Speakers and Presentation Titles

 

Keynote Speakers:

  1. Dr. Vicki Bier, University of Wisconsin- Madison, USA: Pitfalls of Big Data
  2. Dr. Robert Goble, George Perkins Marsh Institute, Clark University, USA: The Human Side of Systemic Risks can inform the use of Big Data and New Analytic methods
  3. Dr. James H. Lambert, University of Virginia, USA: Risk and Resilience Management of Enterprises and Systems

Oral Presentations:

  1. Luca Allodi, Eindhoven University of Technology, Netherlands: The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures
  2. Anjon Basak, University of Texas at El Paso, USA: Uncovering The Adversary: Game Models for Learning Adversary Characteristics in Cybersecurity
  3. Brandon P Behlendorf, University at Albany, USA: From Hot Spots to Hot Paths: Modeling Probable Pathways for Human Smuggling Along the U.S.-Mexico Border
  4. Youngjun Choe, University of Washington, USA: Post-Hurricane Damage Assessment with Satellite Imagery Data
  5. Kjell Hausken, University of Stavanger, Norway: Game Theoretic Analysis of Adversaries, Media Manipulation, Ideologically Biased Clickbait or Fake News and Real News
  6. Richard John, University of Southern California, USA: An ROC analysis of deception detection in social media following extreme events
  7. Steve Johnson, Cranfield Defence and Security, Cranfield University, UK: Application of expert elicitation for decision making in the terrorism insurance industry – results of 3 years of forecasting
  8. Sayanti Mukherjee, University at Buffalo, USA: Risk assessment framework to evaluate urban vs. rural crime rates leveraging data-driven predictive analytics
  9. MD Baniamin Sarder, Bowling Green State University, USA: Resilient Cyber Security Systems for Material Handling and Logistics
  10. T. Selvakumar, Anna University, India: Risk Reduction In Process Industries Through Online Process Parameter Analysis
  11. Gabriela Gongora Svartzman, Stevens Institute of Technology, USA: Quantifying Social Cohesion as a Proxy for Resilient Communities in the face of Disasters
  12. Jonathan Welburn, RAND, USA: Systemic Risk in Cyberspace
  13. Jun Zhuang, University at Buffalo, USA: Tracking and Managing Misinformation on Social Media during Disasters

Poster Presentations:

  1. Alan Abrahams, Virginia Tech, USA: Identifying food safety risks from online media
  2. Vafa Andalibi, Indiana University Bloomington, USA: MITM risk assessment on IoT
  3. Ridwan Al Aziz, University at Buffalo, USA: Application of Social Media Image Classification to Detect Infrastructure Damage during Natural Disasters
  4. Rudra Prasad Baksi, University at Buffalo, USA: A Strategic Framework for Mitigating Advanced Persistent Threats: A Hidden Markov Model Approach
  5. Chris Chu, University at Buffalo, USA: Investigating the Roles of Social Media and Community Social Capital in Building Disaster Resilience
  6. Sanchari Das, Indiana University Bloomington, USA: Overpowered and Under-protected: Threat Analysis of Smart Toys
  7. Sanchari Das, Indiana University Bloomington, USA: Securtle: Portable Measurement Tool for Ambient Cyber Risk Detection
  8. Sanchari Das, Indiana University Bloomington, USA: A Study on Risk Communication through Video Tutorials for Promoting Secure Authentication
  9. Roi Naveiro Flores, Institute of Mathematical Sciences, Spain: Augmented Probability Simulation Methods for Non-cooperative Games
  10. Kun Hu, Tsinghua University, China: Risk Analysis of Flight Operations in the Landing Phase Based on Flight Recorded Data
  11. Kyle Hunt, University at Buffalo, USA: Tracking Misinformation on Social Media during Crisis Events: A Machine Learning Approach
  12. Richard John, Department of Psychology, University of Southern California, USA: Deterrence as target shifting in layered cyber defense: A behavioral analog game
  13. Elnaz Kabir, University of Michigan, USA: Assessing ISA Tree Risk Assessment Approach Using Econometrics Models
  14. Elnaz Kabir, University of Michigan, USA: Predicting Daily Power Outages Using the Bayesian Model Averaging
  15. Peng Liu, College of Management and Economics, Tianjin University, China: Blame attribution asymmetry in human-automation cooperation: An explanation from the affect heuristic
  16. Abani K. Pradhan, University of Maryland, USA: Incorporation of Whole Genome Sequencing Data into the Hazard Characterization Paradigm of a Microbial Risk Assessment Framework for Salmonella in chicken
  17. Abani K. Pradhan, University of Maryland, USA: Evaluation of Public Health Risk for Escherichia coli O157:H7 in Cilantro
  18. Alberto Redondo, ICMAT-CSIC, Spain: Adversarial Risk Analysis for Obfuscation Attacks (AROA)
  19. Javad Roostaei, University of North Carolina at Chapel Hill, USA: Machine Learning and Spatial Data Analysis Applications in Modeling Risks of PFAS Substances in Private Well Water
  20. Jose S., Vellore Institute of Technology, India: Risk analysis on Industrial Internet of Things(IIoT) integration with Enterprise Resource Planning
  21. Jia Wang, Tsinghua University, China: Crime risk analysis through big data algorithm with urban metrics
  22. Yi (Victor) Wang, Jackson State University, USA: The Equivalent Hazard Scale for Natural Hazards
  23. Zhiyuan Wei, University at Buffalo, USA: Data-informed Modeling to Analyze and Assess the Growing Risks of Suicide Attempts Among Youths
  24. Chengwei Zhai, University of Michigan, USA: Evolution of heat wave vulnerability - the influence of individual behavior and social networks
Contact/Questions: Dr. Jun Zhuang • Phone: 1-716-645-4707 • Fax: 1-716-645-3302 • E-mail: jzhuang@buffalo.edu • Web: http://www.eng.buffalo.edu/~jzhuang/