Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/
|
|
- Amelia Cameron
- 8 years ago
- Views:
Transcription
1 Şule Yildirim Yayilgan, PhD, Associate Professor, NISLAB NBL uley/ COST Action: IC1206 Tecnocampus Mataro Maresme, Mataro, Spain to
2 Gjøvik University College (GUC) Høgskolen i Gjøvik (HIG) GUC has 3 faculties: Health, Care and Nursing (HOS) Engineering (TØL) Computer Science and Media Technology (IMT) Dean: Dr. Morten Irgens The IMT faculty has 2 sections: Media Technology Laboratory (MTL) Director: Ass.Prof. Terje Stafseng Norwegian Information Security Laboratory (NISlab) Director: Ass.Prof. Nils Kalstad Svendsen
3 Norwegian Information Security Laboratory (NISlab) Offers BSc, MSc and PhD in Information Security (IS) Covers full spectrum of IS, both technical and management related topics Both in education and in research Two focus labs: Digital Forensic Lab (Testimon) Norwegian Biometrics Laboratory (NBL)
4 NISlab Established in 2003 supported by Telenor, Norsk Tipping, PricewaterhouseCoopers, Thales, DnB NOR and Sparebanken Hedmark NISlecture: a free monthly event on current issues in information security and are available to general audience in Norway. ( Top-3 information security research group in Europe 50 staff members (35 FTE) 300 BS/MS/PhD students Focused laboratories in Biometrics and Forensics. Coordinates COINS Research School of Computer and Information Security ( Head of section: Nils Kalstad Svendsen nilss@hig.no Work:
5 Digital Forensic Lab All topics related to Digital Forensics: Research in Digital and Computational Forensics Pattern Recognition Image analysis
6 Norwegian Biometrics Laboratory All topics related to biometrics: Fingerprint, finger vein, ear, 2D and 3D face, iris, retina, signature, gait, keystroke and mouse dynamics, dental biometrics Performance analysis and security analysis Standardization and legislation Promotion of Biometrics in Norway and internationally
7 The Norwegian Biometrics Laboratory Furthermore we focus on privacy enhancing technologies such as biometric template protection and integration in physical and logical access control. The Biometrics lab is an active member in the European Association for Biometrics and co-organizer of the international conference BIOSIG. Established and directed by Prof. Christoph Busch Biometric authentication of patient identity
8 Research Topics NISlab Authentication Biometrics Computational forensics CIP/CIIP (Critical Infastructure Systems) Cryptology Information security engineering IDS / IPS Network / Internet / Wireless security
9 Research Topics NISlab Pattern recognition / Computational intelligence Risk analysis / Security metrics Security management Side channel attacks Signal and image processing
10 Master in Information Security (MIS) Program started in 2002 Mostly students from industry Officially under the KTH Royal Institute of Technology, Stockholm, Sweden (only first year) Program got accredited by the Norwegian Agency for Quality of Assurance in Education (NOKUT) in 2002
11 Master in Information Security (MIS) First few years a 50/50 mix of full time students (continuation of BSc studies) and part time students (already working in industry) More recent: 33/33/33 mix of full time Norwegian students, part time students, and full time foreign students China, India, Finland, Germany, Eastern Europe,
12 Master Information Security (MIS) Started with 1 track: Contained both technical courses and management related courses Since 2007 we have 2 tracks: Based on student feedback we split in Management track and Technology track Since 2010 we have 3 tracks: Based on knowledge of the market needs we added a track in Digital Forensics
13 Courses Generally: ALL courses are taught in English Teaching staff is highly international Germany, Norway, Netherlands, Serbia, Turkey, Switzerland, Canada PhD students as Teaching Assistants Use of CMS (course management system) available to students for storage of course materials (can include audio/video recordings)
