IC2E/Iotdi 2018 Program

IC2E/Iotdi 2018 Program

IC2E/IoTDI 2018 Program Room Plaza Int’l Date Time Columbia Columbia Columbia Challenger 40-41 Challenger 38-39 Ballroom G 37 36 34 Level 3 Level 3 Convention Level 3 Level 3 Level 3 Level IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Container) (SocialSens) (IoTSec) Opening remarks Opening remarks 8:30 AM - 8:45 AM 8:30 AM – 8:45 AM Opening: Timothy P Hanratty, Welcome Remarks Keynote 1: “High-Level Keynote: “Container Security” ARL Interoperability in IoT” Salman Baset 8:45 AM – 9:45 AM 8:30 – Damla Turgut, University of IC2E Tutorial 1 8:45 AM - 10:00 AM Keynote: “The Role of 10:00pm Central Florida (Blockchain) Keynote Talk: “Understanding Modeling and Simulation in and Engineering Social IoT Security Research” Signals: A Network- and Data- Prof. David M. Nicol, Driven Perspective” Univeristy of Illinois at Prof. Radu Marculescu, Urbana-Champaign Carnegie Mellon University 9:45 AM – 10:00 AM Q & A Coffee Break IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Development (Container) (SocialSens) (IoTSec) Methodologies) Containerizing for Vision Discussions (Session Session I: Attacks and A Metamodel Framework for heterogeneous HPC Chair: Lu Su) Defenses Edge-based Smart applications in the Cloud 10:30 AM - 12 :00 P M 10:30 AM – 10:50 AM Environments Authors: Malik Khan Yuan Gong and Christian Authors: Franco and Anne C. Elster Operating in the New Poellabauer. An Overview of Cicirelli, Giancarlo Fortino, Information Environment: An Vulnerabilities of Voice Antonio Guerrieri, Alessandro Container-based Performance Army Vision of Social Sensing? Controlled Systems Mercuri, Giandomenico Evaluation: A Survey and Authors: Sue Kase and Spezzano and Andrea Vinci Challenges Elizabeth Bowman 10:50 AM – 11:10 AM Authors: Naylor G. Bachiega, Abhinav Mohanty, Islam Micro-intelligence for the IoT: Paulo S. L. Souza, Sarita M. The Future of Deception: Obaidat, Fadi Yilmaz and SE Challenges and Practice in Bruschi and Simone Do R. S. Machine-Generated and Meera Sridhar. Control- LPaaS de Souza Manipulated Images, Video, hijacking Vulnerabilities in IoT Authors:Roberta Calegari, and Audio? Firmware: A Brief Survey Giovanni Ciatto, Stefano Container Memory Allocation Authors: Jonathan Bakdash, Mariani, Enrico Denti Discrepancies: An Char Sample, Monica Rankin, 11:10 AM – 11:30 AM and Andrea Omicini Investigation on Memory Murat Kantarcioglu, Jennifer Daniel Sanchez and Bogdan Utilization Gaps for Holmes, Sue Kase, Erin Copos. Cognitive CoAP-XED: Enabling Relaxed Container-Based Application Zaroukian and Boleslaw Enhancement as an Attack Requests to IoT Sensing Deployments Szymanski Surface Resources Authors: Garrett Lahmann, Authors: Bruno Costa, Paulo Thom McCann and Wes Lloyd. Veracity Enriched Event 11:30 AM – 11:50 AM Pires and Flavia Delicato Extraction Hui Lin. SDN-based In-network Authors: Ning Yu and Graham Honeypot: Preemptively Horwood Disrupt and Mislead Attacks 10:30 – (Globe-IoT: Application IC2E Tutorial 1 in IoT Network 12:00pm Services) (Blockchain) Understanding Multi-stage, Multi-modal, Multimedia 11:50 AM – 12:10 PM SCDIoT: Social Cross-Domain events in Social Media Chen Cao, Le Guan, Peng Liu, IoT enabling Application-to- Authors: Vadim Kagan and Neng Gao, Jingqiang Lin and Application Communications Siva Subrahmanian Ji Xiang. Hey, You, Keep away Authors: Yasir Saleem, Noel from My Device: Remotely Crespi and Pasquale Pace Improving Trustworthiness of Implanting a Virus Expeller to Human Sensing Data via Open Defeat Mirai on IoT Devices Exploiting IoT Data and Smart Data City services for Chronic Authors: Mikkel Kjærgaard, Obstructive Pulmonary Fisayo Caleb Sangogboye, Diseases Risk Factors Anooshmita Das and Jens Monitoring Hjort Schwee Authors: David Sarabia Jacome, Andreu Belsa Design of Scalable IoT Pellicer, Carlos Enrique Palau Platform using Hazard Sensor, Salvador and Manuel Esteve Open and Social Data Domingo Authors: Su-Seong Chai and Dongjun Suh Realizing the full potential of (infra-)structures for inter- agency communication before, during, and after disasters using the example of APAN (All Partners Access Network) Authors: Ly Dinh and Jana Diesner Lunch Buffet (Room: Plaza International Ballroom G) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Blockchain) (SocialSens) (IoTSec) Keynote 2: “IoT Software Welcome remarks Social Sensing: Technical Session II: Causality, Services Provisioning over Advances, Challenges, and Redaction and Legal Fog-Cloud Systems” (Blockchain: Improving Risks (Session Chair: Sue frameworks Amir Taherkordi Blockchain Technology) Kase) 1:30 PM – 1:50 PM 1:00 PM - 2:00 PM Ioannis Agadakos, Gabriela Supporting Private Data on Ciocarlie, Bogdan Copos, (Globe-IoT: Interoperability) Hyperledger Fabric with