Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/

Size: px
Start display at page:

Download "Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL http://www.ansatt.hig.no/s uley/"

Transcription

1 Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain to

2 Gjøvik University College (GUC) Høgskolen i Gjøvik (HIG) GUC has 3 faculties: Health, Care and Nursing (HOS) Engineering (TØL) Computer Science and Media Technology (IMT) Dean: Dr. Morten Irgens The IMT faculty has 2 sections: Media Technology Laboratory (MTL) Director: Ass.Prof. Terje Stafseng Norwegian Information Security Laboratory (NISlab) Director: Ass.Prof. Nils Kalstad Svendsen

3 Norwegian Information Security Laboratory (NISlab) Offers BSc, MSc and PhD in Information Security (IS) Covers full spectrum of IS, both technical and management related topics Both in education and in research Two focus labs: Digital Forensic Lab (Testimon) Norwegian Biometrics Laboratory (NBL)

4 NISlab Established in 2003 supported by Telenor, Norsk Tipping, PricewaterhouseCoopers, Thales, DnB NOR and Sparebanken Hedmark NISlecture: a free monthly event on current issues in information security and are available to general audience in Norway. ( Top-3 information security research group in Europe 50 staff members (35 FTE) 300 BS/MS/PhD students Focused laboratories in Biometrics and Forensics. Coordinates COINS Research School of Computer and Information Security ( Head of section: Nils Kalstad Svendsen nilss@hig.no Work:

5 Digital Forensic Lab All topics related to Digital Forensics: Research in Digital and Computational Forensics Pattern Recognition Image analysis

6 Norwegian Biometrics Laboratory All topics related to biometrics: Fingerprint, finger vein, ear, 2D and 3D face, iris, retina, signature, gait, keystroke and mouse dynamics, dental biometrics Performance analysis and security analysis Standardization and legislation Promotion of Biometrics in Norway and internationally

7 The Norwegian Biometrics Laboratory Furthermore we focus on privacy enhancing technologies such as biometric template protection and integration in physical and logical access control. The Biometrics lab is an active member in the European Association for Biometrics and co-organizer of the international conference BIOSIG. Established and directed by Prof. Christoph Busch Biometric authentication of patient identity

8 Research Topics NISlab Authentication Biometrics Computational forensics CIP/CIIP (Critical Infastructure Systems) Cryptology Information security engineering IDS / IPS Network / Internet / Wireless security

9 Research Topics NISlab Pattern recognition / Computational intelligence Risk analysis / Security metrics Security management Side channel attacks Signal and image processing

10 Master in Information Security (MIS) Program started in 2002 Mostly students from industry Officially under the KTH Royal Institute of Technology, Stockholm, Sweden (only first year) Program got accredited by the Norwegian Agency for Quality of Assurance in Education (NOKUT) in 2002

11 Master in Information Security (MIS) First few years a 50/50 mix of full time students (continuation of BSc studies) and part time students (already working in industry) More recent: 33/33/33 mix of full time Norwegian students, part time students, and full time foreign students China, India, Finland, Germany, Eastern Europe,

12 Master Information Security (MIS) Started with 1 track: Contained both technical courses and management related courses Since 2007 we have 2 tracks: Based on student feedback we split in Management track and Technology track Since 2010 we have 3 tracks: Based on knowledge of the market needs we added a track in Digital Forensics

13 Courses Generally: ALL courses are taught in English Teaching staff is highly international Germany, Norway, Netherlands, Serbia, Turkey, Switzerland, Canada PhD students as Teaching Assistants Use of CMS (course management system) available to students for storage of course materials (can include audio/video recordings)

14 Future jobs? Short list of where our previous students got jobs: Telenor, EDB, DNV, Ergo, Accenture, E&Y, PwC, Statoil- Hydro, Hafslund, Kongsberg, Statkraft, DnBNOR, Terra, SpareBank1, Gjensidige, BBS, FSA (Jørstadmoen), FFI, NSM, PST, SKD, Mnemonic, Secode, Buypass, IBAS, NorSIS, Protego, Commfides, Bluegarden, Opera, WebDeal, IQ, IPnett, Virinco, Innit, Conax, Motion Recording, Norsvin, Eidsiva Energi Nett, Telenor Cinclus, Geoservice, Dokka vidergående skole, GUC In general will good students get a job even before they finished:

