Curriculum Vitae. Personal information. Work experience. First name / Surname Thanassis Giannetsos

Size: px
Start display at page:

Download "Curriculum Vitae. Personal information. Work experience. First name / Surname Thanassis Giannetsos"

Transcription

1 Curriculum Vitae Personal information First name / Surname Home Page Address Papaflessa 34, Ano Flyfada, , Greece Telephone(s) , athgia@kth.se Nationality Greek Date of birth March 07, 1984 Marital Status Single Work experience Dates April 2013 Today Postdoctoral Researcher, Networked Systems Security Group, Member of ACCESS Linnaeus Centre Research in Security & Resilience in Wireless Networks/ Security & Privacy-Enhancing in IoT/ Security in Vehicular Communications/ Malware Analysis/ Lectures/ Involvement in European projects KTH Royal Institute of Technology Dates January 2012 March 2013 Researcher, Algorithms & Security group Research & Design of cryptographic algorithms and protocols/ Ubiquitous Computing & Participatory Sensing/Lectures/ Consulting/ Involvement in European projects Dates January 2008 December 2011 Research Associate, Algorithms & Security group Wireless network security (design of Intrusion Detection Systems for WSNs)/ Cryptographic Analysis/ Visiting Lectures (in parallel with PhD studies) Dates October Research Assistant, Security/ Wireless Networks/ Distributed Systems Research in Security of Wireless & Sensor Networks/ Trust and Privacy research in decentralized environments (in parallel with MSc Studies) Page 1/5 - Curriculum vitae of

2 Education and training Title of qualification awarded PhD Thesis Title Supervisors Faculty members of the threemember committee External activities Title of qualification awarded Dates January 2008 to January 2012 PhD in Computer Science and Engineering Security, Sensor Networks, Cryptographic Algorithms & Protocols, Malware Analysis, Cloud Computing, Internet of Things etc. CTiF Department, University of Aalborg, Denmark Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms Professor Tassos Dimitriou (AIT) Professor Neeli R. Prasad (CTiF) Professor H. Vincent Poor, School of Engineering and Applied Science, Princeton University, USA Associate Professor Panagiotis Papadimitratos, KTH, Royal Institute of Technology, School of EE, Stockholm, Sweden Participation in the International summer school SENIOT From Sensor Networks to Networked Intelligent Objects (CONET 2009), Bertinoro, Italy Dates Master of Science in Information Networking Algorithms, Security, Embedded & Distributed Systems, Wireless Networks etc. Carnegie Mellon University, Pittsburgh, Pennsylvania Dates Title of qualification awarded BSc in Computer Science and Communication Engineering, Degree 8.16/10 Algorithms, Mathematics, Telecommunications, Distributed Programming Department of Computer & Communication Engineering, University of Thessaly, Greece Personal skills and Mother tongue Other language(s) Social/Organisational skills and Greek English (Excellent) French (Basic) KTH and AIT are multicultural environments where people from all over the world come to study and do research. Being a postdoctoral fellow and senior researcher in such environments implies that one should feel at home interacting and communicating with other people (excellent evaluations from other colleagues constitute further evidence for these skills ). Additionally, participating in the coordination, implementation and execution of International projects improves one s ability to adapt to dynamically changing environments and conditions as well as sharpening one s communication skills. Being part of the Security groups of both institutions requires a lot of administration and coordination for team research work, project execution and deliverables, etc. Apart from these typical requirements, of equal importance is the co-supervision of students and researchers to carry out contractual work with respect to European and National projects but most importantly to promote advancements in the field of Network and Information Security. Page 2/5 - Curriculum vitae of

