School of International Malware Analysis (Sagar Samtani, Awareness (Allison Newcomb, Robert Affairs and College of Computing. Kory Chinn, Cathy Larson and Hammell and Steve Hutchinson) “Critical Infrastructures and Their Hsinchun Chen) Surfacing Collaborated Networks in Well Being” Session 6: Identifying SCADA Vulnerabilities Dark Web to Find Illicit and Criminal 4:20-5:50  Derek Bambauer, University of Using Passive and Active Content (Ahmed Zulkarnine, Richard Arizona, Law, and David Thaw, Vulnerability Assessment Techniques Frank, Bryan Monk, Julianna Mitchell University of , Law and (Sagar Samtani, Shuo Yu, Hongyi and Garth Davies) Information Sciences, “Does Zhu, Mark Patton and Hsinchun Identifying Language Groups within Cybersecurity Need More Law?” Chen) Multilingual Cybercriminal Forums  Will Foster, University of Arizona Product Offerings in Malicious Hacker (Victor Benjamin and Hsinchun Chen) South. “Why US-China Markets (Ericsson Marin, Ahmad (Short Paper) Cyber-relations Should Diab and Paulo Shakarian) (Short Paper) Poisson Factorization for Peer-Based Be Part of the Cyber-security Anomaly Detection (Melissa Turcotte, Curriculum” Identifying Devices across the IPv4 Juston Moore, Nicholas Heard and  Linda Denno, University of Arizona Address Space (Ryan Jicha, Mark Aaron McPhall) (Short Paper) South, Government and Public Patton, and Hsinchun Chen) (Short Service. “U.S. Cyber Deterrence Paper) Policy”

6:00-8:00p ALL-CONFERENCE RECEPTION (Hall of Champions)

8 Thursday, September 29, 2016

7:30-8:30 BREAKFAST (North Ballroom)

PLENARY SESSION (South Ballroom) Session 1: 8:30-9:05 PLENARY SPEAKER: Dongwon Lee, NSF, EHR/DGE, SaTC/SFS. "NSF Funding Opportunities on Cybersecurity and Data Science". Session Chair: Hsinchun Chen

A B C

South Ballroom Catalina Santa Rita

Panel - Cybersecurity Education Papers: Big Data Analytics Capture the Flag Moderator: Seymour Goodman Session Chair: Uwe Glaesser Facilitators:  Balaji Padmanabhan, University of South Florida, Network-Wide Anomaly Detection via the Eric Case Information Systems Decision Sciences. “A Dirichlet Process (Nick Heard and Patrick and Mark Multidisciplinary Approach to Academic Rubin-Delanchy) (Short Paper) Patton Cybersecurity Programs at USF” Parallel Massive Data Monitoring and Processing |  Roberto Mejias, Colorado State University-Pueblo, Using Sensor Networks (Hamid Reza Naji and CIS and Director of the Center for Cyber Security Najmeh Rezaee) (Short Paper) | Session 2: Education and Research. “Issues, Challenges and Understanding DDoS Cyber-Attacks using Social | 9:05-10:45 Helpful Hints for the New & Rigorous NSA-CAE/CDE Media Analytics (Sumeet Kumar and Kathleen Designation Application Process” | Carley) (Short Paper) |  Sidd Kaza, Towson University, Computer and IoT Security Development Framework for Information Sciences. “Cybersecurity Education: Building Trustworthy Smart Car Services | Current Curricular Efforts, Resources, and Some (Jesus Horacio Pacheco Ramirez, Salim Hariri, | Open Questions” Shalaka Satam, Clarisa Grijalva and Helena  Bill Neumann, University of Arizona, MIS. “Integrating Berkenbrock) (Short Paper) | Security Awareness into the Undergraduate Disassortativity of Computer Networks (Patrick | Business Curriculum” Rubin-Delanchy, Niall Adams and Nicholas |  Mark Patton, University of Arizona, MIS. “Integrating Heard) (Short Paper) Research with Education throughout the Master’s | Degree Program: Challenges and Opportunities” |

10:45-10:50 BREAK (North Ballroom) A B C South Ballroom Catalina Santa Rita

Papers: Cybersecurity Education & Workforce Papers: Data Science and Analytics Capture Session Chair: Roberto Mejías Session Chair: Jennifer Xie Xu the Flag continues An Undergraduate Cyber Operations Curriculum in the Bayesian Nonparametric Relational Learning | Making: A 10+ Year Report (Shiva Azadegan and with the Broken Tree Process (Justin Sahs) Michael O'Leary) (Short Paper) | Predictability of NetFlow Data (Marina Evangelou Session 3: Engaging Females in Cybersecurity: K through Gray and Niall Adams) | 10:50-12:30 (Xiang Liu and Diane Murphy) (Short Paper) Shodan Visualized (Vincent Ercolani, Mark | Using Eye-tracking to Investigate Content Skipping: A Patton and Hsinchun Chen) (Short Paper) Study on Learning Modules in Cybersecurity (Sagar | Raina, Leon Bernard, Blair Taylor and Siddharth Kaza) Activity-Based Temporal Anomaly Detection in (Short Paper) Enterprise-Cybersecurity (Mark Whitehouse, | Cybersecurity Workforce Development: A Peer Marina Evangelou and Niall Adams) (Short | Paper) Mentoring Approach (Vandana Janeja, Carolyn | Seaman, Kerrie Kephart, Aryya Gangopadhyay and Amy Everhart) (Short Paper) | Design and Implementation of a Multi-Facet | Hierarchical Cybersecurity Education Framework (Wei Wei, Arti Mann, Kewei Sha and Andrew Yang) | (Short Paper)

9 Thursday, September 29, 2016, cont.

12:30-1:30 LUNCH (North Ballroom)

A B C

South Ballroom Catalina Santa Rita

Panel - Cybersecurity Challenges and Papers: Cybersecurity Education & Workforce Capture Opportunities for Industy the Flag Session Chair: Siddharth Kaza continues Moderator: Matt Hashim Smart Augmented-Reality Glasses in Cybersecurity |  Joshua Neil, Ph.D., Ernst & Young, Security and Forensic Education (Nikitha Kommera, Faisal | Session 4: Analytics | Advanced Security Center. “Data Kaleem and Syed Mubashir Shah Harooni) (Short 1:30-2:30 Science in Industry Cyber Security: Using Rarity Paper) | to Detect Lateral, Reconnaissance and Data Staging Behaviors” CySCom: CyberSecurity COMics (Brian Ledbetter, | Zach Wallace, Adam Harms and Ambareen Siraj)  Lisa Daniels, Managing Partner, KPMG LLP. “The (Short Paper) | Consumer Loss Barometer” Challenges, Lessons Learned and Results from |  Jason Rader, National Director for IT Security, Establishing a CyberCorps: Scholarship for Service | Datalink. “Current State of Cybersecurity; How to Program Targeting Undergraduate Students (Shiva Stay Safe?” Azadegan, Josh Dehlinger, Siddharth Kaza, Blair | Taylor and Wei Yu) (Short Paper)

2:30-2:40 BREAK (North Ballroom)