15 Centre for Cyber and Information Security Mission: A functional and secure society National centre for: - Research and competence - Applications - Education - Dissemination Thematic groups: - Cyber defence - Cyber crime investigation - The Norwegian Biometrics Labor - Information Security Managemen - Industrial Control Systems - Privacy and legal aspects 80 persons 60 FTE

16 Ongoing Projects AEP - Academic Exchange for Progress ( Info ) ASSET - Adaptive Security, Smart Internet of Things, Adaptive Risk Management, Estimation and Predication ( Info ) COINS ( Info ) CompFor FIDELITY ( Info ) FRISC ( Info ) Hitachi Central Research Laboratory ( Info ) Hitachi project ( Info ) Idex project ( Info ) Machine Learning for Security and Forensics NIST project ( Info ) PetWeb II ( Info ) SuPLight ( Info ) SKYLINE TACTICS Torn Document Analysis

17 My two active lines of research works are as follows: Secure Technologies for: Sport Events (by Identity Management and human behavior/face surveillance) Border Crossing points (by mobile Identity Management) Safer Internet ( by Video Content Analysis) Pervasive Health Data Transfer of Intelligent Sensors through Wireless Infrastructures and mobile communication networks Ambient assisted intelligent travel companions for safe travel (see a related video here), Semantic Web, Ontology Modeling, Agent based and Learning Systems Tools are (mobile) biometrics, sub-symbolic methods of artificial intelligence, Cognitive modeling, Robotics, Machine Vision

18 Research Projects in Establishment Identification at border crossing points with mobile devices using biometrics (Euripides) Biometrics for sport event arenas and CCTV cameras for de-identification The use of social networks for/in law enforcement. STSM Visit to NISLAB?

19 Secure Technologies needed where? in electronic health (e-health) Systems for making Internet Safer for Border Crossing Points for Crowd Management E-banking ATM Cloud computing Nislab 10th Year! HIG DFRC quadcopter 19 Micro-UAV

20 Looking for Pieces of Evidence Tiny Pieces of Evidence are hidden in a mostly Chaotic Environment IntelliBrain bot, HI An example case for a flying robot to cover and d i

21 Contact: SuleYildirim-Yayilgan Patrick Bours

NISlab - Norwegian Information Security laboratory

NISlab - Norwegian Information Security laboratory NISlab - Norwegian Information Security laboratory 11. oktober 2007 What is information security? Information security encompasses the study of the concepts, techniques, technical measures, and administrative

More information

center for cyber- and information security a shared commitment to the nation s research and expertise development

center for cyber- and information security a shared commitment to the nation s research and expertise development center for cyber- and information security a shared commitment to the nation s research and expertise development 1 2 OUR INCREASED VULNERABILITY Our increased reliance on Information and Communication

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Norway and the Nordic s

Norway and the Nordic s Cyber Security Education 2.0: Minding the Gap for Computational Sovereignty in Norway and the Nordic s Professor Dr. Stewart Kowalski Information Security Vice Dean of Education Faculty of Computer and

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Center for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15

Center for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15 Center for Cyber and Information Security a shared commitment to the nation s research and expertise development Opening Conference August 15 1 Welcome! We read daily about things that should worry us

More information

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CERTIFIED SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CONTENT CC IN A NUTSHELL CC BACKGROUND AIM AND GOAL OF CC ADVANTAGES OF CC WHY DO WE RECOMMEND CC TO DEVELOPERS? WHEN IS CC THE RIGHT CHOICE?

More information

Summary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions

Summary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions Summary Report Report # 1 Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions COINS Summer School 2015 on Could Security Prepared by: Nabeel Ali

More information

Full professor and 6 assistant professors of IT A new school in IT Cameroon

Full professor and 6 assistant professors of IT A new school in IT Cameroon We are pleased to present our selection of the academic vacancies at Computeroxy.com - your academic website exclusively dedicated to careers in schools of computer, electrical and mathematical sciences

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

EIT ICT Labs The ICT Innovation Catalyst for Europe

EIT ICT Labs The ICT Innovation Catalyst for Europe Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed

More information

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation

Graduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France

More information

CALL FOR PAPERS. Thessaloniki Greece. http://www.seerc.org/dsc2014/

CALL FOR PAPERS. Thessaloniki Greece. http://www.seerc.org/dsc2014/ CALL FOR PAPERS 9 th Annual South East European Doctoral Student Conference Thursday 25 th & Friday 26 th September 2014 Thessaloniki Greece http://www.seerc.org/dsc2014/ Building on the success of the

More information

JOINT INTERNATIONAL DOCTORAL (PH.D.) DEGREE in LAW, SCIENCE AND TECHNOLOGY. Prof. Dr. Mindaugas Kiškis mkiskis@mruni.eu, www.kiskis.