14 Future jobs? Short list of where our previous students got jobs: Telenor, EDB, DNV, Ergo, Accenture, E&Y, PwC, Statoil- Hydro, Hafslund, Kongsberg, Statkraft, DnBNOR, Terra, SpareBank1, Gjensidige, BBS, FSA (Jørstadmoen), FFI, NSM, PST, SKD, Mnemonic, Secode, Buypass, IBAS, NorSIS, Protego, Commfides, Bluegarden, Opera, WebDeal, IQ, IPnett, Virinco, Innit, Conax, Motion Recording, Norsvin, Eidsiva Energi Nett, Telenor Cinclus, Geoservice, Dokka vidergående skole, GUC In general will good students get a job even before they finished:
15 Centre for Cyber and Information Security Mission: A functional and secure society National centre for: - Research and competence - Applications - Education - Dissemination Thematic groups: - Cyber defence - Cyber crime investigation - The Norwegian Biometrics Labor - Information Security Managemen - Industrial Control Systems - Privacy and legal aspects 80 persons 60 FTE
16 Ongoing Projects AEP - Academic Exchange for Progress ( Info ) ASSET - Adaptive Security, Smart Internet of Things, Adaptive Risk Management, Estimation and Predication ( Info ) COINS ( Info ) CompFor FIDELITY ( Info ) FRISC ( Info ) Hitachi Central Research Laboratory ( Info ) Hitachi project ( Info ) Idex project ( Info ) Machine Learning for Security and Forensics NIST project ( Info ) PetWeb II ( Info ) SuPLight ( Info ) SKYLINE TACTICS Torn Document Analysis
17 My two active lines of research works are as follows: Secure Technologies for: Sport Events (by Identity Management and human behavior/face surveillance) Border Crossing points (by mobile Identity Management) Safer Internet ( by Video Content Analysis) Pervasive Health Data Transfer of Intelligent Sensors through Wireless Infrastructures and mobile communication networks Ambient assisted intelligent travel companions for safe travel (see a related video here), Semantic Web, Ontology Modeling, Agent based and Learning Systems Tools are (mobile) biometrics, sub-symbolic methods of artificial intelligence, Cognitive modeling, Robotics, Machine Vision
18 Research Projects in Establishment Identification at border crossing points with mobile devices using biometrics (Euripides) Biometrics for sport event arenas and CCTV cameras for de-identification The use of social networks for/in law enforcement. STSM Visit to NISLAB?
19 Secure Technologies needed where? in electronic health (e-health) Systems for making Internet Safer for Border Crossing Points for Crowd Management E-banking ATM Cloud computing Nislab 10th Year! HIG DFRC quadcopter 19 Micro-UAV
20 Looking for Pieces of Evidence Tiny Pieces of Evidence are hidden in a mostly Chaotic Environment IntelliBrain bot, HI An example case for a flying robot to cover and d i
21 Contact: SuleYildirim-Yayilgan Patrick Bours
NISlab - Norwegian Information Security laboratory
NISlab - Norwegian Information Security laboratory 11. oktober 2007 What is information security? Information security encompasses the study of the concepts, techniques, technical measures, and administrative
More informationcenter for cyber- and information security a shared commitment to the nation s research and expertise development
center for cyber- and information security a shared commitment to the nation s research and expertise development 1 2 OUR INCREASED VULNERABILITY Our increased reliance on Information and Communication
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationNorway and the Nordic s
Cyber Security Education 2.0: Minding the Gap for Computational Sovereignty in Norway and the Nordic s Professor Dr. Stewart Kowalski Information Security Vice Dean of Education Faculty of Computer and
More informationBiometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationCenter for Cyber and Information Security. a shared commitment to the nation s research and expertise development. Opening Conference August 15
Center for Cyber and Information Security a shared commitment to the nation s research and expertise development Opening Conference August 15 1 Welcome! We read daily about things that should worry us
More informationCERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA
CERTIFIED SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA CONTENT CC IN A NUTSHELL CC BACKGROUND AIM AND GOAL OF CC ADVANTAGES OF CC WHY DO WE RECOMMEND CC TO DEVELOPERS? WHEN IS CC THE RIGHT CHOICE?
