Informationssäkerhetsforskning i Sverige

Size: px
Start display at page:

Download "Informationssäkerhetsforskning i Sverige"

Transcription

1 Informationssäkerhetsforskning i Sverige Titel/Roll Namn E-post Organisation Område Universitetslektor Martin Boldt Blekinge tekniska högskola Privacy-Invasive Software, classification of PIS and investigate how PIS relate to both legitimate and traditionally malicious software. automatic analysis of the End-User License Agreements (EULA) Professor Bengt Carlsson Blekinge tekniska högskola Responsible for the Security group, a sub-group to DISL Current interests involve information security and privacy questions Universitetslektor Henric Johnson Blekinge tekniska högskola Telecommunications\Network Security Responsible for Maritime security Trust in Online Social Networks Dejan Baca Blekinge tekniska högskola Software vulnerabilities Networks, Security, Malware, Spyware, Data Raja M. Khurram raja.muhammad. Mining, Machine Learning Shahzad Blekinge tekniska högskola Edgar Lopez Blekinge tekniska högskola Sarmad Rohoni Blekinge tekniska högskola

2 Anton Borg Blekinge tekniska högskola Universitetslektor Niklas Lavesson Blekinge tekniska högskola Professor Paul Davidsson Blekinge tekniska högskola Professor Felix Wu UCDavis California Universitetslektor Stefan Axelsson Blekinge tekniska högskola prevention of spyware. He is currently looking at a collaborative system to address these threats before infecting users' computers, augmented by automatic analysis of end-user license agreements. Malware Code Detectors and Spyware detection methods (security), Predicting Friendship Intensity and Trust in Online Social Networks His research interests includes the theory and application of multi-agent systems and machine learning Guest professor 10%, Security within social networks His main interests are in computer security, esp. intrusion detection (surveillance) and how to apply results from machine learning and visualization to that problem domain Vilhelm Verendel Chalmers Security Metrics Professor Dave Sands Chalmers Software security Universitetslektor Rogardt Heldal Chalmers Software security Phu H. Phung Chalmers Pierre Kleberger Jasrin Javaheri Chalmers Security for critical applications software security, Security for Extensible Software Architectures p se Chalmers Security for the connected car Laleh Pirzadeh Chalmers Fu Zhang Chalmers networks security, DoS attacks

3 Andreas Larsson Chalmers Professor Erland Jonsson Chalmers Arnar Birgisson e Chalmers Postdoc Daniel Hedin Chalmers Network security, in particular security in wireless sensor networks Security Metrics and Modelling, Security for the connected car, Intrusion Detection Systems Software security, Language based security Software security, random data generation and applying information-flow technology to Web security. Universitetslektor Alejandro Russo Chalmers Filippo Del Tedesco Chalmers Software security Jonas Magazinius Chalmers Software security Willard Rafnsson se Chalmers Software security Farnaz Moradi Chalmers Look at Internet Backbone Traffic Identifying SPAM Niklas Broberg Chalmers Docent Marina Papatriantafilou Chalmers Core calculus for dynamically changeable downgrading policies for security typed languages. Algorithms for scalable group communication and group-consistency, including robust and secure communication methods, resistant to denial-ofservice attacks. Docent Andrei Sabelfeld Chalmers Run-time monitoring of operating Docent Tomas Olovsson e Chalmers Analysis of robustness and stability of networks, E- mail and SPAM, security for the connected car

4 Bart von Delft Chalmers Postdoc Magnus Almgren se Chalmers Intrusion detection systems, tracking malicious hosts (MDH) Aslam Mudassar SICS Trust and measurements. I am researcher in SICS and also enrolled as PhD student in Mälardalen University. My area of interest is secure virtual environments. Currently, I am working on Secure Management of Trusted Virturalized Platforms (SMTVP). Forskare, PhD Ludwig Seitz SICS Ludwig Seitz will join the SICS Secure Systems group March 1 working with secure identification in wireless networks and Android access control. Christian s research interest is in security. His research covers cryptography, authentication theory, security in cellular networks and in the Internet, security for ad hoc wireless networks, mobile platform security and security in surveillance networks. Christian Gehrmann is the main architect and has been the editor of the new global network video industry standard ONVIF. Docent Christian Gehrmann SICS (KTH) Oliver Schwarz SICS Christian has recently joined SICS and leads the new research area "System Security". Secure Virtualization for Embedded Systems and formal verfication of hypervisors.