3 Technical skills and Computer skills and Other Skills and Summary of Qualifications Algorithms, Programming, Mathematics, Cryptography, Computer and Network security. Knowledge of the field is evident from the large number of publications produced and an equally large number of people referencing this researcher s work. Additionally, participation in conferences (as reviewer) and European projects is also further proof of technical competence in the field. Strong Computer Science background. This implies knowledge of various types of operating systems, databases, programming languages (Java, C/C++, Matlab, PhP, Python, SQL), etc Knowledge of various programming languages is evident from a number of tools (e.g., SenSys, Spy-Sense) produced and presented in prestigious conferences and events, as well as, from the implementation of largescale security middleware and frameworks for various European projects. Participation in R&D and European projects (see below for further details), Organization of new R&D initiatives, Technical writing skills Dr Giannetsos Thanassis is interested in various aspects of Theoretical Computer Science like combinatorial optimization, design and analysis of heuristics/probabilistic algorithms for difficult to solve problems, sensor and RFID networks, vehicular communication networks, and computer and network security (especially why the latter is so difficult to achieve in real life ). At KTH he is member of the Networked Systems Security group at the LCN division of the EE Department. Members in the group conduct research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. His research in the above fields has resulted in numerous publications, some of which received distinction, and numerous invitations for talks in prestigious conferences. His research interests include Security and Resilience in Sensor Networks Sensor Networks Applications (e.g., participatory sensing which is a hot research direction throughout the world) Security and Privacy-Enhancing in Internet of Things technologies RFID technologies Smart Cards Security Experimental Security in Ad hoc networks Design of cryptographic algorithms and protocols Cryptographic Analysis (Cryptanalysis) & Malware Analysis Reveal new possible weaknesses that can be exploited by adversaries in order to achieve better and more realistic security architectures Security in Telecommunications networks Security, Privacy and Identity Management in Cloud Computing Applied Cryptography and Computer Security Professional activities, memberships, etc. Numerous publications in International conferences and journals Invited speaker to prestigious events on topics related to security including Black Hat events for presenting new attack/hacking techniques especially in the field of wireless networks (e.g. sensor networks) Reviewer of technical papers in the field of network and information security Designer of professional and executive courses aiming at creating security aware professionals. These courses are offered as part of the outreach program of (AIT) Technical Program Committee Membership Conference on Security & Privacy in Comm. Networks (SecureComm), Conf. on Security & Cryptography (SECRYPT), IEEE Conf. on New Technologies, Mobility & Security (NTMS), IEEE Conf. on Communications (ICC), IEEE Wireless Comm. & Networking Conference (WCNC), ACM Conf. on emerging Networking Experiments & Technologies (CONEXT), IEEE Conf. on Connected Vehicles (ICCVE), Global Wireless Summit (GWS), Intr. Workshop on Sensors and Systems for Pervasive Computing (PerSeNS) Funding, National/International projects Participation in the European project PRESERVE (Duration 4 years, ends December 2014). The goal of PRESERVE is to bring secure and privacy-protected V2X communications closer to reality by providing and field testing a security and privacy subsystem for V2X systems. Principal Investigator for the European project SafeCity (Duration 2 years, ends April 2013, Funding 320K Euros). SafeCity deals with smart Public safety and security in cities. The main objective is to enhance the role of Future Internet in ensuring people feel safe in their surroundings at time that their surroundings are protected. Page 3/5 - Curriculum vitae of

