|
|
Meeting Host |
Sami Saydjari (Cyber Defense Agency, USA) |
Program-at-a-Glance and Contents
Workshop on Dependable News: Framing the Problem
Workshop |
Hari Ramasamy |
Paulo
Verissimo |
|
8:15 Sami Saydjari, Introduction to the
Workshop—Purpose, Goals, Rules |
|
8:30 Elizabeth Skewes (University of Colorado,
Boulder, US): The Role of the Reporter in a Post-Factual Age |
|
9:15 Sami Saydjari (Cyber Defense Agency, US): Issues in Counter
Deception |
10:30 Saurabh Bagchi (Purdue
University, West Lafayette, Indiana, USA): TATHYA: Towards Context Aware
Identification of Check-worthy Claims in Political Discussions |
|
11:15 Roy Maxion
(Carnegie-Mellon University, Pittsburg, PA, USA): Unreliable Research:
Propagation of Unreliable Results |
16:00 Mei-Ling McNamara (University of Colorado, Boulder, Colorado, USA):
Excavating Facts in a Post-Truth Landscape |
|
16:30 Joseph Zipkin (MIT
Lincoln Labs, Boston, MA, USA): Fake Media Research at MIT Lincoln Laboratory |
9:00 Philip Koopman (Carnegie Mellon University,
Pittsburgh, PA, US), Mootaz Elnozahy
(King Abdullah University, Saudi Arabia), Carl Landwehr (George Washington
U., Washington, D.C., US), David Taylor (University of Waterloo, Waterloo,
Ontario, CA), Cristina Nita-Rotaru (Northeastern University, Boston, IL, US):
Conclusions about nature of problem and solution space |
11:15 Presentations of Summaries by Session Rapporteurs and Discussion |
|||
Session 2 Report/Summary |
|||
Session 3 Report/Summary |
|||
Homa Alemzadeh (In collaboration with: Kush Varshney, IBM Research), University of Virginia:
Dependable AI Systems |
|
Amy
Babay, Thomas Tantillo,
Trevor Aron, Yair Amir, Johns Hopkins University:
Spire: Intrusion-Tolerant SCADA for the Power Grid |
|
Algirdas Avizienis, Vytautas Magnus
University, Kaunas, Lithuania : A
Visit to the Jungle of Terminology |
|
Amy Babay (John Hopkins University), Emily Wagner (John
Hopkins University; LTN Global Communications), Michael Dinitz
(John Hopkins University), Yair Amir (John Hopkins
University; LTN Global Communications): Timely, Reliable, and Cost-Effective
Internet Transport Service using Dissemination Graphs |
|
Somali Chaterji,
PhD (Purdue University) The Fault Tolerant Epigenome & its Data Profile |
|
Miguel Pupo
Correia (Universidade de Lisboa) Detecting Unknown Network Attacks With Flows |
|
Zbigniew Kalbarczyk
(ECE Illinois) Indirect Cyber Attacks: Case for Targeted Change of
Environmental Control to Compromise Large Computing Infrastructure |
|
Dong-Seong Kim
(University of Canterbury) Evaluating Security and Availability of Multiple
Redundancy Designs when Applying Security Patches |
|
Jay Lala (Raytheon Company) Scientist’s View of Fake News |
|
Ibéria
Medeiros (University of Lisboa) Detection of
Vulnerabilities broken by Circular Dependencies in Static Analysis |
|
Farid Molazem Tabrizi; Karthik Pattabiraman
(University of British Columbia) Formal Security Analysis of Smart Embedded
Systems |
|
Evgenia Smirni
(College of William and Mary) Powering the Service Responsiveness of Deep
Neutral Networks with Queuing Models |
|
Devesh Tiwari (Northeastern University)
Useful Fake News |
|
Tomohiro Yoneda;
Koutaro Inaba; Masashi
Imai (Hirosaki University) A Study on Hardware
Trojan Insertion into Asynchronous NoC Router |
IFIP
Working Group 10.4 business meeting |
Names and Contact Information |