A B C

South Ballroom Catalina Santa Rita

Panel - Women in Cybersecurity: A Day in the Panel - Cybersecurity Deception: Toward the Capture Life. Each panelist will address questions relating Development of a Theory That Focuses on the the Flag to “a day in the life” of a cybersecurity professional Cognitive Process continues from a professional and personal perspective. Moderator: Jay Nunamaker | Moderator: Gondy Leroy Panelists: Session 5: | Panelists:  Julian Rrushi, Western Washington University, 2:40-4:10  Ann Cox, DHS - Agency Computer Science |  Lisa Daniels, KPMG - Industry  Judee Burgoon, University of Arizona Director |  Edna Reid, James Madison University - of Research, Center for the Management of Academia Information |  Ambareen Siraj, Tennessee Technical | University - Academia  Tina Slankas, City of Phoenix - Local | government | | Papers: Women in Cybersecurity Papers: Data Science & Analytics | Session Chair: Yilu Zhou Session Chair: Balaji Padmanabhan | Intruder Detector: A Continuous Authentication Tool A Non-Parametric Learning Approach to Identify to Model User Behavior (Leslie Milton and Atif Online Human Trafficking (Hamidreza Alvari, | Session 6: Memon) (Short Paper) Paulo Shakarian and Kelly Snyder) | 4:10-5:10 An Immune inspired Unsupervised Intrusion Discovering Structure in Islamist Postings Using | Detection System for Detection of Novel Attacks Systemic Nets (Nasser Alsadhan and David (Manjari Jha and Raj Acharya) (Short Paper) Skillicorn) | Automatic Clustering of Malware Variants (Rima Asmar and Kirk Sayre) (Short Paper)

5:30-6:00 Board Mountain View Buses and Travel to Tanque Verde Guest Ranch 6:00-8:15 ALL CONFERENCE POSTER SESSION, RECEPTION, AND AWARDS CEREMONY 8:15-8:45 Return to Hotels and Campus

10 Friday, September 30, 2016

7:30-8:30 BREAKFAST (North Ballroom)

A B

South Ballroom Catalina

Panel - Datainfrastructure Building Blocks for Papers: Data Science & Analytics Intelligence and Security Informatics Session Chair: Daniel Zeng Moderator: Paul Hu Social Media Account Linkage Using User-Generated  Ahmed Abbasi, University of Virginia, IT/School of Geo-location Data (Xiaohui Han, Lianhai Wang, Lijuan Xu Session 1: Commerce. “ISI Research: Data Collection Is Half and Shuihui Zhang) 8:30-9:50 the Battle” Chinese Underground Market Jargon Analysis Based on  Resha Shenandoah, University of Arizona, School of Unsupervised Learning (Kangzhi Zhao, Yong Zhang, Information. “What Am I Doing Here? And Why I Want Chunxiao Xing, Weifeng Li and Hsinchun Chen) Your Data.” Activity Monitoring Using Topic Models (Boshra Nabaei  Paul Hu, University of Utah, Operations and and Martin Ester) Information Systems. “Data Infrastructure Building Blocks for Intelligence and Security Informatics: Community Outreach/Building and Evaluation Studies”

9:50-10:10 BREAK (North Ballroom)

PLENARY SESSION (South Ballroom)

Plenary Panel - Security Analytics Moderator: Daniel Zeng

Session 2:  Ahmed Abbasi, University of Virginia, IT/School of Commerce, “Socio-Technical Predictive Analytics for 10:10-12:00 Cybersecurity: A People, Process, and Technology Perspective”  Richard Frank, Simon Fraser University, Computational Criminology. “Illicit Payments for Illicit Goods – A Study of Russian Online Drug Marketplaces”

 Paulo Shakarian, Arizona State University, School of Computing, Informatics and Decision Systems Engineering, “Reducing Risk in the Face of Adaptive Threats in Cyberspace”  Beichuan Zhang, University of Arizona, Computer Science, “Internet Routing Security”  Latifur Khan, University of Texas at Dallas, Computer Science, “Big Data Analytics in Cyber Security”

12:00 noon Conference Close and Grab and Go Lunch

12:00 - 2:00 Additional Ad hoc Meetings

11 IEEE ISI 2016 Invited Speakers and Panelists

Ahmed Abbasi “Socio-Technical Predictive Analytics for Cybersecurity: A People, Process, and Technology Perspective” and “ISI Research: Data Collection is Half the Battle” Ahmed Abbasi is Murray Research Professor, Associate Professor of IT, and Director of the Center for Business Analytics at the University of Virginia. Dr. Abbasi's research interests relate to predictive analytics, with applications in online fraud and security, text mining, health, and social media. He has published over 60 peer-reviewed articles in top journals and conferences. His projects on cybersecurity, Internet fraud, and social media analytics have been funded by the National Science Foundation. He has also received the IBM Faculty Award and AWS Research Grant for his work on “big data.” Dr. Abbasi has presented his work at several national and international conferences and has won best paper awards from MIS Quarterly, the Association for Information Systems (AIS), and the Workshop on Information Technologies and Systems. Dr. Abbasi serves as an associate editor for ACM TMIS, IEEE Intelligent Systems, Information Systems Research, and Decision Sciences. His work has been featured in several media outlets, including The Wall Street Journal, the Associated Press, and Fox News. He has also co-founded and/or served on the advisory board for multiple predictive analytics-related companies.

Derek Bambauer “Does Cybersecurity Need More Law?” Derek Bambauer is Professor of Law at the University of Arizona, where he teaches Internet law and intellectual property. His research treats Internet censorship, cybersecurity, and intellectual property. He has also written technical articles on data recovery and fault tolerance, and on deployment of software upgrades. A former principal systems engineer at Lotus Development Corp. (part of IBM), Professor Bambauer spent two years as a Research Fellow at the Berkman Center for Internet & Society at Harvard Law School. At the Berkman Center, he was a member of the OpenNet Initiative, an academic consortium that tested and studied Internet censorship in countries such as China, Iran, and Vietnam. He is one of the authors of Info/Law, a popular blog that addresses Internet law, intellectual property, and information law. He holds an A.B. from Harvard College and a J.D. from Harvard Law School.

Albert J. Bergesen “The Theological Foundations of the Lone Wolf Islamist Terrorist” Albert J. Bergesen is Professor and Director, School of Sociology, University of Arizona. He has been a Visiting Professor at Stanford and the Naval Postgraduate School. His research centers on the theological foundations of the global jihad with a particular emphasis upon the cultural/cognitive templates of lone wolf Islamist terrorists. Professor Bergesen has written numerous research articles on terrorism and political violence, edited a special issue of the social science journal Mobilization on quantitative terrorism research, and brought out the first collection of writings by Sayyid Qutd, the most quoted modern Islamist theorist on jihadi websites, The Sayyid Qutb Reader: Selected Writings on Politics, Religion, and Society, New York: Routledge. He was also an Honorable Mention for the Gordon Allport Intergroup Relations Prize given by the American Psychological Association, and has twice won the Distinguished Article in Sociological Perspectives Award from the Pacific Sociological Association.

