Tuesday, October 4, 2016
|
Track 1
|
Track 2
|
Track 3
|
|
|---|---|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
||
|
Track 1
|
Track 2
|
|
|---|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
|
|
Track 3
|
|
|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
|
Track 1
|
|
|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
|
Track 2
|
|
|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
|
Track 3
|
|
|---|---|
| 6:00 PM - 7:30 PM |
Welcome Reception
|
Wednesday, October 5, 2016
Thursday, October 6, 2016
|
Track 3
|
|
|---|---|
| 7:30 AM - 9:00 AM |
Registration
|
| 9:00 AM - 9:05 AM |
Welcome Day Two
|
| 9:05 AM - 9:30 AM |
Day 2 Keynote
|
|
Cyber Program 1
|
|
| 9:35 AM - 10:35 AM | 1. "Hardware Hacking Chronicles: loT Hacking for Offense and Defence" Context Information Security |
| 2. "Using Surrogate Red Teaming to better understanding the contested EW environment in Asia Pacific region" Chemring | |
| 3. "An Exploration of named Data Networking" DSTG | |
| 10:35 AM - 11:00 AM |
Morning tea
|
| 11:00 AM - 12:00 PM |
Keynote Panel Discussion: "EW/cyber/IO challenges and opportunities in the evolving Asia-Pacific Region"
|
| 12:00 PM - 1:00 PM |
Lunch
|
|
Cyber Program 2
|
|
| 1:00 PM - 2:00 PM | 4. "Network Abstractions in Semantic Graphs" DSTG |
| 5. " OSPF Multi - Area Topology Reconstruction from a Single Area by combining LSA Snooping and Traceroute" DSTG | |
| 6. "The Cyber Range: Red Team Vs Blue Team Attack Training" Context Information Security | |
| 2:00 PM - 2:30 PM |
Afternoon tea
|
| 2:30 PM - 3:30 PM | |
| 3:40 PM - 4:00 PM |
Joint EW in the context of the Australian 2016 White Paper
|
| 4:00 PM - 4:15 PM |
Conference Close - AOC Australia President
|
|
Track 2
|
|
|---|---|
| 7:30 AM - 9:00 AM |
Registration
|
| 9:00 AM - 9:05 AM |
Welcome Day Two
|
| 9:05 AM - 9:30 AM |
Day 2 Keynote
|
|
Test and Evaluation
|
|
| 9:35 AM - 10:35 AM | 1. "Architechture Topology and Methodology fpr Testing Modern Wireless Communication systems' Susceptibility to Interference" DSTG |
| 2. "Spectrum implications on Range Management as a result of changing EW Environment" Defence Spectrum Office | |
| 3. "The Australian Airbone Coutermeasures Team Large Tracking Mount" DSTG | |
| 10:35 AM - 11:00 AM |
Morning tea
|
| 11:00 AM - 12:00 PM |
Keynote Panel Discussion: "EW/cyber/IO challenges and opportunities in the evolving Asia-Pacific Region"
|
| 12:00 PM - 1:00 PM |
Lunch
|
|
Electronic Warfare Operational Support
|
|
| 1:00 PM - 2:00 PM |
1. “A Survivability and Tactical Validation Program (STVP) for Land & Maritime”
|
|
2."The Problem With Electronic Warfare Reprogramming"
|
|
| 3."Dynamic EW Reprogramming:A paradigm shift in EW operations" DSTG | |
| 2:00 PM - 2:30 PM |
Afternoon tea
|
|
Electronic Countermeasures
|
|
| 2:30 PM - 3:30 PM | 1"Simulation of Cross-Eye Deception" Thales |
| 2"Force Protection Electronic Countermeasures Development and Validation in the Australian Army" | |
| 3"Pyrotechnic Infrared Emission from PyrFilm for Electronic Warfare Countermeasures" DSTG | |
| 3:40 PM - 4:00 PM |
Joint EW in the context of the Australian 2016 White Paper
|
| 4:00 PM - 4:15 PM |
Conference Close - AOC Australia President
|
|
Track 3
|
|
|---|---|
| 7:30 AM - 9:00 AM |
Registration
|
| 9:00 AM - 9:05 AM |
Welcome Day Two
|
| 9:05 AM - 9:30 AM |
Day 2 Keynote
|
|
Cyber Program 1
|
|
| 9:35 AM - 10:35 AM | 1. "Hardware Hacking Chronicles: loT Hacking for Offense and Defence" Context Information Security |
| 2. "Using Surrogate Red Teaming to better understanding the contested EW environment in Asia Pacific region" Chemring | |
| 3. "An Exploration of named Data Networking" DSTG | |
| 10:35 AM - 11:00 AM |
Morning tea
|
| 11:00 AM - 12:00 PM |
Keynote Panel Discussion: "EW/cyber/IO challenges and opportunities in the evolving Asia-Pacific Region"
|
| 12:00 PM - 1:00 PM |
Lunch
|
|
Cyber Program 2
|
|
| 1:00 PM - 2:00 PM | 4. "Network Abstractions in Semantic Graphs" DSTG |
| 5. " OSPF Multi - Area Topology Reconstruction from a Single Area by combining LSA Snooping and Traceroute" DSTG | |
| 6. "The Cyber Range: Red Team Vs Blue Team Attack Training" Context Information Security | |
| 2:00 PM - 2:30 PM |
Afternoon tea
|
| 2:30 PM - 3:30 PM | |
| 3:40 PM - 4:00 PM |
Joint EW in the context of the Australian 2016 White Paper
|
| 4:00 PM - 4:15 PM |
Conference Close - AOC Australia President
|