8:30 | Registration and Check-in | |
9:00 | Welcoming Remarks | |
9:10 | Detection of and Trends in Windows IRC DCC Bots | Phil Rodrigues (University of Connecticut) |
10:05 | Detecting Detectors: Layer 2 Wireless Intrusion Analysis |
Joshua Wright (Johnson & Wales University) |
11:00 | Break | |
11:20 | The Dartmouth murder case and Daniel Pearl case from the forensic standpoint |
SA Kevin Swindon (Boston FBI) |
12:30 | Lunch | |
1:30 | Introduction to Cryptography and Cryptographic services on z/OS |
Frank LeBlanc (Boston University) |
2:30 | So, you think you’re hosting a software pirate? |
Linda LeBlanc and Leigh Heyman (MIT) |
3:30 | Break | |
3:50 | Database Best Practices |
Paul Ruais (Boston University), |
4:50 | Closing remarks |