JOINT INTERNATIONAL DOCTORAL (PH.D.) DEGREE in LAW, SCIENCE AND TECHNOLOGY. Prof. Dr. Mindaugas Kiškis mkiskis@mruni.eu, www.kiskis. JOINT INTERNATIONAL DOCTORAL (PH.D.) DEGREE in LAW, SCIENCE AND TECHNOLOGY Prof. Dr. Mindaugas Kiškis mkiskis@mruni.eu, www.kiskis.eu Mykolas Romeris University Research Priority research area of Mykolas

More information

Cyber Security and Digital Forensics Training Platform

Cyber Security and Digital Forensics Training Platform Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement

More information

Electronic Citizen Identities and Strong Authentication

Electronic Citizen Identities and Strong Authentication Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China Ms. Hemali Shah Department of Business Law and Taxation Monash University Australia Import-Export

More information

Digital Forensics: Current and Future Needs

Digital Forensics: Current and Future Needs Digital Forensics: Current and Future Needs Katrin Franke Norwegian Information Security Laboratory (NISlab) Gjøvik University College www.nislab.no 1 Crime in the Modern World Massive amount of data:

More information

Appendices master s degree programme Artificial Intelligence 2014-2015

Appendices master s degree programme Artificial Intelligence 2014-2015 Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for

More information

ES Research at the Electrical Engineering School

ES Research at the Electrical Engineering School ES Research at the Electrical Engineering School Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/ Societal Challenges Intelligent Transportation

More information

Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information. IHE Europe Peter Mildenberger (User Co Chair)

Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information. IHE Europe Peter Mildenberger (User Co Chair) Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information IHE Europe Peter Mildenberger (User Co Chair) Real World (outside Healthcare) Use Cases in Healthcare

More information

Master s Programme in ICT Innovation

Master s Programme in ICT Innovation Master s Programme in ICT Innovation Degree Programme in Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Majors: Digital Media Technology (xxxx) Distributed

More information

Security and Privacy Challenges of Biometric Authentication for Online Transactions

Security and Privacy Challenges of Biometric Authentication for Online Transactions Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532

More information

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

SECURITY BIOMETRICS PDF

SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

Landscape of eid in Europe in 2013

Landscape of eid in Europe in 2013 Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

URBAN SECURITY & POLICING

URBAN SECURITY & POLICING URBAN SECURITY & POLICING An Indian Perspective Pronab Mohanty IPS Joint Commissioner Police Bangalore City 1 What is Urban? Where to Draw the Line? Should Criteria be Population Alone? Degrees of Urban

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

SURVEILLANCE ENHANCED FACE RECOGNITION

SURVEILLANCE ENHANCED FACE RECOGNITION SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly

More information

Introduction to the Biometrics Institute Wellington, 19 May 2015. Isabelle Moeller Biometrics Institute

Introduction to the Biometrics Institute Wellington, 19 May 2015. Isabelle Moeller Biometrics Institute Introduction to the Biometrics Institute Wellington, 19 May 2015 Isabelle Moeller Biometrics Institute Who am I? Who can I trust? Can you trust me? About the Biometrics Institute Founded in 2001. The Biometrics

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

http://iew3.technion.ac.il/

http://iew3.technion.ac.il/ Faculty of Industrial Engineering & Management The Technion Israel Institute of Technology http://iew3.technion.ac.il/ Professor Boaz Golany, Dean History Spun out of Mech. Eng. in 1958 Unique combination

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway

BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway BIG DATA & Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway 1 Computational Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway

More information

DARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS

DARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS DARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS Dr Neil Costigan BehavioSec Ingo Deutschmann BehavioSec Session ID: SEC-105 Session Classification: Intermediate Overview DARPA s Active Authentication

More information

Biometrics and soft biometrics for people identification

Biometrics and soft biometrics for people identification Biometrics and soft biometrics for people identification Prof. Rita Cucchiara Imagelab Dipartimento di Ingegneria dell Informazione Facoltà di Ingegneria Enzo Ferrari Università degli Studi di Modena e

More information

ICT Research in Norway The road ahead. Till Christopher Lech The Research Council of Norway

ICT Research in Norway The road ahead. Till Christopher Lech The Research Council of Norway ICT Research in Norway The road ahead Till Christopher Lech The Research Council of Norway, The remainder of this presentation: The view back The view on the present The view forward Public investments