More informationSummary Report Report # 1. Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions
Summary Report Report # 1 Security Challenges of Cross-Border Use of Cloud Services under Special Consideration of ENISA s Contributions COINS Summer School 2015 on Could Security Prepared by: Nabeel Ali
More informationFull professor and 6 assistant professors of IT A new school in IT Cameroon
We are pleased to present our selection of the academic vacancies at Computeroxy.com - your academic website exclusively dedicated to careers in schools of computer, electrical and mathematical sciences
More informationCyber Security @ DTU. Lars Ramkilde Knudsen
Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About
More informationEIT ICT Labs The ICT Innovation Catalyst for Europe
Start-Chart EIT ICT Labs The ICT Innovation Catalyst for Europe Prof. Dr. Willem Jonker CEO willem.jonker@ictlabs.eu EIT ICT Labs mission is to turn Europe into a global leader in ICT Innovation Breed
More informationGraduate Survey. Graduate Survey. MSc Forensic Computing & Cybercrime Investigation
Graduate Survey Graduate Survey MSc Forensic Computing & Cybercrime Investigation 300+ students from 47 countries Ireland Netherlands UK Germany Italy Romania Denmark Austria New Zealand Greece France
More informationCALL FOR PAPERS. Thessaloniki Greece. http://www.seerc.org/dsc2014/
CALL FOR PAPERS 9 th Annual South East European Doctoral Student Conference Thursday 25 th & Friday 26 th September 2014 Thessaloniki Greece http://www.seerc.org/dsc2014/ Building on the success of the
More informationJOINT INTERNATIONAL DOCTORAL (PH.D.) DEGREE in LAW, SCIENCE AND TECHNOLOGY. Prof. Dr. Mindaugas Kiškis mkiskis@mruni.eu, www.kiskis.
JOINT INTERNATIONAL DOCTORAL (PH.D.) DEGREE in LAW, SCIENCE AND TECHNOLOGY Prof. Dr. Mindaugas Kiškis mkiskis@mruni.eu, www.kiskis.eu Mykolas Romeris University Research Priority research area of Mykolas
More informationCyber Security and Digital Forensics Training Platform
Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement
More informationElectronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content
More information2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
More informationE-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China
E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China Ms. Hemali Shah Department of Business Law and Taxation Monash University Australia Import-Export
More informationDigital Forensics: Current and Future Needs
Digital Forensics: Current and Future Needs Katrin Franke Norwegian Information Security Laboratory (NISlab) Gjøvik University College www.nislab.no 1 Crime in the Modern World Massive amount of data:
More informationAppendices master s degree programme Artificial Intelligence 2014-2015
Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
More informationHitachi to Expand Finger Vein Authentication System Business on a Global Basis
FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for
More informationES Research at the Electrical Engineering School
ES Research at the Electrical Engineering School Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/ Societal Challenges Intelligent Transportation
More informationIntegrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information. IHE Europe Peter Mildenberger (User Co Chair)
Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information IHE Europe Peter Mildenberger (User Co Chair) Real World (outside Healthcare) Use Cases in Healthcare
More informationMaster s Programme in ICT Innovation
Master s Programme in ICT Innovation Degree Programme in Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Majors: Digital Media Technology (xxxx) Distributed
More informationSecurity and Privacy Challenges of Biometric Authentication for Online Transactions
Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532
More informationCenter for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission
Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationSECURITY BIOMETRICS PDF
SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationDevelopment of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More informationURBAN SECURITY & POLICING
URBAN SECURITY & POLICING An Indian Perspective Pronab Mohanty IPS Joint Commissioner Police Bangalore City 1 What is Urban? Where to Draw the Line? Should Criteria be Population Alone? Degrees of Urban
More informationExploring the Landscape of Philippine Cybersecurity
Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright
More informationSURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
More informationIntroduction to the Biometrics Institute Wellington, 19 May 2015. Isabelle Moeller Biometrics Institute
Introduction to the Biometrics Institute Wellington, 19 May 2015 Isabelle Moeller Biometrics Institute Who am I? Who can I trust? Can you trust me? About the Biometrics Institute Founded in 2001. The Biometrics
More informationDIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
More informationhttp://iew3.technion.ac.il/
Faculty of Industrial Engineering & Management The Technion Israel Institute of Technology http://iew3.technion.ac.il/ Professor Boaz Golany, Dean History Spun out of Mech. Eng. in 1958 Unique combination
More informationBiometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
More informationBIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway
BIG DATA & Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway 1 Computational Forensics Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway
More informationDARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS
DARPA ACTIVE AUTHENTICATION PROGRAM: BEHAVIORAL BIOMETRICS Dr Neil Costigan BehavioSec Ingo Deutschmann BehavioSec Session ID: SEC-105 Session Classification: Intermediate Overview DARPA s Active Authentication
More informationBiometrics and soft biometrics for people identification
Biometrics and soft biometrics for people identification Prof. Rita Cucchiara Imagelab Dipartimento di Ingegneria dell Informazione Facoltà di Ingegneria Enzo Ferrari Università degli Studi di Modena e
