Agenda

 

Day 1: Wednesday, October 15, 2014

08:00–08:30 Wednesday

Breakfast (Provided) and Registration

08:30–08:45 Wednesday

Opening Remarks

08:45–09:45 Wednesday

Invited Talk

Operationalizing Science

Speaker: Deb Frincke, Director of Research & Development, NSA

09:45–10:15 Wednesday

Break

10:15–11:15 Wednesday

Discussion

What Does It Mean to Do Science, and Are We Doing It?

Facilitator: John McHugh, University of North Carolina and Redjack

11:15–12:00 Wednesday

Paper

Clusters and Markers for Keystroke Typing Rhythms

Authors: Shing-hon Lau and Roy Maxion, Carnegie Mellon University

Available Media
12:00–13:00 Wednesday

Lunch (Provided)

13:00–14:15 Wednesday

Invited Talk

Why Does Reproducibility in Computation Science Deserve Our Attention?

Speaker: Victoria Stodden, University of Illinois at Urbana–Champaign

14:15–15:15 Wednesday

Panel

How Did We Get Into This Mess, and How Will We Get Out?

Panelists: Sami Saydjari, Cyber Defense Agency, and Shing-hon Lau Carnegie Mellon University

15:15–15:45 Wednesday

Break

15:45–16:45 Wednesday

WIP

The Dirty Secrets of SOCs: Anthropology, Primitive Societies, and Security Operations Centers

Authors: John McHugh, et al., University of North Carolina and Redjack; Sathya Sundaramurthy, Xinming (Simon) Ou, and Michael Wesch, Kansas State University; S. Raj Rajagopalan, Honeywell ACS Labs

16:45 Wednesday

Adjourn

18:30 Wednesday

Hosted Dinner

 

Day 2: Thursday, October 16, 2014

08:00–08:30 Thursday

Breakfast (Provided) and Registration

08:30–08:45 Thursday

Opening Remarks

08:45–09:45 Thursday

Invited Talk

Statistics Done Wrong: Pitfalls of Experimentation

Speaker: Alex Reinhart, Carnegie Mellon University

09:45–10:15 Thursday

Break

10:15–11:00 Thursday

Paper

Text Entry Method Affects Password Security

 Authors: Yulong Yang and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University

Available Media
11:00–12:00 Thursday

WIP

Cognitive Effort in Privacy Decision-Making vs. 3 x 4: Evaluation of a Pilot Experiment Design

Authors: Kovila P. L. Coopamootoo and Thomas Gross Newcastle University, UK

12:00–13:00 Thursday

Lunch

13:00–14:00 Thursday

WIP

A Calibration Methodology for Networked Cybersecurity

Authors: Vineet Ghatge, Prateek Jaipuria, and Alefiya Hussain, University of Southern California

14:00–15:00 Thursday

Invited Talk

Experiment Design

Speaker: Roy Maxion, Carnegie Mellon University

15:00–15:30 Thursday

Break

15:30 Thursday

Discussion and Closing Remarks

16:15 Thursday

Adjourn