Analysis of Driver Behavior in Tancrede Lepoint, Ulf Secure Multiparty Times of Crisis Lindqvist and Michael Flow-based programing Computation. Authors: Manda Winlaw, Locasto. Butterfly Effect: interoperability solution for Authors: Fabrice Alycia Perkins and Allaa R. Causality from Chaos in the IoT Platform Applications Benhamouda, Shai Halevi and Hilal IoT AuthorsAndreu Belsa Tzipora Halevi. Pellicer, David Sarabia Privacy preserving, crowd 1:50 PM – 2:10 PM Jácome, Carlos Enrique Palau Thwarting Unwanted sourced crime Hawkes Soteris Demetriou, Nathaniel Salvador and Manuel Esteve Blockchain Content Insertion. processes D. Kaufman, Jonah Baim, Domingo Authors: Roman Matzutt, Authors: George Mohler Adam J. Goldsher and Carl A. Martin Henze, Jan Henrik Gunter. Toward an Extensible Tuesday, April 2018 17, April Tuesday, Towards a Resource Slice Ziegeldorf, Jens Hiller and Detecting Label Errors in Framework for Redaction Interoperability Hub for IoT Klaus Wehrle. Crowd-Sourced Smartphone Authors: Hong-Linh Truong Sensor Data 2:10 PM – 2:30 PM 1:30 – IC2E Tutorial 2 Authors: Xiao Bo, Christian Sudip Vhaduri and Christian 3:00pm A Methodology for (FECBench) Poellabauer, Megan K. Poellabauer. Implicit Integrating Internet of Things O’brien, Chaithanya Krishna Authentication in Wearables Platforms Mummidisetty and Arun Using Multiple Biometrics Authors: Claudio Jayaraman Savaglio, Giancarlo Fortino, 2:30 PM – 2:50 PM Wilma Russo and Raffaele Leadership of Data Andrew Weyl and George Gravina Annotation Teams Williamson. A Multinational Authors: Ian Mcculloh, James Legal Examination of Burck, Josef Behling, Michael Individual Security Risks Burks and Jonathon Parker Related to the Internet of Things Panel #1: Physics of Information Propagation (Moderator: Tarek Abdelzaher) 2:00 PM - 3:00 PM Vadim Kagan, Sentimetrix Ivan Garibay, University of Central Florida George Mohler, Indiana University Purdue University Indianapolis Mark Orr, Virginia Tech Coffee Break (Challenger Foyer) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Networking) (Blockchain: Applications) (SocialSens) (IoTSec) Time-scheduled Network BlockCIS---A Blockchain-based Social Sensing: Leveraging 3:30 PM – 3:50 PM Evaluation based on Cyber Insurance System. Digital Social Trace Data Giovani Gracioli, Murray Interference Authors: Tancrède Lepoint, (Session Chair: Jana Diesner) Dunne and Sebastian Authors: Tim van der Lee, Karim Eldefrawy and Gabriela 3:30 PM - 4:30 PM Fischmeister. A Comparison of Antonio Liotta and Georgios Ciocarlie. Data Streaming Frameworks Exarchakos Effects of Social Media for Anomaly Detection in A Cloud Data Movement Involvement, Context, and Embedded Systems DYNAMO: Distributed leisure Policy Architecture Based on Data-Type on Opinion Yacht-carried sensor-Network Smart Contracts and the Formation 3:50 PM – 4:00 PM for Atmosphere and Marine Ethereum Blockchain Authors: Derrik Asher, Justine Safa Boudabous, Stephan data crOwdsourcing Authors: Stephen Kirkman Caylor and Alexis Neigel Clémençon, OnsJelassi and applications and Richard Newman. Mariona Caros Roca. A secure Authors: Raffaele Montella, 5 Steps to Make Art Museums IoT architecture for streaming Sokol Kosta and Ian Foster Double-Blind Consent-Driven Tweet Influentially data analysis and anomaly Data Sharing on Blockchain. Authors: Marco Furini, detection Practical criteria for Authors: Kumar Bhaskaran, Federica Mandreoli, Riccardo scheduling CPU-bound jobs in Peter Ilfrich, Praveen Martoglia and Manuela 4:10 PM – 4:30 PM mobile devices at the edge Jayachandran, Apurva Kumar, Montangero Ebelechukwu Nwafor, Andre Authors: Matías Hirsch, Dain Liffman, Fabian Lim, Campbell and Gedare Bloom. Cristian Mateos and Alejandro Karthik Nandakumar, Identification of Landscape Anomaly-based Intrusion Zunino Zhengquan Qin, Venkatraman Preferences by using Social Detection of IoT Device Sensor 3:30 – IC2E Tutorial 2 Ramakrishna, Chun Hui Suen, Media Analysis Data using Provenance 5:00pm (FECBench) Ernie Teo and Christian Authors: Ankit Rai, Barbara Graphs Vecchiola. Minsker, Jana Diesner, Karrie Karahalios and Yicheng Sun 4:30 PM – 4:50 PM Hamed Haddadi, Vassilis Public Health and Social Christophides, Renata Cruz Media: Language Analysis of Teixeira, Kenjiro Cho, Shigeya Vaccine Conversations Suzuki and Adrian Perri g . Authors: Marco Furini and SIOTOME: An Edge-ISP Gabriele Menegoni Collaborative Architecture for IoT Security Panel #2: Internet of Social and Physical Things: 4:50 PM – 5:00 PM Applications and Challenges Concluding Remarks (Moderator: Jana Diesner) 4:30 PM - 5:30 PM Tancrede Le Point, SRI International Ning Yu, LEIDOS Klara Nahrstedt, University of Illiniois at Urbana Champaign Chenyang Lu, Washingon University

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us