More informationICT Research in Norway The road ahead. Till Christopher Lech The Research Council of Norway
ICT Research in Norway The road ahead Till Christopher Lech The Research Council of Norway, The remainder of this presentation: The view back The view on the present The view forward Public investments
More informationThe IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova
The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova Realize the Power of Information Non-profit consortium representing leading companies that supply
More informationHOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS
8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL
More informationTHE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationProfessor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia
Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods
More informationBehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
More informationSummary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China
Summary Report to UNESCO for UNESCO Chair program in higher education at Peking University, PR China Drafted by Wan-hua Ma Dr. The Graduate School of Education Peking University. The UNESCO Chair program
More informationReflection Report International Semester
Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:
More informationA very brief introduction to Electronic Engineering & Computer Science. Geraint A. Wiggins Professor of Computational Creativity & Head of School
A very brief introduction to Electronic Engineering & Computer Science Geraint A. Wiggins Professor of Computational Creativity & Head of School Example Careers Engineering and Computer Science solves
More informationIDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
More informationPre-Commercial Procurement (PCP)
Pre-Commercial Procurement (PCP) Tsanidis Vassilis DG CONNECT F2 unit ( Innovation ) Rationale Health care Climate Change Energy Efficiency Transport Security q Public sector is faced with important societal
More information2015 Analyst and Advisor Summit
2015 Analyst and Advisor Summit Solutions for Government Venkatapathi Puvvada, Senior Vice President and President, Unisys Federal Systems David Leichner, Vice President, Public Sector, US & Canada Agenda
More informationResearch at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014
Research at the Department of Computer Science and Software Engineering Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research Areas Ar%ficial intelligence Robo%cs Data mining Image
More informationWireless network traffic worldwide: forecasts and analysis 2014 2019
Research Forecast Report Wireless network traffic worldwide: forecasts and analysis 2014 2019 October 2014 Rupert Wood 2 About this report This report presents 5-year forecasts of wireless data traffic
More informationStructure, Organisation and Quality Assurance
PhD Education in Norway Structure, Organisation and Quality Assurance Third EUA-CDE Annual Meeting, Berlin 4 5 June 2010 Terje Mørland, Director General NOKUT Norwegian Agency for Quality Assurance in
More informationPhD Education in Norway Structure, Organisation and Quality Assurance
PhD Education in Norway Structure, Organisation and Quality Assurance Third EUA-CDE Annual Meeting, Berlin 4 5 June 2010 Terje Mørland, Director General NOKUT Norwegian Agency for Quality Assurance in
More information20 years of Telemedicine in Tromsø, Norway
Lecture title: 20 years of Telemedicine in Tromsø, Norway Abstract: The lecture gives an overview of telemedicine in Tromsø and North Norway since the first telemedicine projects were started in 1987-1988.
More informationCollaboration with industry and doctoral education at Politecnico di Milano
Collaboration with industry and doctoral education at Politecnico di Milano Prof. Barbara Pernici Head of the PhD School Politecnico di Milano barbara.pernici@polimi.it Politecnico di Milano 2 State university
More informationMCDC Marketers & Consumers Digital & Connected. Focus on Hungary
MCDC Marketers & Consumers Digital & Connected Focus on Hungary EUROPEANS ON THE WEB A GOLDMINE Wealth of information on European consumers online Engagement, activities and attitudes An online survey
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationPOSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
More informationFirst e-mail to be sent to selected students after course enrollment
First e-mail to be sent to selected students after course enrollment Subject Line Suggestion: Important Exam Info Greetings, One of the courses you signed up for (xxx-xxx-xx Course Name) requires students
More information2016 Outlook of the Global Security Industry
Brochure More information from http://www.researchandmarkets.com/reports/3623776/ 2016 Outlook of the Global Security Industry Description: Being aware of future cyber threats and trends at the national
More informationIoTSec - Security in IoT for Smart Grids
www.nr.no IoTSec - Security in IoT for Smart Grids AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners Habtamu Abie, Norwegian Computing Center - NR IFI/Oslo 09/10/2015 IoTSec - Challenges
More informationGlobal Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
More informationArtificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationIDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption. Steven Frantzen Senior Vice President, EMEA Region
IDC Predictions 2015 Digital Transformation in the Enterprise: Opportunity and Disruption Steven Frantzen Senior Vice President, EMEA Region January 2015 The New World Versus the Old World Incoming Airbus
More informationIAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED
More informationEncyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
More informationFacial Comparison and FBI Identification Training
Facial Comparison and FBI Identification Training Module 1: Introduction to the FBI Face Training Program This work product is solely the product of the FBI. It was created for educational purposes only.