Laura Brandimarte “How Does Government Surveillance Affect Perceived Online Security? Preliminary Evidence from One Year of Tweets” Laura Brandimarte is an Assistant Professor in the Management Information Systems Department at the Eller College of Management, University of Arizona. After completing undergraduate studies in Economics at La Sapienza University in Rome, Italy, she obtained her Master in Economics at the London School of Economics and Political Science, and her Ph.D. in Public Policy and Management at the H. John Heinz III College, Carnegie Mellon University, where she also completed a two-year Post-doc. Her research focuses on the behavioral aspects of privacy, including how people make decisions on what to disclose and what not to disclose; what factors, both normative and non-normative, affect privacy decision making; and what the consequences are of disclosing personal information, especially on social media. She has published in academic journals such as Science and Social Psychological and Personality Science, and her work has been covered by several media outlets, including the New York Times and the Pacific Standard Magazine. At the Eller College, she teaches the Lab portion of MIS 111, Computers & Internetworked Society, and MIS 411/511, an elective course on Social and Ethical Issues of the Internet. Prior to joining academia, she worked at the European Investment Bank in Luxembourg and the Deposits Guarantee Fund for Cooperative Banks in Rome, Italy.

Judee Burgoon “Cybersecurity Deception: Toward the Development of a Theory that Focuses on the Cognitive Process” Judee Burgoon is Professor of Communication, Family Studies and Human Development. She is the Director of Research for the Center for the Management of Information and Site Director for the NSF-sponsored Center for Identification Technology Research at the University of Arizona. She holds a doctorate from West Virginia University in communication and educational psychology. She has held positions previously at the , Michigan State University, and Louis Harris and Associates (New York, NY), as well as visiting positions at 12 and University of Oklahoma. Professor Burgoon has authored or edited 14 books and monographs and over 300 articles, chapters and reviews related to nonverbal and relational communication, interpersonal relationships, the impact of new communication technologies on human-human and human-computer interaction, research methods, and public opinion toward the media. Her research, which currently centers on deception, trust, interpersonal interaction, and new technologies, has been supported by extramural funding from the National Science Foundation, the Department of Defense, the Department of Homeland Security, the National Center for Credibility Assessment, the National Institutes of Mental Health, Gannett Foundation, Gannett Co., Inc., and Associated Press Managing Editors, among others.

Hsinchun Chen Conference Co-Chair and Doctoral Consortium Dr. Hsinchun Chen is Regents’ Professor and Thomas R. Brown Chair in Management and Technology in the Management Information Systems (MIS) Department and Professor of Entrepreneurship and Innovation in the McGuire Center for Entrepreneurship at the Eller College of Management at the University of Arizona. He received the B.S. degree from the National Chiao-Tung University in Taiwan, the MBA degree from SUNY Buffalo, and the Ph.D. degree in Information Systems from New York University. Dr. Chen is the founder and director of the Artificial Intelligence Lab and has served as a faculty member of the UA MIS department (ranked #3 in MIS) since 1989. In 2014-2015, he also served as the lead program director for the National Science Foundation's program in Smart and Connected Health. He has also served as a Scientific Counselor/Advisor of the National Library of Medicine (USA), Academia Sinica (Taiwan), and National Library of China (China). Dr. Chen is a Fellow of IEEE, ACM, and AAAS. He received the IEEE Computer Society 2006 Technical Achievement Award, the 2008 INFORMS Design Science Award, the MIS Quarterly 2010 Best Paper Award, the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics, and the UA 2013 Technology Innovation Award. He was also a finalist for the AZ Tech Council’s Governor’s Innovation of the Year Award in 2011 and named in the Arizona Centennial Top 100 Scientists in 2012. He is the author/editor of 20 books, 25 book chapters, 280 SCI journal articles, and 150 refereed conference articles covering cybersecurity, intelligence and security informatics, Web computing, data/text/web mining, search engines, digital library, biomedical informatics, and knowledge management.

Lisa Daniels “Consumer Loss Barometer,” Doctoral Consortium, and Women in Cybersecurity Lisa Daniels is Managing Partner of the Arizona Practice of KPMG and a Risk Consulting partner with more than 25 years of professional experience. She has an extensive background assisting global organizations with identification, understanding, measurement, and reporting of business and technology related risks. Since taking over as Managing Partner in 2011, the Phoenix office of KPMG has been recognized as one of the 100 Best Companies in Arizona as well as a Top 25 Workplace for Women and honored with the Alfred P. Sloan Award for Excellence in Workplace Effectiveness and Flexibility. Most recently Lisa was recognized by AZBusiness Magazine’s inaugural list of the “50 Most Influential Women in Arizona Business” and the Arizona Republic’s “Who’s Who” list. Lisa speaks regularly to industry organizations on leading practices over topics such as assessing and managing enterprise risks and information security. Additionally she has published several articles including “The Changing Role of the CFO,” “Women in Accounting,” “Identity and Access Management,” and “Globalization of Middle Market Companies.” Lisa serves on various industry and not for profit boards and committees including Greater Phoenix Leadership, ID Theft Advisory Board, Musical Instrument Museum, Read On Arizona Literacy Leadership Council, and the Young Presidents Organization.

Jason Denno “Cyber Virtual Learning Environment” Jason Denno is currently the Director of Cyber Operations Program Development at the University of Arizona, South. Mr. Denno’s experience in cyber security and operations includes over twenty years of designing, developing, deploying, and operating intelligence and cyber systems across the globe. His professional experience includes Chief Information Security Officer and Director of Cyber Programs for Tucson Embedded Systems; Vice President of Advanced Solutions for SAIC/Leidos; Director of the Battle Command Battle Lab for Fort Huachuca; and the Intelligence Operations and Requirements Officer for the Deputy Chief of Staff for Intelligence, US Army Europe. In addition to multiple GIAC certifications in Cyber Operations, Mr. Denno possesses a BA in Political Science and an MBA, and is completing an advanced degree in Cyber Operations from Utica University.

Linda Denno “U.S. Cyber Deterrence Policy” Linda Denno received her Ph.D. in Political Science from the University of California, Davis; her M.A. in Government from the Claremont Graduate School; and her B.A. in Political Science from California State University. Her university teaching career includes courses in American politics and institutions, political philosophy, constitutional law, and national security studies taught at the University of California, the State University of New York (SUNY), and California State University. Professor Denno is currently a faculty member and administrator at the University of Arizona South, where she teaches courses in constitutional law, cyber ethics, American politics, and political philosophy. She is also a curriculum development specialist in Academic Affairs, directs the UA South Bachelor of Applied Sciences core programs, and is program director for the Cyber Operations and the Administration of Justice Bachelor of Applied Sciences programs.

13 Julie Dunn “NCFTA's Malware Portal and Internet Fraud Alert System” Julie Dunn is an Intelligence Team Lead for the Brand and Consumer Protection (BCP) Program for the National Cyber-Forensics and Training Alliance (NCFTA). In her current role, Julie is responsible for identification and execution of new tools, resources, processes, and relationships at the NCFTA to aid intelligence analysts with their cyber crime investigations. This includes developing training and new use cases for open source tools and datasets as well as vendor analysis products. As an analyst, Julie has worked on investigations involving counterfeit products and online pharmaceutical websites. Prior to her career with the NCFTA, Julie received her B.S.B.A at West Virginia University for Management Information Systems.