More information

The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova

The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova Realize the Power of Information Non-profit consortium representing leading companies that supply

More information

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS

HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS 8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Summary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China

Summary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China Summary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China Drafted by Wan-hua Ma Dr. The Graduate School of Education Peking University. The UNESCO Chair program

More information

Reflection Report International Semester

Reflection Report International Semester Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:

More information

A very brief introduction to Electronic Engineering & Computer Science. Geraint A. Wiggins Professor of Computational Creativity & Head of School

A very brief introduction to Electronic Engineering & Computer Science. Geraint A. Wiggins Professor of Computational Creativity & Head of School A very brief introduction to Electronic Engineering & Computer Science Geraint A. Wiggins Professor of Computational Creativity & Head of School Example Careers Engineering and Computer Science solves

More information

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of

More information

Pre-Commercial Procurement (PCP)

Pre-Commercial Procurement (PCP) Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal

More information

2015 Analyst and Advisor Summit

2015 Analyst and Advisor Summit 2015 Analyst and Advisor Summit Solutions for Government Venkatapathi Puvvada, Senior Vice President and President, Unisys Federal Systems David Leichner, Vice President, Public Sector, US & Canada Agenda

More information

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research at the Department of Computer Science and Software Engineering Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research Areas Ar%ficial intelligence Robo%cs Data mining Image

More information

Wireless network traffic worldwide: forecasts and analysis 2014 2019

Wireless network traffic worldwide: forecasts and analysis 2014 2019 Research Forecast Report Wireless network traffic worldwide: forecasts and analysis 2014 2019 October 2014 Rupert Wood 2 About this report This report presents 5-year forecasts of wireless data traffic

More information

Structure, Organisation and Quality Assurance

Structure, Organisation and Quality Assurance PhD Education in Norway Structure, Organisation and Quality Assurance Third EUA-CDE Annual Meeting, Berlin 4 5 June 2010 Terje Mørland, Director General NOKUT Norwegian Agency for Quality Assurance in

More information

PhD Education in Norway Structure, Organisation and Quality Assurance

PhD Education in Norway Structure, Organisation and Quality Assurance PhD Education in Norway Structure, Organisation and Quality Assurance Third EUA-CDE Annual Meeting, Berlin 4 5 June 2010 Terje Mørland, Director General NOKUT Norwegian Agency for Quality Assurance in

More information

20 years of Telemedicine in Tromsø, Norway

20 years of Telemedicine in Tromsø, Norway Lecture title: 20 years of Telemedicine in Tromsø, Norway Abstract: The lecture gives an overview of telemedicine in Tromsø and North Norway since the first telemedicine projects were started in 1987-1988.

More information

Collaboration with industry and doctoral education at Politecnico di Milano

Collaboration with industry and doctoral education at Politecnico di Milano Collaboration with industry and doctoral education at Politecnico di Milano Prof. Barbara Pernici Head of the PhD School Politecnico di Milano barbara.pernici@polimi.it Politecnico di Milano 2 State university

More information

MCDC Marketers & Consumers Digital & Connected. Focus on Hungary

MCDC Marketers & Consumers Digital & Connected. Focus on Hungary MCDC Marketers & Consumers Digital & Connected Focus on Hungary EUROPEANS ON THE WEB A GOLDMINE Wealth of information on European consumers online Engagement, activities and attitudes An online survey

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

First e-mail to be sent to selected students after course enrollment

First e-mail to be sent to selected students after course enrollment First e-mail to be sent to selected students after course enrollment Subject Line Suggestion: Important Exam Info Greetings, One of the courses you signed up for (xxx-xxx-xx Course Name) requires students

More information

2016 Outlook of the Global Security Industry

2016 Outlook of the Global Security Industry Brochure More information from http://www.researchandmarkets.com/reports/3623776/ 2016 Outlook of the Global Security Industry Description: Being aware of future cyber threats and trends at the national

More information

IoTSec - Security in IoT for Smart Grids

IoTSec - Security in IoT for Smart Grids www.nr.no IoTSec - Security in IoT for Smart Grids AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners Habtamu Abie, Norwegian Computing Center - NR IFI/Oslo 09/10/2015 IoTSec - Challenges

More information

Global Deployment of Finger Vein Authentication

Global Deployment of Finger Vein Authentication Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region

IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption Steven Frantzen Senior Vice President, EMEA Region January 2015 The New World Versus the Old World Incoming Airbus

More information

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Facial Comparison and FBI Identification Training

Facial Comparison and FBI Identification Training Facial Comparison and FBI Identification Training Module 1: Introduction to the FBI Face Training Program This work product is solely the product of the FBI. It was created for educational purposes only.

