IEEE Communications Society Logo Oakland-East Bay ComSoc IEEE Logo
Home   Past Meetings   Speaker Invitation   Chapter Background   Officers   Resources   Education   Directions   Join Us   Contact Us
Conference Photo Presentation Summaries
Year 2008
Photo of a Clock

May 22, 2008
802.11n and Outdoor Mesh Wi-Fi: Market and Standards Update

The demise of outdoor Wi-Fi has been greatly exaggerated. Numerous beneficial industrial and municipal applications are running today over outdoor mesh Wi-Fi networks using 802.11a, b, and g. We will provide an update illustrating some of the operational and life-changing applications running over these networks.

We will also describe and discuss the ongoing 802.11n standards work in the IEEE, and the true technological leaps being placed into the standard through this amendment. There are different benefits from 802.11n for different use cases. Lastly we will describe specific benefits 802.11n will and will not have in the outdoor Wi-Fi environment.

Malik Audeh is a Sr. RF Systems Engineer at Tropos Networks, where he is involved in the development and deployment of outdoor mesh Wi-Fi systems. He is a voting member of the IEEE 802.11 working group and a past member of IEEE 802.16. He previously held product management and systems engineering roles at Trapeze Networks, Hybrid Networks, and Telesis Technologies Lab. He received the Ph.D. degree from UC Berkeley specializing in the area of wireless communications.

" 802.11n and Outdoor Mesh Wi-Fi: Market and Standards Update " presented by Dr. Malik Audeh, Sr. RF Systems Engineer, Tropos Networks

Back to Top


April 19, 2008
An overview of IT Security Forensics

Organizations increasingly rely on the Internet for their operations. Although the use of this technology provides many advantages, the Internet poses a unique set of vulnerabilities. Security attacks, such as worm and virus attacks, ID theft, and espionage, are examples of threats encountered daily by various institutions. Against this backdrop, it is clear that security is one of the most important IT concerns today.

Security forensics is a discipline to identify the attackers and document their activity with sufficient reliability to justify appropriate technical, business, and legal responses. The discipline involves identification, preservation and analysis of evidence of security attacks. Forensic activity takes place in a complex technical, legal, and social context which must be understood to fully appreciate its power and value. This talk will provide an overview of security forensics and addresses some of the technological and legal issues involved. A few simple forensic tools will be demonstrated.

Prior to joining Stevens Institute of Technology in 2001, Dr. Malek was a Distinguished Member of the Technical Staff at Lucent Technologies Bell Laboratories. He has more than 20 years of experience in teaching, practicing, and research in communication networks design, optimization, operations, and management, and has held various academic positions in the US and overseas, as well as technical management positions with Telcordia Technologies and Bell Laboratories.

Dr. Malek is the author, co-author, or editor of seven books, co-holder of two patents, and the author or co-author of more than fifty published technical papers and numerous technical reports in the areas of network design, computer communications, and network operations and management. He is a fellow of the IEEE, an IEEE Communications Society Distinguished Lecturer (1999-2007) and the founder and Editor-in-Chief of Journal of Network and Systems Management. He earned his Ph.D. in EE/CS from University of California, Berkeley

" An overview of IT Security Forensics " presented by Dr. Manu Malek, Industry Professor of Telecommunications Management at Stevens Institute of Technology, Hoboken, NJ.

Back to Top


March 13, 2008
Cyber Security in Electrical Power Stations

Industrial control systems such as SCADA, plant control systems, and even meters and programmable thermostats have been designed to be efficient and reliable. Cyber security considerations have generally been an afterthought. From a cyber security perspective, these systems are different than traditional business systems. The presentation will focus on the vulnerabilities of these systems, some actual cyber events that have occurred, and the difficulties in securing these critical systems.

Joseph Weiss is an industry expert on control systems and electronic security of control systems, with more than 30 years of experience in the energy industry. Mr. Weiss spent more than 14 years at the Electric Power Research Institute (EPRI) where he led a variety of programs including the Nuclear Plant Instrumentation and Diagnostics Program, the Fossil Plant Instrumentation Controls Program, the Y2K Embedded Systems Program and, the cyber security for digital control systems. As Technical Manager, Enterprise Infrastructure Security (EIS) Program, he provided technical and outreach leadership for the energy industrys critical infrastructure protection (CIP) program. He was responsible for developing many utility industry security primers and implementation guidelines. He was also the EPRI Exploratory Research lead on instrumentation, controls, and communications. Mr. Weiss serves as a member of numerous organizations related to control system security. These include the North American Electric Reliability Council (NERC) Critical Infrastructure Protection Committee (CIPC), the International Electrotechnical Commission (IEC) Technical Committee (TC) 57 Working Group 15 - Data and Communication Security, the Process Controls Security Requirements Forum, CIGR Joint Working Group D2/B3/C2 01- Security for Information Systems and Intranets in Electric Power Systems, and other industry working groups. He serves as the Task Force Lead for review of information security impacts on IEEE standards. He is also a Director on ISA’s Standards and Practices Board. Mr. Weiss was involved in the development of, and participated in, the April 2002 White House Conference on CIP Developing Secure Digital/Electronic Process Control Systems for the Nation’s Critical Infrastructures. He was an invited speaker at the NIST/NSA Information Security Summit and provided testimony before three Congressional subcommittees. He is also an invited speaker at many industry and vendor user group security conferences, has chaired numerous panel sessions on control system security, and is often quoted throughout the industry. He holds two patents and has published over 60 papers on instrumentation, controls, and diagnostics including a chapter on cyber security for Electric Power Substations Engineering. Mr. Weiss has conducted several SCADA, substation, plant control system, and water systems vulnerability and risk assessments and conducted short courses on control system security. He also established and chairs the annual Control System Cyber Security Workshop and established the International Standards Coordination Meeting on Control System Cyber Security. Mr. Weiss has received numerous industry awards, including EPRI Presidents Award (2002) and is an ISA Fellow and a member of the ISA Engineering, Science, and Technology Policy Committee. He has two patents on instrumentation and control systems and is a registered professional engineer in the State of California and a Certified Information Security Manager.

" Cyber Security in Electrical Power Stations " presented by Joe Weiss, PE, CISM, Applied Control Solutions, LLC

Back to Top