Michael Foster “Computer Network Exploitation (CNEs)” Special Agent Foster has been with the Federal Bureau of Investigation for 6 years primarily investigating Counterintelligence matters with a cyber nexus. SA Foster also manages the Southern Arizona’s FBI Academic Alliance program aimed at increasing communication and understandings for both academic and law enforcement perspectives. All of which is helping universities to take proactive steps to better protect their institutions and the FBI to develop new strategies to keep Americans safe while remaining sensitive to unique concerns and cultures in academic settings.

Will Foster “Why US-China Cyber-relations Should Be Part of the Cyber-security Curriculum” William Foster is managing partner of Foster and Brahm, a management consulting firm that has been at the convergence of governance and technology for 25 years. Professor Foster has also taught at Arizona State University, Georgia Tech, Emory Goizueta Business School, and University of Arizona South. Dr. Foster's Ph.D. dissertation on "The Diffusion of the Internet in China" (with Sy Goodman) was published by CISAC at Stanford University in 2001. Dr. Foster, as a graduate student, was a member of the University of Arizona's MOSAIC Group which helped create the field of international MIS. At the same time, for 6 years, he was the government person for CIX, the world's first ISP trade association. Before that he designed networks for some of the world's largest corporations, as well as the US Congress, EOP, and over 20 Federal agencies (many in the intelligence field). William has a Bachelors degree from Williams College (1982). Because his father worked for CDC, he grew up in Africa and Asia. He can be contacted at [email protected].

Richard Frank “Illicit Payments for Illicit Goods-A Study of Russian Online Drug Marketplaces” and Doctoral Consortium Richard Frank completed a Ph.D. in Computing Science and another Ph.D. in Criminology at Simon Fraser University. Dr. Frank's main research interest is Computational Criminology - the application of computer solutions to model or solve crime problems. CyberCrime is another area where his two domains mix. Specifically he's interested in hackers and security issues, such as online terrorism and warfare. Dr. Frank has recent publications at top-level data mining outlets such as Knowledge Discovery in Databases, and security conferences such as Intelligence and Security Informatics.

Seymour (Sy) Goodman “Critical Infrastructures and Their Well-Being” Dr. Seymour Goodman is Regents Professor and Professor of International Affairs and Computing at the Georgia Institute of Technology, and a National Affiliate of the National Research Council of the National Academies of Science, Engineering and Medicine. Before coming to Georgia Tech, he was director of the Consortium on Research on Information Security and Policy at the Center for International Security and Cooperation at Stanford University, and director of the MOSAIC Group in the MIS Department at the University of Arizona. Professor Goodman was an undergraduate at Columbia University and earned his Ph.D. from the California Institute of Technology.

Frank Grimmelmann “Cybersecurity’s Human Factor in Operationalizing Threat Intelligence” Frank J. Grimmelmann is President & CEO/Intelligence Liaison Officer for the non‐profit Arizona Cyber Threat Response Alliance ("ACTRA"), independent of but closely affiliated with the FBI's AZ Infragard Program. In this capacity, Mr. Grimmelmann represents the private sector in the Arizona Counterterrorism Information Center ("ACTIC"), and is the first private sector representative on its Executive Board. ACTRA’s Members include both public and private sector organizations. He also serves as the private sector cyber intelligence liaison to the FBI, the ACTIC, and the FBI's Arizona Infragard Program. ACTRA's focus is to enable private/public sector Member Organizations to empower themselves to respond to the escalating national cyber threat, and to leverage Infragard's vast private sector volunteer membership as a force multiplier in protecting our Nation's critical infrastructure and National Security interests. Mr. Grimmelmann was recently appointed as the National Co-Chair for the recently formed Information Sharing & Analysis Organization Standards Organization’s (ISAO SO) ISAO Creation Workgroup, created under the President’s Executive Order 13691. He also serves on ASU’s Center for Emergency Management and Homeland Security Advisory Board, on the Estrella Mountain Community College Cybersecurity Advisory Committee, on Grand Canyon University’s President’s STEM Advisory Board, on the Arizona Technology Council Cybersecurity Committee, on the Greater Phoenix Chamber of Commerce’s Advanced Business and Finance Council, and as a Phoenix Rotary 100 Member.

14 Matthew J. Hashim “Human Exploits in Cybersecurity: A Social Engineering Study” Matthew J. Hashim is an assistant professor of Management Information Systems in the Eller College of Management, University of Arizona. He received his Ph.D. in Management with a specialization in Management Information Systems from the Krannert School of Management at . His research interests include applying experimental and behavioral economics methods to information systems problems. He is pursuing projects dealing with behavioral aspects of information goods, digital piracy, digital privacy, social engineering, management of information security, and electronic commerce strategy. Hashim has published his work in Journal of Management Information Systems (JMIS) and Information Systems Research (ISR), and he has presented his research at major conferences and workshops such as the Workshop on Information Systems and Economics (WISE), the Workshop on the Economics of Information Security (WEIS), Conference on Information Systems and Technology (CIST), Hawaii International Conference on Systems Sciences (HICSS), INFORMS, and the North American Economic Science Association.

Paul Hu “Data Infrastructure Building Blocks for Intelligence and Security Informatics: Community Outreach/Building and Evaluation Studies” Paul Jen-Hwa Hu is David Eccles Chair Professor at the David Eccles School of Business, the University of Utah. He received his Ph.D. in management information systems from the University of Arizona. His current research interests include evaluations and user impacts, information technology in health care, electronic commerce, digital government, technology implementation management, knowledge management, and technology-mediated learning. Hu has published (including forthcoming) in Management Information Systems Quarterly, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems, Decision Sciences, Journal of Information Systems (AAA), Decision Support Systems, Information Systems Journa, Communications of the ACM; ACM Transactions on Management Information Systems, IEEE Transactions on Information Technology in Biomedicine, IEEE Transactions on Systems, Man and Cybernetics, IEEE Transactions on Engineering Management, IEEE Intelligent Systems, IEEE Software, Journal of the American Society for Information Science and Technology, European Journal of Information Systems, Journal of Service Research, Journal of Business Research, Artificial Intelligence in Medicine, and Journal of Telemedicine and Telecare.

Siddharth Kaza “Cybersecurity Education: Current Curricular Efforts, Resources, and Some Open Questions” Dr. Siddharth Kaza is an Associate Professor in the Computer and Information Sciences Department at Towson University. He received his Ph.D. degree in Management Information Systems from the University of Arizona. His interests lie in cybersecurity education, data mining, and application development and he is a principal investigator on several cybersecurity education projects. He is also on the ACM Joint Task Force on Cybersecurity Education. Dr. Kaza’s work has been published in top-tier journals including Decision Support Systems, IEEE Transactions, ACM Transactions, Journal of the American Society for Information Science and Technology, and various international conferences. His work has been been funded by the National Science Foundation, Department of Defense, and the Maryland Higher Education Commission.

