Speakers and Presentation Titles
Keynote Speakers:
- Dr. Vicki Bier, University of Wisconsin- Madison, USA: Pitfalls of Big Data
- Dr. Robert Goble, George Perkins Marsh Institute, Clark University, USA: The Human Side of Systemic Risks can inform the use of Big Data and New Analytic methods
- Dr. James H. Lambert, University of Virginia, USA: Risk and Resilience Management of Enterprises and Systems
Oral Presentations:
- Luca Allodi, Eindhoven University of Technology, Netherlands: The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures
- Anjon Basak, University of Texas at El Paso, USA: Uncovering The Adversary: Game Models for Learning Adversary Characteristics in Cybersecurity
- Brandon P Behlendorf, University at Albany, USA: From Hot Spots to Hot Paths: Modeling Probable Pathways for Human Smuggling Along the U.S.-Mexico Border
- Youngjun Choe, University of Washington, USA: Post-Hurricane Damage Assessment with Satellite Imagery Data
- Kjell Hausken, University of Stavanger, Norway: Game Theoretic Analysis of Adversaries, Media Manipulation, Ideologically Biased Clickbait or Fake News and Real News
- Richard John, University of Southern California, USA: An ROC analysis of deception detection in social media following extreme events
- Steve Johnson, Cranfield Defence and Security, Cranfield University, UK: Application of expert elicitation for decision making in the terrorism insurance industry – results of 3 years of forecasting
- Sayanti Mukherjee, University at Buffalo, USA: Risk assessment framework to evaluate urban vs. rural crime rates leveraging data-driven predictive analytics
- MD Baniamin Sarder, Bowling Green State University, USA: Resilient Cyber Security Systems for Material Handling and Logistics
- T. Selvakumar, Anna University, India: Risk Reduction In Process Industries Through Online Process Parameter Analysis
- Gabriela Gongora Svartzman, Stevens Institute of Technology, USA: Quantifying Social Cohesion as a Proxy for Resilient Communities in the face of Disasters
- Jonathan Welburn, RAND, USA: Systemic Risk in Cyberspace
- Jun Zhuang, University at Buffalo, USA: Tracking and Managing Misinformation on Social Media during Disasters
Poster Presentations:
- Alan Abrahams, Virginia Tech, USA: Identifying food safety risks from online media
- Vafa Andalibi, Indiana University Bloomington, USA: MITM risk assessment on IoT
- Ridwan Al Aziz, University at Buffalo, USA: Application of Social Media Image Classification to Detect Infrastructure Damage during Natural Disasters
- Rudra Prasad Baksi, University at Buffalo, USA: A Strategic Framework for Mitigating Advanced Persistent Threats: A Hidden Markov Model Approach
- Chris Chu, University at Buffalo, USA: Investigating the Roles of Social Media and Community Social Capital in Building Disaster Resilience
- Sanchari Das, Indiana University Bloomington, USA: Overpowered and Under-protected: Threat Analysis of Smart Toys
- Sanchari Das, Indiana University Bloomington, USA: Securtle: Portable Measurement Tool for Ambient Cyber Risk Detection
- Sanchari Das, Indiana University Bloomington, USA: A Study on Risk Communication through Video Tutorials for Promoting Secure Authentication
- Roi Naveiro Flores, Institute of Mathematical Sciences, Spain: Augmented Probability Simulation Methods for Non-cooperative Games
- Kun Hu, Tsinghua University, China: Risk Analysis of Flight Operations in the Landing Phase Based on Flight Recorded Data
- Kyle Hunt, University at Buffalo, USA: Tracking Misinformation on Social Media during Crisis Events: A Machine Learning Approach
- Richard John, Department of Psychology, University of Southern California, USA: Deterrence as target shifting in layered cyber defense: A behavioral analog game
- Elnaz Kabir, University of Michigan, USA: Assessing ISA Tree Risk Assessment Approach Using Econometrics Models
- Elnaz Kabir, University of Michigan, USA: Predicting Daily Power Outages Using the Bayesian Model Averaging
- Peng Liu, College of Management and Economics, Tianjin University, China: Blame attribution asymmetry in human-automation cooperation: An explanation from the affect heuristic
- Abani K. Pradhan, University of Maryland, USA: Incorporation of Whole Genome Sequencing Data into the Hazard Characterization Paradigm of a Microbial Risk Assessment Framework for Salmonella in chicken
- Abani K. Pradhan, University of Maryland, USA: Evaluation of Public Health Risk for Escherichia coli O157:H7 in Cilantro
- Alberto Redondo, ICMAT-CSIC, Spain: Adversarial Risk Analysis for Obfuscation Attacks (AROA)
- Javad Roostaei, University of North Carolina at Chapel Hill, USA: Machine Learning and Spatial Data Analysis Applications in Modeling Risks of PFAS Substances in Private Well Water
- Jose S., Vellore Institute of Technology, India: Risk analysis on Industrial Internet of Things(IIoT) integration with Enterprise Resource Planning
- Jia Wang, Tsinghua University, China: Crime risk analysis through big data algorithm with urban metrics
- Yi (Victor) Wang, Jackson State University, USA: The Equivalent Hazard Scale for Natural Hazards
- Zhiyuan Wei, University at Buffalo, USA: Data-informed Modeling to Analyze and Assess the Growing Risks of Suicide Attempts Among Youths
- Chengwei Zhai, University of Michigan, USA: Evolution of heat wave vulnerability - the influence of individual behavior and social networks