4 Funding, National/International Projects I coordinated the Algorithms & Security Group of AIT for the research and development of certain advanced Internet technologies including sensor, end-to-end security for safeguarding public safety communications, identification of generic enablers and platform design, prototyping and implementation. Contribution to SafeCity s specific requirements and Framework characterization through consulting and preparation of design documents (e.g., Specifications, Reports, etc.) Participation in the European Project Lotus (Duration 3 years, ended December 2011, Funding 284K Euros). The concept and objectives of the LOTUS project is to create a system by which illicit production of explosives and drugs can be detected during the production stage. I participated in the coordination of the Algorithms & Security Group of AIT in the following activities: Investigation and implementation of efficient algorithms and protocols for establishing secure communications between nodes and the information system data collection center or between the nodes themselves. Provision of system security against eavesdropping or feeding false information into the network Design and evaluation of cryptographic primitives suitable for nodes with constrained resources. Participation in various small-scale internal enterprise & research projects. Teaching ( ) As a Researcher and Assistant Professor I have been regularly involved in the provision (by giving a number of lectures and organizing lab exercises/seminars) of the following graduate-level courses: Wireless Sensor Networks, Object oriented Programming, Packet Switching, Embedded Systems, Introduction to Algorithms, Cryptography and Network Security. Publications Professionals and Executive Seminars/Courses offered while at AIT Have designed and taught professional and executive courses related to Cryptography and Network Security (including ways that an attacker follows to penetrate a wireless network ) aimed at professionals and people who want to become familiar with the exciting field of network security. The goal of this activity is to educate users and firms because security is as strong as its weakest link and the tools used to enforce security are never the weakest link. KTH Royal Institute of technology (April Today) As a Postdoctoral researcher I have been involved in the provision of the following Master/Ph.D. courses: Networked Systems Security (NSS), Building Networked Systems Security (BNSS) and Advanced Networked Systems Security (ANSS) Theses 1). Embedded Systems and Interruption Signals; the ARM Case. Bachelor thesis, Department of Computer & Communication Engineering, University of Thessaly, Greece, ). Intrusion Detection in Wireless Sensor Networks. MSc thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, ). Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms. PhD thesis, University of Aalborg, Denmark, Refereed Conferences 1) S. Gisdakis, M. Lagana, T. Giannetsos, P. Papadimitratos, SEROSA: SERvice Oriented Security Architecture for Vehicular Communications. IEEE Int. Vehicular Networking Conf. (VNC), ) T. Giannetsos and T. Dimitriou, Spy-Sense: Spyware Tool for Executing Stealthy Exploits against Sensor Networks. International Workshop on Hot Topics on Wireless Network Security & Privacy (HotWisec), ) R. Gimenez, D. Fuentes, D. Oancea, D. Gimenez, T. Dimitriou, T. Giannetsos, S. Tsekeridou, M. Carabano, Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project. 7th Future Security Research Conference, September ) Michalas, T. Dimitriou, T. Gianetsos, N. Komninos and N. R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, MobiSec Distinguished paper 5) T. Giannetsos and T. Dimitriou. Spy-Sense: Spyware Tool for Executing Stealthy Exploits against Page 4/5 - Curriculum vitae of