Latifur Khan “Big Data Analytics in Cyber Security” Dr. Latifur Khan is currently a full Professor (tenured) in the Computer Science department at the University of Texas at Dallas where he has been teaching and conducting research since September 2000. He received his Ph.D. degree in Computer Science from the University of Southern California in August of 2000. Dr. Khan is an ACM Distinguished Scientist. He has received prestigious awards including the IEEE Technical Achievement Award for Intelligence and Security Informatics. Dr. Khan has published over 200 papers in prestigious journals, and in peer reviewed conference proceedings. Currently, his research area focuses on big data management and analytics, data mining, complex data management including geo-spatial data and multimedia data. More details can be found at http://www.utdallas.edu/~lkhan/.

John Matherly “Conversations with Your Refrigerator” John Matherly is an Internet cartographer, speaker, and founder of Shodan, the world’s first search engine for the Internet-connected devices. He graduated with a B.S. in Bioengineering from University of California: San Diego and worked at the San Diego Supercomputer Center before launching Shodan. For the past years, he has been featured in the news on CNBC, CNN Money, Bloomberg, Washington Post, Forbes, Time and many others.

Roberto Mejias “Issues, Challenges & Helpful Hints for the New & Rigorous NSA-CAE/CDE Designation Application Process” Dr. Mejias is a faculty member in the Department of CIS and Director of the Center for Cyber Security Education and Research (CCSER) at Colorado State University-Pueblo. He received his Ph.D. in MIS from the University of Arizona. His research interests include cyber security, threat vulnerability assessment, cyber risk management, cyber-terrorism, and cyber risk mitigation strategies. Dr. Mejias has published his research in Journal of Information Privacy and Security, Journal of Management Information Systems, Communications of the ACM, and the International Journal of Human Computer Interaction, among others. Dr. Mejias is also the faculty mentor and coach

15 for CSU-P’s National Cyber League (NCL) competition which provides cyber security challenges for Cyber Security students in the areas of open source intelligence, scanning, vulnerability analysis, network traffic analysis, password and hash cracking, steganography, wireless security exploits and cryptography. Prior to joining CSU-Pueblo, Dr. Mejias was a faculty member for University of Oklahoma, Purdue University, , the University of Arizona, and Arizona State University. Dr. Mejias has received over 16 teaching excellence awards. Before joining academia, Dr. Mejias worked 10 years for the IBM Corporation as an Industrial Engineer, Manufacturing Support Engineer, and Time Motion Engineer. Dr. Mejias is a 4th generation Arizonan from a pioneer Spanish and Mexican family from Tucson.

Brint Milward “A Preliminary Theory of Dark Network Resilience” Brint Milward is the Director of the School of Government and Public Policy at the University of Arizona. He holds the Providence Service Corporation Chair in Public Management. He was Director of the National Institute for Civil Discourse, which is co-chaired by President George Herbert Walker Bush and President Bill Clinton. He has been elected president of two national associations in his field. He is a Fellow of the National Academy of Public Administration and in 2010 won the NASPAA/ASPA Distinguished Research Award. Milward's research interests revolve around networks and collaboration. For over thirty years he has focused his work on understanding how to efficiently and effectively manage networks of organizations that jointly produce public services like health and human services. He has conducted studies of what happens when governments privatize public services, which he terms "governing the hollow state." In addition, since 9/11 he has studied illegal and covert networks that pursue grievances or greed. His articles on "Dark Networks" have been widely cited for their application of network analysis and management theory to terrorist networks, human trafficking, and drug smuggling. Milward received his Ph.D. from Ohio State University.

Joshua Neil “Data Science in Industry Cyber Security: Using Rarity to Detect Lateral, Reconnaissance and Data Staging Behaviors” Joshua Neil is a Senior Manager in the Advisory Services practice of Ernst & Young LLP. He is deeply involved in the development and deployment of cyber security analytics to assist in the protection of EY client computer networks.

William Neumann “Integrating Security Awareness into the Undergraduate Business Curriculum” Dr. Neumann is a Professor of Practice in MIS in the Management Information Systems Department in the Eller College of Management at the University of Arizona, and serves as the MIS Director of Undergraduate and Master’s Programs. He instructs a wide range of classes, from freshman classes for all Eller pre-business students to graduate courses in risk management. Dr. Neumann's work addresses the strategic planning, implementation, and integration of value chain management systems, and information security risk management, and considers how to use technologies and secure and data communication infrastructure to provide innovative solutions for enhancing the effectiveness of a corporation's business operations. Dr. Neumann is also a member of the Honors College faculty. He holds master and doctoral degrees in Computer Science from Arizona State University.

Balaji Padmanabhan “A Multidisciplinary Approach to Academic Cybersecurity Programs at USF” Balaji Padmanabhan is the Anderson Professor of Global Management and a professor in the Information Systems Decision Sciences Department at the University of South Florida. He has created and taught undergraduate, MBA/MS, and doctoral courses in areas related to business/data analytics, computational thinking, and electronic commerce. Padmanabhan's research addresses data analytics for business applications, algorithms for online news recommender systems, management of data analytics in firms, fraud detection in healthcare, analytics in examining service quality and customer churn, behavioral profiling, and pattern discovery. His work has been published in both computer science and information systems journals and conferences including Management Science, Information Systems Research, MIS Quarterly, and INFORMS Journal on Computing. He received a B.Tech in Computer Science from Indian Institute of Technology (IIT) and a Ph.D. from New York University (NYU). Padmanabhan's professional service includes work as associate editor and program committee member of several academic journals and conferences. He has published his research in leading outlets in business and computer science. He also works with several firms on technical, strategic and educational issues related to business and data analytics.

Mark Patton “Integrating Research with Education throughout the Master’s Degree Program, Challenges and Opportunities” Dr. Mark Patton is Lecturer in the University of Arizona’s Management Information Systems. He is also Co-PI and Program Administrator for the AZSecure Cybersecurity Fellowship Program, the UA’s Scholarship-for-Service program funded by the National Science Foundation. His research areas include cybersecurity and specifically the security of the Internet of Things.

Jason Rader “Current State of Cybersecurity; How to Stay Safe?” Jason Rader joined Datalink in 2015 as the National Practice Director of Security. He is charged with managing Datalink’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 16 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true solutions related to today’s security challenges. He likes to be known as a “business consultant who happens to be a security expert” and not the other way around. This approach has afforded him success because it requires vision beyond security projects and focuses on business outcomes. Jason is known for his expertise in operationalizing security and being a thought leader and sought after speaker in the threat intelligence and security operations spaces. Prior to joining Datalink, Rader was the Chief Security Strategist and Director of Cyber Threat Intelligence for EMC’s Security Division, RSA, where he was focused on developing enterprise security management strategies in the areas of health care, government, and the financial sector. He also led the RSA Research group in the collection and publication of cyber threat intelligence related to the latest cyber-attacks and advanced threat groups.

