DIMACS Workshop on Applications of Order Theory to Homeland Defense and Computer Security
September 28 - 29, 2004
DIMACS Center, CoRE Building, Rutgers University
- Organizers:
- Jonathan Farley, Massachusetts Institute of Technology
- Anthony A. Harkin, Harvard University, harkin@deas.harvard.edu
- Mel Janowitz, DIMACS / Rutgers University, melj@dimacs.rutgers.edu
- Stefan Schmidt, Physical Science Laboratory, schmidt@psl.nmsu.edu
DIMACS Working Group on Applications of Order Theory to Homeland Defense and Computer Security participation by invitation only.
Program:
Tuesday, September 28, 2004
8:15 - 9:00 Breakfast and Registration - CoRE Bldg., 4th Floor
9:00 - 9:15 Welcoming Remarks
Fred Roberts, DIMACS Director and Mel Janowitz, DIMACS Associate Director
9:20 - 9:50 Winning the Shadow War: A Mathematical Method for Analyzing the Effectiveness
of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)
Jonathan Farley, MIT
10:00 - 10:45 Rounding up the Usual Suspects: Insights from Order Theory
Gordon T. Woo, Risk Management Solutions
10:45 - 11:10 Break
11:10 - 11:55 Dynamic Network Analysis for Homeland Defense: Destabilizing Terror Networks
Kathleen Carley, Carnegie Mellon University
12:00 - 12:45 Detecting Terrorist Cells: The Hierarchical Formation of Networks
Steven J. Brams, Michael A. Jones, and D. Marc Kilgour, NYU
12:45 - 2:00 Lunch - DIMACS Lounge, 4th Floor
2:00 - 2:45 Order Theory and Security
Mike Mislove, Tulane University
2:50 - 3:30 Boolean Model of Metachoice: An Analysis of Terrorists' Decision Making
Vladimir Lefebvre, University of California at Irvine
3:35 - 4:00 Homeland Security Institute: Overview and Issues for the DIMACS Workshop
Gary Nelson, Planner and Systems Engineer, Homeland Security Institute
4:00 - 4:30 Break
4:45 Van back to the hotel
5:30 Reception at Four Points Sheraton Hotel - Piscataway
6:30pm Banquet at Four Points Sheraton Hotel - Piscataway
Wednesday, September 29, 2004
8:15 - 9:00 Breakfast and Registration - CoRE Bldg., 4th Floor
9:00 - 9:45 Cryptographic Techniques to Enforce an Information Flow Policy
Jason Crampton, University of London
9:50 - 10:15 Agent-based Modeling of Multi-resolutional Factors in
Terrorist Recruitment
Don Birx, Physical Science Laboratory
10:15 - 10:45 Break
10:45 - 11:05 An Institute for Mathematical Methods in Counter-Terrorism:
A new model for North-South cooperation
Ronald Young, The University of the West Indies
11:10 - 11:55 Understanding Meadow's Safe Flow Policy as the Bridging Entailment
Relation between Formal Concept Analysis and Scott Information Systems
GQ Zhang, Case Western Reserve University
12:00 - 1:30 Lunch
1:30 - 1:55 Mathematicians at RAND: Then and Now
Paul Dreyer, RAND Corporation
2:00 - 2:45 Order Theoretical Knowledge Discovery
Cliff Joslyn, Los Alamos National Laboratory
2:50 - 3:20 Break
3:20 - 4:05 Link Discovery via a Mutual Information Model: From Graphs to Ordered Lists
(with an Illustration Concerning Russian Contract Killing)
Jafar Adibi, University of Southern California
4:10 - 4:50 From Prediction to Reflexive Control:
Simulating the Penetration of Our Borders by Terrorists
Stefan Schmidt, New Mexico State University & Phoenix Mathematical Systems Modeling, Inc. and
Xenia Kramer, New Mexico State University
4:50 - 5:00 Closing Remarks
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on September 27, 2004.