More informationKOZMINSKI UNIVERSITY
KOZMINSKI UNIVERSITY The Oxford of Central and Eastern Europe* Education at KOZMINSKI - Prestige throughout the World *WPROST 05/2007 KOZMINSKI UNIVERSITY General Information Founded in 1993 #1 business
More informationEUREKA Funding Schema in Turkey. Hüseyin GÖREN EUREKA National Project Coordinator
EUREKA Funding Schema in Turkey Hüseyin GÖREN EUREKA National Project Coordinator İstanbul ITEA2 Event, February 6,2008 EUREKA initiative is... intergovermental, Austria Belgium Croatia Czech Republic
More informationUniversity of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
More informationSoftware Only Biometrics to Authenticate Student ID
Software Only Biometrics to Authenticate Student ID Report of Pilot with the University of Texas System TeleCampus Prepared by: Lori McNabb MS Assistant Director, Student and Faculty Services University
More informationHow To Protect Your Business With Cms.Com
Security and Workforce Solutions Assurance and Security for a De-Perimeterised World IP-based digital cameras and Analytics are revolutionising the security and surveillance market. They help in detection
More informationThe SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.
Mission Statement The mission of the Security Industry Association (SIA) Standards Committee is to develop and promote the use of technology and application standards for the security industry; provide
More informationStatewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
More information2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.
1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the
More informationCyber Security Training for Journalists, 25 27 May Leuven
Cyber Security Training for Journalists, 25 27 May Leuven The European Federation of Journalists (EFJ) and the European Trade Union Institute (ETUI) are organising a two-day Cyber Security Training for
More informationBachelor in Computer Engineering. Brightest. The Best and. World-class education ΑΙΤ makes it possible
Bachelor in Computer Engineering The Best and Brightest World-class education ΑΙΤ makes it possible Bachelor in Computer Engineering www.ait.gr/bsc Start thinking about A high quality education AIT is
More informationThe Vision for. the Internet of Things
The Vision for the Internet of Things CS525T Fall 2015 Internet of Things (IoT) CS525 IoT Vision 2 Cisco Commercial CS525 IoT Vision 3 A Few IoT Facts The phrase Internet of Things was first used in 1999.
More informationLIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE
LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE 161214 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:
More informationHealth Informatics and Artificial Intelligence: the next big thing in health/aged care
Health Informatics and Artificial Intelligence: the next big thing in health/aged care Professor Michael Blumenstein Griffith University ACSA National Conference, Adelaide Tuesday, September 9 th 2014
More informationCollaboration between Business Schools and Enterprises. Professor Chris Styles Associate Dean, Executive Education
Collaboration between Business Schools and Enterprises Professor Chris Styles Associate Dean, Executive Education Agenda The value proposition for collaboration Examples of different types of collaboration
More informationBiometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
More informationECE 646 - Lecture 1. Security Services. Need for information security. widespread use of data processing equipment: computer security
ECE 646 - Lecture 1 Security Services Need for information security widespread use of data processing equipment: computer security widespread use of computer networks and distributed computing systems:
More informationAgenda. Company Platform Customers Partners Competitive Analysis
KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration
More information32 nd National Conference on Law & Higher Education
32 nd National Conference on Law & Higher Education Improving the Quality of Student Learning Improving the quality of student learning and the level of degree attainment through common degree requirements
More informationA LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech
A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS MEDITERRANEAN DAYS CAMPUS SophiaTech 13 March 2014 INTRODUCTION Created in 1991 by a consortium of universities under the lead of
More informationMarketing Masters courses for professionals. MA Marketing MSc International Marketing MSc Marketing Communications
Marketing Masters courses for professionals MA Marketing MSc International Marketing MSc Marketing Communications NO1 Ranked for student satisfaction for marketing courses in London by National Student
More information