Edna Reid Women in Cybersecurity Dr. Edna Reid is managing director of Cyligence, Inc., a new cyber analysis and intelligence company. She is a retired FBI intelligence analyst specializing in cyber intelligence education, training, and recruitment. She is on leave from her position as an Associate Professor in the Intelligence Analysis (IA) Program at James Madison University (JMU), Virginia. At JMU, she designed and taught new courses in cyber intelligence and targeting of cyber adversaries. In May 2016, she took students on a study abroad course to Singapore where they focused on terrorism and cyber intelligence which included a tour and briefing of INTERPOL’s cybercrime center. Currently, she is designing a graduate online certificate in cyber intelligence that will be launched in the fall of 2017. In addition, she is working with industry partners to design an instructional security operations center (SOC) for the IA program. She is conducting research on methodologies for using and teaching cyber intelligence as well as creating a framework of a holistic approach to cyber security education. This approach involves unbundling cyber security to integrate it into non-technical disciplines so as to prepare students for hybrid cyber security jobs.

Julian Rrushi “Cybersecurity Deception: Toward the Development of a Theory that Focuses on the Cognitive Process” Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a Ph.D. in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University.

Christian Schreiber “Finding the RIGHT Needle in a Field of Big Data Haystacks” Christian Schreiber is a Consulting Systems Engineer with FireEye and has nearly 20 years of IT and information security experience across the higher education / research, IT managed services, and financial services industries. Before joining FireEye, he was the CISO and HIPAA Security Officer at the University of Arizona, and he held prior information security and IT leadership positions with SunGard Data Systems, the University of Wisconsin, and Central Michigan University. He has a Bachelor of Science in Business Administration from Central Michigan University, a Masters Certificate in Project Management from the University of Wisconsin-Madison, and holds professional certifications including Certified Information Security Manager (CISM) and Project Management Professional (PMP).

Brett Scott “The Bad Guys Collaborate to Clobber You. Why Aren't You Collaborating?” Brett quickly developed a passion for the growing computer industry. Brett’s passion was stimulated by cool tricks and programs available in Byte magazine, and a birthday that correlated to many important events in computing / nerd history. Brett has served as a hardware tech, a bulletin board sysop, a Network Technician, Programmer, DBA, and System Architect. Having the fortune to be born into an industry and having the advantage of growing up with computing technology, Brett has worn many hats, been there for many interesting events, and experienced some amazing things.

Paulo Shakarian “Reducing Risk in the Face of Adaptive Threats in Cyberspace” Paulo Shakarian, Ph.D. is a Fulton Entrepreneurial Professor (tenure-track) at Arizona State University where he directs the Cyber-Socio Intelligent System (CySIS) Laboratory, specializing in cyber-security, social network analysis, and artificial intelligence. He has written numerous articles in scientific journals and has authored several books, including Elsevier’s Introduction to Cyber-Warfare and Cambridge’s forthcoming Darkweb Cyber Threat Intelligence Mining. Recently, his work was featured in major news media including Forbes, the New Yorker, Slate, The Economist, Business Insider, TechCrunch, and the BBC. He is also a New America Fellow and recipient of the Air Force Young Investigator award, DURIP award, DoD Minerva award, FOSINT-SI Best Paper, MIT Tech. Review “Best of 2013,” and was a DARPA Service Chief’s Fellow. Previously, Paulo was an officer in the U.S. Army where he served two combat tours in Iraq, earning a Bronze Star and the Army Commendation Medal for Valor. He also previously worked as an Assistant Professor at West Point. Paulo is also the CEO of the cybersecurity startup IntelliSpyre.

17 Resha Shenandoah “What Am I Doing Here? And Why I Want Your Data” Resha Shenandoah is the Project Coordinator for the Data Infrastructure Building Blocks for Intelligence and Security Informatics (DIBBs for ISI) project. Her background is in archaeology and she is currently working on her Master's in Information and Library Science at the University of Arizona's School of Information. Her focus is on cyberinfrastructure, data repositories, and scholarly communications.

Ambareen Siraj Women in Cybersecurity Ambareen Siraj, Ph.D., is the Director of the NSA/DHS accredited Cybersecurity Education, Research, and Outreach Center at Tennessee Tech University (TTU) and Associate Professor with the Department of Computer Science at TTU. She is also Founder and Chair of the Women in Cybersecurity (WiCyS) Initiative. Her research is in the areas of situation assessment in network security, secure communication in smart grid, and security education. She holds a Ph.D. in computer science with a concentration in information assurance from Mississippi State University. She is the program director of NSA/NSF Gen Cyber Camps at TTU. She leads several NSF Projects including “Tennessee Cybercorps: A Hybrid Program in Cybersecurity.”

Tina Slankas “Cybersecurity During Super Bowl XLIX” and Women in Cybersecurity Tina Slankas is currently the Cyber Security Program Coordinator for the City of Phoenix supporting a Department of Homeland Security Urban Area Security Initiative Grant. Tina has spent over 20 years in Information Technology and Security leadership beginning her career at the Pentagon supporting the Office of the Secretary of Defense. After leaving the Air Force she worked as a consultant for Lucent Technologies, then led Security Architects at Wells Fargo before relocating to Phoenix, Arizona in 2011. Prior to working for the City, Tina was the Manager of Security Technology and Operations at Freeport-McMoRan. Tina holds a Bachelor of Science Degree in Mathematics from the University of Arizona and a Master of Science Degree in Information and Telecommunications Systems from Johns Hopkins University. In her spare time you can find her supporting her son in the Phoenix Boys Choir.

David Thaw “Does Cybersecurity Need More Law?” David Thaw is an Assistant Professor of Law and Information Sciences at the and an Affiliated Fellow of the Information Society Project at Yale Law School. He is an internationally-recognized expert on cybersecurity law and policy. David's work uses computing and information empirical methods to understand the nature and character of cybersecurity risks. He uses scientific data in his legal and policy scholarship to examine how regulatory frameworks drive cybersecurity practices "on the ground." David's other areas of research include privacy, cybercrime, legal issues of cyberwarfare, and administrative law and regulatory theory. David holds a Ph.D. from UC Berkeley's School of Information, a J.D. from Berkeley Law.

Joe Valacich “Validating Active Indicators for the Identification of Insider Threats” Joseph (Joe) Valacich is an Eller Professor of MIS within the Eller College of Management at the University of Arizona, a Fellow of the Association for Information Systems (2009), and the Chief Science Officer (CSO) of Neuro-ID, Inc. Dr. Valacich is a prolific scholar, publishing more than 200 scholarly articles in numerous prestigious journals and conferences, including: MIS Quarterly, Information Systems Research, Management Science, Academy of Management Journal, Journal of MIS, Journal of the AIS, AIS Transactions on HCI, Communications of the ACM, Decision Sciences, Journal of Applied Psychology, Organizational Behavior and Human Decision Processes, and many others. His scholarly work has had a tremendous impact not only on the IS field, but also on a number of other disciplines, including computer science, cognitive and social psychology, marketing, and management. In September 2016, Google Scholar lists his citation counts 18,751, with an H-index of 63. In 2016, Dr. Valacich was awarded with the University of Arizona, Tech Launch Arizona, “Innovation & Impact Award” for Information Technology. Dr. Valacich is also ranked as one of the most prolific authors in the history of MIS Quarterly – his discipline’s top journal – over the life of the journal (1977-2016) (see misq.org). Throughout his career, he has also won numerous teaching, service, and research awards.