5 Forskare, PhD Lars Rasmusson SICS Virtualization and hypervisor design for secure policy enforcments. (MDH) Shahid Raza SICS Security for sensor networks Professor Simone Fischer- Huebner Universitetsadjunkt (licentiat tek.) Hans Hedbom Different aspects of privacy Technologies for Privacy and Transparency in Identity Management Systems (licentiat tek) Ge Zhang Secure SIP Signalling Service for VoIP Applications Professor Stefan Lindskog Datasäkerhet i distribuerade system Universitetsadjunkt (licentiat tek.) Reine Lundin Dynamiska säkerhetstjänster, mätkriterier för säkerhetskonfigurationer Jolio Angulo Tobias Pulls Universitetslektor docent Thijs Jan Holleboom Forskar inom Computer Forensics och Skydd av Personlig Integritet Stefan Berthold Privacy, privacy measurement

6 Professor Anna Brunstrom Universitetslektor Johan Garcia Karlstad Universitet, Network communication Karlstad Universitet, Network communication SCTP, Reliable and Secure Communication in SCTP Reliable and secure communication in SCTP, Computer forensics, olagliga mediafiler Teodor Sommestad KTH ICS Cyber security in industrial information and control systems Docent Mathias Ekstedt KTH ICS Security critical applications, how enterprise architecture models can be used for the analysis of information system properties such as security, Waldo Rocha Flores, KTH ICS I do research in the field of IT governance in general, and the impact of IT governance on information security in particular Professor Pontus Johnson KTH ICS Handledare till doktorander som forskar om säkerhet research focuses on the analysis of architectural models of information systems in their context. Professor Johan Håstad KTH CSC Cryptography Universitetslektor Douglas Wikström KTH CSC Björn Terelius KTH CSC Cryptography, and in particular in cryptographic protocols Cryptography and more specifically provably secure cryptographic protocols Privacy in social networks, computer networks, Docent Sonja Buchegger KTH CSC security, and economics Docent Mikael Goldmann KTH CSC Cryptography

7 Docent Dilian Gurov KTH CSC Hannes Holm KTH CSC Specifying security policies with security automata, specifying self-monitoring for a given security policy, automatic proof generation for selfmonitoring programs Postdoc Gurvan le Guernic KTH CSC Postdoc Gunnar Kreit KTH CSC Broadcast Encryption, currently working on Secure Multi-Party Computation (disputerad oktober 2010) Irem Aktung KTH CSC Verification, Language-based Security Professor Mads Dam KTH CSC Doktornad Andreas Lundblad KTH CSC Karl Palmskog KTH CSC Bodriagov KTH CSC Logic, semantics, programming languages, security, and communication networks Formal methods, specifically proof carrying code and runtime monitoring Proving correctness and security properties of distributed algorithms Musard Baliu KTH CSC doktorand Formal methods for secure computing systems, in particular language-based security Security properties of distributed systems, in particular distributed aggregation networks, and Kristján Valur Jónsson Siavash KTH CSC applications of such networks in various practical applications Soleimanifard KTH Software security, Security of Mobile Code

8 Mattias Andersson KTH EES Physical-layer security Universitetslektor Ragnar Thobaben KTH EES Physical-layer security, network security Docent Panos Papadimitratos KTH EES (LCN) My research is concerned with networked systems security. Wireless security has been a main work theme, and other research interests are privacy, mobile computing, and networking. Docent György Dán KTH EES (LCN) My research interests include the design, modeling and evaluation of multimedia communication systems, peer-to-peer systems, and cyber-physical systems. IT-Mässigt med fokus på feldetektering i larmcentraler i SCADA-system, system and communication availability Professor Rolf Stadler KTH EES (LCN) Professor Karl Henrik Johansson KTH EES (ACL) André Teixeira KTH EES (ACL) Universitetslektor Henrik Sandberg KTH EES (ACL) Real-time Network Monitoring, network management Security in networked control and SCADA systems. Fault and bad-data detection. Power systems. Security in networked control and SCADA systems. Fault and bad-data detection. Power systems. Security in networked control and SCADA systems. Fault and bad-data detection. Power systems. Professor Luise Yngström Informationssäkerhet, awareness, information security managment

9 Professor Oliver POPOV Professor Sead Muftic Digital and Cyber Forensics Cryptology, Design and specification of security services, protocols and architecture for mobile agents. Docent Steward Kovalski & Huawei Chatbots which can support lectures and seminars in security related courses, