8:30 Registration and Check-in
9:00 Welcoming Remarks
9:10 Detection of and Trends in Windows IRC DCC Bots Phil Rodrigues (University of Connecticut)
10:05 Detecting
Detectors: Layer 2 Wireless Intrusion Analysis
Joshua Wright (Johnson & Wales University)
11:00 Break
11:20 The Dartmouth murder case and Daniel Pearl case
from the forensic standpoint
SA Kevin Swindon (Boston FBI)
12:30 Lunch
1:30 Introduction
to Cryptography and Cryptographic services on z/OS
Frank LeBlanc (Boston University)
2:30 So, you think
you’re hosting a software pirate?
Linda LeBlanc and Leigh Heyman (MIT)
3:30 Break
3:50 Database
Best Practices
Paul Ruais (Boston University),
4:50 Closing remarks