Beichuan Zhang “Internet Routing Security” Dr. Beichuan Zhang is an Associate Professor at the Department of Computer Science, the University of Arizona. His research interest is in Internet routing architectures and protocols. He has been working on future Internet architectures, green networking, and inter-domain routing. He received the Applied Networking Research Prize in 2011 by ISOC and IRTF, and best paper awards at IEEE ICDCS in 2005 and IWQoS in 2014. Dr. Zhang received the Ph.D. from UCLA and B.S. from Peking University.

18 . IEEE ISI 2016 ISI 2016 Conference Organizers

General Chairs Hsinchun Chen, University of Arizona, USA Salim Hariri, University of Arizona, USA Bhavani Thuraisingham, University of Texas at Dallas, USA Daniel Zeng, University of Arizona, USA

Program Co-Chairs Mariëlle den Hengst-Bruggeling, Politie Academie, The Netherlands Latifur Kahn, University of Texas at Dallas, USA Siddharth Kaza, Towson University, USA Mark Patton, University of Arizona, USA

Local Arrangements and Conference Treasurer Catherine A. Larson, University of Arizona, USA Anji Siegel, University of Arizona, USA

Publication Chair Alan Wang, Virginia Tech, USA

Workshop Chairs Big Data Analytics for Cybersecurity Computing Salim Hariri, University of Arizona, USA Hamamache Kheddouci, The Université Claude Bernard Lyon 1, France Cihan Tunc, University of Arizona, USA Youakim Badr, National Institute of Applied Sciences (INSA-Lyon), France Youssif AlNashif, Florida Polytechnic University, USA

Cybersecurity Education and Workforce Mark Patton, University of Arizona, USA Siddharth Kaza, Towson University, Maryland

Cybersecurity Challenges and Opportunities in Industry Paulo Goes, University of Arizona, USA Matthew Hashim, University of Arizona, USA

Doctoral Consortium Chris Yang, Drexel University, USA Richard Frank, Simon Fraser University, Canada

Women in Cybersecurity Program Co-Chairs Ambareen Siraj, Tennessee Tech University, USA Bhavani Thurasingham, University of Texas at Dallas, USA Gondy Leroy, University of Arizona, USA

19 IEEE ISI 2016 ISI 2016 Program Committee Members

Program Co-chairs Mariëlle den Hengst-Bruggeling, Politie Academie, The Netherlands Latifur Kahn, University of Texas at Dallas, USA Siddharth Kaza, Towson University, USA Mark Patton, University of Arizona, USA

Program Committee Members Sibel Adali, Rensselaer Polytechnic Institute, USA Niall Adams, Imperial College London, UK Babak Akhgar, Sheffield Hallam University, UK Massimiliano Albanese, George Mason University, USA Gerhard Backfried, SAIL LABS Technology AG, Australia Antonio Badia, University of Louisville, USA Alejandro Correa Bahnsen, Luxembourg University, Luxembourg Joel Brynielsson, KTH Royal Institute of Technology, Sweden Guoray Cai, Penn State University, USA Jose Luis Calvo-Rolle, University of Coruna, Spain Weiping Chang, Central Police University, Taiwan You Chen, Vanderbilt University, USA Satish Chikkagoudar, Pacific Northwest National Lab, USA K.P. Chow, University of Hong Kong, Hong Kong Wingyan Chung, Stetson University, USA Richard Colbaugh, New Mexico Institute of Mining and Technology, USA Tim Croisdale, California State University, USA Ram Dantu, University of North Texas, USA Leon Deligiannidis, Wentworth Institute of Technology, USA Doug Derrick, University of Nebraska at Omaha, USA Artur Dubrawski, Carnegie Mellon University, USA Norah Dunbar, University of California at Santa Barbara, USA David Ebert, Purdue University, USA James Ellis, Memorial Institute for the Prevention of Terrorism, USA Yuval Elovici, Ben-Gurion University, Israel Zeki Erdem, TUBITAK BILGEM, Turkey Shamal Faily, Bournemouth University, UK Roozbeh Farahbod, University of Victoria, Canada Guido Ferraro, European Commission Joint Research Centre, Italy Adawai-Chee Fu, Chinese University of Hong Kong, Hong Kong Vasco Furtado, University of Fortaleza, Brazil Ross Gayler, Veda, Australia Roberto Giacobazzi, University of Verona, Italy Kristin Glass, New Mexico Tech, USA Bénédicte Goujon, Thales Research & Technology, France Yuan Xiang Gu, Irdeto, Canada Kevin Hamlen, University of Texas at Dallas, USA Nick Heard, Imperial College London, UK Thomas Holt, Michigan State University, USA Daning Hu, University of Zurich, Switzerland Fredrik Johansson, Swedish Defence Research Agency, Sweden Lisa Kaati, Uppsala University, Sweden Dmitri Kalashnikov, University of California at Irvine, USA Yoshinari Kameda, University of Tsukuba, Japan Sue Kase, Army Research Laboratory, USA Jeroen Keppens, King’s College London, UK Jom Kohlhammer, Fraunhoger IGD, Germany Qingchao Kong, Chinese Academy of Sciences, China Steve Kramer, Paragon Science, USA Gondy Leroy, University of Arizona, USA Jiexun Li, Oregon State University, USA Yunji Liang, Northwestern Polytechnical University, China Ee-Peng Lim, Singapore Management University, Singapore Junjie Lin, Chinese Academy of Sciences, China Huan Liu, Chinese Academy of Sciences, China