More information

KOZMINSKI UNIVERSITY

KOZMINSKI UNIVERSITY KOZMINSKI UNIVERSITY The Oxford of Central and Eastern Europe* Education at KOZMINSKI - Prestige throughout the World *WPROST 05/2007 KOZMINSKI UNIVERSITY General Information Founded in 1993 #1 business

More information

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator

EUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Software Only Biometrics to Authenticate Student ID

Software Only Biometrics to Authenticate Student ID Software Only Biometrics to Authenticate Student ID Report of Pilot with the University of Texas System TeleCampus Prepared by: Lori McNabb MS Assistant Director, Student and Faculty Services University

More information

How To Protect Your Business With Cms.Com

How To Protect Your Business With Cms.Com Security and Workforce Solutions Assurance and Security for a De-Perimeterised World IP-based digital cameras and Analytics are revolutionising the security and surveillance market. They help in detection

More information

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation. Mission Statement The mission of the Security Industry Association (SIA) Standards Committee is to develop and promote the use of technology and application standards for the security industry; provide

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

Cyber Security Training for Journalists, 25 27 May Leuven

Cyber Security Training for Journalists, 25 27 May Leuven Cyber Security Training for Journalists, 25 27 May Leuven The European Federation of Journalists (EFJ) and the European Trade Union Institute (ETUI) are organising a two-day Cyber Security Training for

More information

Bachelor in Computer Engineering. Brightest. The Best and. World-class education ΑΙΤ makes it possible

Bachelor in Computer Engineering. Brightest. The Best and. World-class education ΑΙΤ makes it possible Bachelor in Computer Engineering The Best and Brightest World-class education ΑΙΤ makes it possible Bachelor in Computer Engineering www.ait.gr/bsc Start thinking about A high quality education AIT is

More information

The Vision for. the Internet of Things

The Vision for. the Internet of Things The Vision for the Internet of Things CS525T Fall 2015 Internet of Things (IoT) CS525 IoT Vision 2 Cisco Commercial CS525 IoT Vision 3 A Few IoT Facts The phrase Internet of Things was first used in 1999.

More information

LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE

LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE 161214 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:

More information

Health Informatics and Artificial Intelligence: the next big thing in health/aged care

Health Informatics and Artificial Intelligence: the next big thing in health/aged care Health Informatics and Artificial Intelligence: the next big thing in health/aged care Professor Michael Blumenstein Griffith University ACSA National Conference, Adelaide Tuesday, September 9 th 2014

More information

Collaboration between Business Schools and Enterprises. Professor Chris Styles Associate Dean, Executive Education

Collaboration between Business Schools and Enterprises. Professor Chris Styles Associate Dean, Executive Education Collaboration between Business Schools and Enterprises Professor Chris Styles Associate Dean, Executive Education Agenda The value proposition for collaboration Examples of different types of collaboration

More information

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda

More information

ECE 646 - Lecture 1. Security Services. Need for information security. widespread use of data processing equipment: computer security

ECE 646 - Lecture 1. Security Services. Need for information security. widespread use of data processing equipment: computer security ECE 646 - Lecture 1 Security Services Need for information security widespread use of data processing equipment: computer security widespread use of computer networks and distributed computing systems:

More information

Agenda. Company Platform Customers Partners Competitive Analysis

Agenda. Company Platform Customers Partners Competitive Analysis KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration

More information

32 nd National Conference on Law & Higher Education

32 nd National Conference on Law & Higher Education 32 nd National Conference on Law & Higher Education Improving the Quality of Student Learning Improving the quality of student learning and the level of degree attainment through common degree requirements

More information

A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech

A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS MEDITERRANEAN DAYS CAMPUS SophiaTech 13 March 2014 INTRODUCTION Created in 1991 by a consortium of universities under the lead of

More information

Marketing Masters courses for professionals. MA Marketing MSc International Marketing MSc Marketing Communications

Marketing Masters courses for professionals. MA Marketing MSc International Marketing MSc Marketing Communications Marketing Masters courses for professionals MA Marketing MSc International Marketing MSc Marketing Communications NO1 Ranked for student satisfaction for marketing courses in London by National Student

More information