5 Sensor Networks. Black Hat USA, Las Vegas, ) T. Giannetsos and T. Dimitriou. Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks. International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Barbara, California, ) T. Giannetsos, T. Dimitriou and N. R. Prasad. Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks. Black Hat Europe, Barcelona, Spain, The tool received international media attention by Reuters and Forbes. 8) T. Giannetsos, T. Dimitriou and N. R. Prasad. Detecting Wormholes in WSNs. International Workshop on Wireless Network Security (WiSec), ) T. Giannetsos, T. Dimitriou and N. R. Prasad. Self-Propagating Worms in Wireless Sensor networks. International Workshop on Emerging Networking Experiments & Technologies (Co-Next), ) T. Giannetsos, T. Dimitriou and N. R. Prasad. State of the Art on Defenses against Wormhole Attacks in WSNs. International Conference on Wireless Vitae, Aalborg, Denmark, ) Krontiris, Z. Benenson, T. Giannetsos, F. Freiling amd T. Dimitriou. Cooperative Intrusion Detection in WSN. European Conference on WSNs (EWSN), Cork, Ireland, ) T. Giannetsos, I. Krontiris and T. Dimitriou. Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side. International Workshop on Security and Privacy in Wireless & Mobile Computing (SecPriWiMob), Avignon, France, ) Krontiris, T. Giannetsos and T. Dimitriou. LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. International Conference on Security and Privacy in Communication Networks (SecureComm), Istanbul, Turkey, ) I. Krontiris, T. Giannetsos, T. Dimitriou, and M. Mpasoukos, Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. International Conf. on Algorithmic Aspects of WSNs, Poland, Book Chapters 1) T. Giannetsos, I. Krontiris, T. Dimitriou, Felix C. Freiling, " Intrusion Detection in Wireless Sensor Networks", Book Chapter in "Security in RFID and Sensor Networks," Paris Kitsos, Yan Zhang (eds), Auerbach Publications, CRC Press, Taylor&Francis Group, Journals 1) T. Giannetsos, T. Dimitriou, I. Krontiris and N. R. Prasad. Arbitrary Code Injection through Selfpropagating Worms in Von Neumann Architecture Devices. Computer Oxford Journal for the Algorithms, Protocols, and Future Applications of WSNs Special Issue, Volume 53, ) T. Giannetsos, T. Dimitriou and N. R. Prasad. People-centric Sensing in Assistive Healthcare: Privacy Challenges and Directions. Security and Communication Networks Journal, ) A. Michalas, T. Dimitriou, T. Giannetsos, N. Komninos and N. R. Prasad. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, Published in the Wireless Personal Communications journal, Volume 66, Number 3, July 2012 Distinguished paper 4) T. Giannetsos and T. Dimitriou, LDAC: A Localized and Decentralized Algorithm for Efficiently Countering Wormholes in Mobile Wireless Networks, To be submitted in the International Journal of Computational Intelligence Studies, Honours & Awards Best Paper Award for the paper entitled Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. In MobiSec, Aalborg, Denmark, May 2011 SenSys and Spy-Sense attack tools were first published in the Blakc Hat international event, one of the biggest and most important security conference series in the world (2010 and 2011 respectively) Interviewed by Forbes and Reuters Online articles in H Security blog, Sensor Network Security magazine and Cyber Arms- Computer Security blog Award by the Technical Chamber of Greece (TEE) for his exceptional performance in his undergraduate studies in the Department of Computer & Communication Engineering, University of Thessaly, Greece Scolarship, in 2001, for being admitted with the highest grade in the Department of Computer & Communication Engineering, University of Thessaly, Greece Page 5/5 - Curriculum vitae of

Antonis Michalas. Head of Cybersecurity Group. Education. PhD Thesis. Professional Experience

Antonis Michalas. Head of Cybersecurity Group. Education. PhD Thesis. Professional Experience Antonis Michalas Head of Cybersecurity Group : a.michalas@westminster.ac.uk : +44 77245-70070 : www.amichalas.com Education 2009 2013 PhD in Network Security, University of Aalborg, Aalborg, Denmark. Main

More information

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004 Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905

More information

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site vedatcoskun@isikun.edu.tr vedatcoskun@me.com www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6 Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: skbrahma@syr.edu Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014 Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

June Zhang (Zhong-Ju Zhang)

June Zhang (Zhong-Ju Zhang) (Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: junez@andrew.cmu.edu http://users.ece.cmu.edu/~junez

More information

M.Sc. Program in Informatics and Telecommunications

M.Sc. Program in Informatics and Telecommunications M.Sc. Program in Informatics and Telecommunications at UoA-DIT Prof. Ioannis Stavrakakis Deputy Dept Chair, Director of Graduate Studies 1 Overview of Graduate Studies Initiated in 1993 Modified in 2000

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

ES Research at the Electrical Engineering School

ES Research at the Electrical Engineering School ES Research at the Electrical Engineering School Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/ Societal Challenges Intelligent Transportation

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. CURRICULUM VITAE Taha Abdelshafy Abdelhakim Khalaf Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. Contact Addresses: 116 Electrical Engineering Dept. Faculty of Engineering

More information

Intrusion Prevention and Detection in Wireless Sensor Networks

Intrusion Prevention and Detection in Wireless Sensor Networks Intrusion Prevention and Detection in Wireless Sensor Networks Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universität Mannheim vorgelegt von Ioannis

More information

Trust and Reputation Management in Distributed Systems

Trust and Reputation Management in Distributed Systems Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania (felix.gomez-marmol@neclab.eu)