20 Chuan Luo, Chinese Academy of Sciences, China David Maimon, University of Maryland, USA Brad Malin, Vanderbilt University, USA Wenji Mao, Chinese Academy of Sciences, China Luca Mazzola, European Commission Joint Research Centre, Italy Laura Mcnamara, Sandia National Laboratories, USA Mirko Montanari, University of Illinois at Urbana-Champaign, USA Il-Chul Moon, KAIST, South Korea Robert Moskovitch, Deutsche Telekom Laboratories at Ben-Gurion University, Israel Azzam Mourad, Lebanese American University (LAU), Lebanon Hedi Nasheri, Kent State University, USA Daniel Neill, Carnegie Mellon University, USA Federico Neri, Synthema srl, Italy Clifford Neuman, Information Sciences Institute, USA Greg Newby, Arctic Region Supercomputing Center, USA Chris North, Virginia Tech, USA Cyril Onwubiko, Intelligence and Security Assurance, E-Security, UK Richard Overill, King’s College London, UK Jinie Pak, Towson University, USA Andrew Park, Thompson Rivers University, Canada Joon Park, Syracuse University, USA Johan Perols, University of San Diego, USA Rasmus Rosenqvist Petersen, NOBLACKBOX Cambridge Ltd, UK Jakub Piskorski, Polish Academy of Sciences, Poland Miloslava Plachkinova, University of Tampa, USA Jan Platos, VSB – Technical University of Ostrava, Czech Republic Chaditsa Poulatova, Newcastle University, UK Henry Prakken, University of Utrecht/University of Groningen, The Netherlands Joel Predd, RAND, USA Andrea Pugliese, University of Calabria, Italy Shaojie Qiao, Southwest Jiaotong University, China Guangzhi Qu, Oakland University, USA Ram Ramesh, SUNY at Buffalo, USA Rodrigo Roman, University of Malaga, Spain Antonio Sanfilippo, Pacific Northwest National Laboratory, USA Bjorn Schuller, University of Passau / Imperial College London Kavun Sergii, University of Banking of the National Bank of Ukraine, Ukraine Raj Sharman, SUNY at Buffalo, USA Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina David Skillicorn, Queen’s University, Canada Amy Sliva, Northeastern University, USA Martijn Spitters, TNO, the Netherlands Anna Squicciarini, Pennsylvania State University, USA Yannis Stamatiou, RACTI, Greece John Stasko, Georgia Institute of Technology, USA Peng Su, Dali University, China V.S. Subrahmanian, University of Maryland, USA Shanmugathasan Suthaharan, University of North Carolina at Greensboro, USA Clark Thomborson, University of Auckland, New Zealand Paul Thompson, Dartmouth College, USA Robyn Torok, Macquary University, Australia Mark Van Staalduinen, TNO, The Netherlands Cor Veenman, Netherlands Forensic Institute, the Netherlands Alan Wang, Virginia Tech, USA Jenq-Haur Wang, National Taipei University of Technology, Taiwan Leon Wang, National University of Kaohsiung, Taiwan Susanne Wetzel, Stevens Institute of Technology, USA Uffe Kock Wiil, University of Southern Denmark, Denmark Christian Wolff, Regensburg University, Germany Fatos Xhafa, Technical University of Catalonia, Spain Jennifer Xu, Bentley University, USA Shouhuai Xu, University of Texas at San Antonio, USA Moi-Hoon Yap, Manchester Metropolitan University, UK Nan Zhang, George Washington University, USA Yuhao Zhang, Chinese Academy of Sciences, China Xiaolong Zheng, Chinese Academy of Sciences, China Bin Zhou, University of Maryland, Baltimore County, USA William Zhu, Zhangzhou Normal University, USA

21 IEEE ISI 2016 Conference and Local Information

Conference Presentations: All conference paper presentations, panels, workshops, and plenary sessions are taking place in the Student Union of the University of Arizona. Plenary sessions are in the South Ballroom. Concurrent sessions are in the South Ballroom and in the adjacent Catalina, Rincon, and Santa Rita Rooms. The conference office is located in the Tucson Room. The rooms are named after the four “sky island” mountain ranges around Tucson: to the north are the Catalina Mountains, to the south are the Santa Ritas, to the east the Rincons (rincon means “corner” in Spanish), and to the west the Tucsons.

Registration Desk: The registration desk is located just outside the North Ballroom in the atrium. Registration opens each day at breakfast and closes at 5:00 pm on Wednesday and Thursday, and at 10:30 am on Friday.

Meals and Breaks: All meals and breaks will be served in the North Ballroom.

Conference Reception and Networking Session on Wednesday: The first conference reception, featuring a hosted bar and ample h’ors d’oeuvres, is being held at the Hall of Champions, located a short walk east and south from the Student Union (see campus map in back). The Hall of Champions showcases more than 100 years of University of Arizona Athletics heritage and traditions. Completed in 2002, the athletics museum boasts 9,000 square feet of floor space and a mezzanine level and patio for special events. With a spectacular glass facade overlooking the UA mall, the Hall of Champions provides a fascinating milieu for the conference reception.

Conference Poster Session, Reception, and Awards Ceremony on Thursday: This reception offers conference attendees a true taste of the Southwest and will feature a hosted bar and a buffet. Tanque Verde Guest Ranch is one of Arizona’s old time cattle and guest ranches and is located on 60,000 acres of Tucson’s most breathtaking desert landscapes. It is located amongst the Rincon Mountains and adjacent to Saguaro National Park and the Coronado National Forest. We are providing transportation via buses for the 30-minute ride, although anyone with a car is also welcome to drive. Buses will load directly after the conference day on Thursday and will depart at 5:30. The buses will bring everyone back to campus and the hotels at the end, about 8:45-9:00 pm or so.

Directions for driving to Tanque Verde Guest Ranch: The Ranch is located at the end of Speedway Boulevard. If you are driving yourself to the Ranch and departing from the Second Street Garage, located at 1390 East Second Street, Tucson, AZ, exit the garage from its north entrance and turn left (west) onto Second Street. In about one-half block, turn right (north) onto Mountain Avenue. Go about 2 blocks and turn right (east) onto Speedway Boulevard, a large and very busy street. Continue east on Speedway Boulevard to the end - about 15-16 miles; continue to follow Speedway as it turns left (north) into the Tanque Verde Guest Ranch. Parking is free at the Ranch.

Poster Presenters: Anyone who will be presenting a poster at the Poster Session on Thursday, please come to the conference office in the Tucson Room by no later than 2:30 pm on Thursday to affix your poster to the poster board. (Poster boards, tape, glue, and pins will be provided.) Then, pick your poster up from the conference office before heading out to the Tanque Verde Guest Ranch to load it on the bus and take it with you to the Poster Session.

Wireless Access in Student Union: See the next page for instructions on connecting as a guest to the University of Arizona wireless network.

22 IEEE ISI 2016 Wireless Network Access Instructions for UA Guests

If you are not already a member of the University of Arizona Community (i.e., if you do not have a NetID and a University of Arizona email account), and wish to use the UA’s wireless network, please follow the instructions below to register for free wireless access.

Please note that this process will require two-factor authentication via text messaging.

1. Select UAGuest from your wireless options. Open a web browser if one does not automatically open for you.

2. The Welcome UAGuest webpage will appear. Click on Create an Account at the bottom of the webpage.

3. Enter your name and cell phone number (with hyphens, e.g., XXX-XXX-XXXX), then click Register.

4. A message will appear indicating a text message was sent to the cell phone number provided.

5. You will receive a text message containing your assigned username and password valid for 5 days.

6. Enter your assigned username and password on the Welcome UAGuest webpage and click Sign On.

7. Read the Acceptable Use Policy and click Accept. You will now have access to UAGuest wireless internet.

23 IEEE ISI 2016 Map of Student Union

Level 1

Level 2

24

Level 3 - Location of ISI Conference

ISI Conference Registration Desk

Level 4

25 IEEE ISI 2016 Map of Campus and Hotels

Hall McClelland

Aloft Hotel,Aloft 2 HallChampions of

Mapshowswalking path Studentfrom Union to

2 2

nd

nd

St Garage St StreetGarage

nd

StreetGarage, andMcClelland Hall

also locations , of Marriott Hotel,

Hotel Aloft Aloft

26