The North America Distinguished Visitors Program

The IEEE Computer Society is pleased to present the Regions 1-7 (U.S. and Canada) Distinguished Vistors [Speakers] Program. North American chapters interested in the speakers below should refer to the general guidelines for the DVP.

Speakers
 

 

Hal Berghel  (2014-2016)

The Stuxnet Experience: insights into the world of network forensics
The Art and Practice of Digital Forensics
Secure Credentialing: a new direction in mobile, secure, authenticable identification systems (that actually works and doesn't still respects the individual's right to privacy!)
Macro and Micro Themes in Digital Money Laundering
Phactors in Phish Pharming

 

 


Dennis J. Frailey (2012-2014)
An Industry View of Computer Science/Computer Engineering/Software Engineering Education and Accreditation
Careers in Computing - How to Prepare and What to Expect
Can Software Engineering Thrive in a Computer Science or Computer Engineering Department?

 

 

Ramesh Kari (2013-2015)

Specializations: VLSI Test and Trust; Trustworthy Hardware; Cyber Meets Nano

 

 

Prabhakar Kudva (2013-2015)

 

 

Vahid Garousi (2013-2015)
Practical Software Testing: Linking Industry and Academia
Software Testing Education: How can we train Highly-skilled Software Test
Engineers?
Test Cost-Effectiveness and Defect Density: A Case Study on the Android Platform

 

 


Philippe Kruchten (2013-2015)
Managing Technical Debt
Games Software Architects Play
Agility and Architecture: An Oxymoron?

 

George Proeller  (2014-2016)
Multimodal Biometrics Uses in Person Identification and Verification
Personal Electronic Devices; iPODS, PDAs and Cell Phones a Forensics Discussion
Cloud Security and Forensics
Blackhats vs Whitehats
Securing SCADA Systems
Security and Intelligent Transport Systems
 



Tao Xie
  (2014-2016)
Software Analytics: Data Analytics for Software Engineering
Transferring an Automated Test Generation Tool to Practice
Teaching and Learning Programming and Software Engineering via Interactive Gaming
Improving Software Dependability via Cooperative Testing and Analysis
Pathways to Technology Transfer and Adoption: Achievements and Challenges
PhD-Program Preparation for Successful Post-PhD Career
Text Analytics for Mobile App Security and Beyond