More information

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications

More information

LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE

LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE LIVERPOOL HOPE UNIVERSITY COMPUTER SCIENCE FACULTY OF SCIENCE YOUR FUTURE STARTS WITH HOPE 161214 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:

More information

Manal Hammadi jasim Al-Kubaisi

Manal Hammadi jasim Al-Kubaisi 1 CV: Dr.Manal Hummadi Jasim Al-Kubasis Personal Information Manal Hammadi jasim Al-Kubaisi Place & Date of Birth: Baghdad, November 20 th 1961 Social Status: Single mother Nationality: Iraqi Email:manalkubasi@yahoo.com

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations

EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations EIT ICT Labs MASTER SCHOOL S&P Programme Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The programme in Security and Privacy focuses on the study of the design, development and evaluation

More information

Ryerson University Phone: (416) 979-5000 ext: 4920

Ryerson University Phone: (416) 979-5000 ext: 4920 Haleh Khojasteh Last update: January 21, 2016 CONTACT INFORMATION RESEARCH INTERESTS Ryerson University Phone: (416) 979-5000 ext: 4920 Department of Computer Science E-mail: haleh.khojasteh@ryerson.ca

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

CURRICULUM VITAE. September, 2015

CURRICULUM VITAE. September, 2015 CURRICULUM VITAE September, 2015 C1. Personal Information Asaad AbdulRahman Nayyef Alani Department of Computer Science,, Sultan Qaboos University, P.O. Box 36, Al-Khoudh 123, Muscat, Sultanate of Oman,

More information

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics. Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 vzikas@cs.ucla.edu www.cs.ucla.edu/~vzikas Education 2006

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

MH NOROUZI RÉSUMÉ AND CV

MH NOROUZI RÉSUMÉ AND CV MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:

More information

Europass Curriculum Vitae

Europass Curriculum Vitae Europass Curriculum Vitae Personal information Surname(s) / First name(s) Address(es) Custódio, Jorge Filipe Telephone(s) +351 919687707 Email(s) Personal website(s) Nationality(-ies) Rua Francisco Pereira

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Vitor Manuel Parreira Pereira

Vitor Manuel Parreira Pereira Curriculum vitae PERSONAL INFORMATION Vitor Manuel Parreira Pereira Urbanização Quinta dos Orfãos, Bloco B1, 2º F, 4710-453 Braga (Portugal) +351916801340 vitorm2p@gmail.com pt.linkedin.com/in/vitormppereira

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

CONTENT. King Hussein Faculty of Computing Sciences

CONTENT. King Hussein Faculty of Computing Sciences CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Joint Master in Information Security and Data Management (ISDM)

Joint Master in Information Security and Data Management (ISDM) PROJECT CONCEPT PAPER Joint Master in Information Security and Data Management (ISDM) First draft: Dr. Derar Eleyan, Palestine Technical University-Palestine. Key Action 2: Capacity Building in the Field

More information

How To Become A Computer Scientist

How To Become A Computer Scientist EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

Call for Papers for Ad-hoc and Sensor Networks Symposium

Call for Papers for Ad-hoc and Sensor Networks Symposium Call for Papers for Ad-hoc and Sensor Networks Symposium Scope and Motivation: An ad-hoc network is a system of wireless nodes dynamically self-organizing in arbitrary and temporary network topologies.

More information

Seminar TK: Ubiquitous Computing

Seminar TK: Ubiquitous Computing Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?

More information

Victoria SINCLAIR Curriculum vitae

Victoria SINCLAIR Curriculum vitae Victoria SINCLAIR Curriculum vitae 1. Full name and date Surname: SINCLAIR Given Names: Victoria Anne Gender: female Date of writing: 8 September 2014 2. Date and place of birth, nationality, current residence

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

New System Security Model for a Mobile Operator s Meshed Access Network

New System Security Model for a Mobile Operator s Meshed Access Network New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,

More information

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering)

MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Chapter 9 The programme specific part of the curriculum for: MASTER OF SCIENCE (MSc) IN ENGINEERING (SOFTWARE ENGINEERING) (Civilingeniør, Cand. Polyt. i Software Engineering) Applicable to students admitted

More information

A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech

A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS. MEDITERRANEAN DAYS CAMPUS SophiaTech A LEADING GRADUATE SCHOOL AND RESEARCH CENTER IN COMMUNICATION SYSTEMS MEDITERRANEAN DAYS CAMPUS SophiaTech 13 March 2014 INTRODUCTION Created in 1991 by a consortium of universities under the lead of

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

EECS 588: Computer and Network Security. Introduction

EECS 588: Computer and Network Security. Introduction EECS 588: Computer and Network Security Introduction January 13, 2014 Today s Cass Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

EECS 588: Computer and Network Security. Introduction January 14, 2014

EECS 588: Computer and Network Security. Introduction January 14, 2014 EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

Master of Science in Software Engineering Student Guide

Master of Science in Software Engineering Student Guide King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Security Issues in Biomedical Wireless Sensor Networks

Security Issues in Biomedical Wireless Sensor Networks Security Issues in Biomedical Wireless Sensor Networks Tassos Dimitriou, Krontiris Ioannis Athens Information Technology, 19002 Peania, Athens, Greece {tdim,ikro}@ait.edu.gr Abstract Within the hospital

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3 11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.

More information

NSC Cloud Computing and Information Security Program

NSC Cloud Computing and Information Security Program NSC Cloud Computing and Information Security Program Hahn-Ming Lee Distinguished Professor, Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology,

More information

Cyber Security. Vision. Mission

Cyber Security. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE 021015 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:

More information

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on

More information

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia 50100 KOZANI, GREECE

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia 50100 KOZANI, GREECE CURRICULUM VITAE PERSONAL DATA Name: Dimokritos Panagiotopoulos Date of birth: March 21, 1960 Family Status: Married, has two children Current Posistion: Work Address: Tel. No. (Work): Mobile No.: E-mail:

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer. Faculty of Engineering School of Computing Lecturer / Associate Professor in Computer Science We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to

More information

CS Master at UNS. Two-year program: M1 + M2. Entry points in first or second year (M1 only, M2 only or M1 + M2)

CS Master at UNS. Two-year program: M1 + M2. Entry points in first or second year (M1 only, M2 only or M1 + M2) International Master in Computer Science Sophia Antipolis, France http://computerscience.unice.fr/ CS Master at UNS Two-year program: M1 + M2 Entry points in first or second year (M1 only, M2 only or M1

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

UNIVERSITY OF ZULULAND FACULTY OF SCIENCE AND AGRICULTURE DEPARTMENT OF COMPUTER SCIENCE POSTGRADUATES

UNIVERSITY OF ZULULAND FACULTY OF SCIENCE AND AGRICULTURE DEPARTMENT OF COMPUTER SCIENCE POSTGRADUATES STAFF POST STAFF MEMBER QUALIFICATION Professor and HOD MO Adigun PhD, MSc, BSc (Combined Hons) (IFE), MIEEE, PMACM, MSAICSIT Associate Professor SS Xulu PhD (UZ), MSc (UCT), Dip Data (UNISA), PhD (UZ)

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,

More information

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment. Provost s Learning Innovations Grant for Faculty Special Request for Proposal Course Development 2009-2010 Project Title: Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

More information

Student Handbook 2015-2016. Master of Information Systems Management (MISM)

Student Handbook 2015-2016. Master of Information Systems Management (MISM) Student Handbook 2015-2016 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of information systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Specialization

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK)

ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK) Dean s Decision 1 (10) APPOINTMENT SPECIFICATION Three positions of PROFESSOR or ASSISTANT / ASSOCIATE PROFESSOR (TENURE TRACK) in the fields of Software Engineering and Software Security, Software Engineering

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

Collection Policy: Computer Science

Collection Policy: Computer Science 1. Introduction Collection Policy: Computer Science The Library supports the instructional and research needs of faculty and students within the Department of Computer Science. The study of computer science

More information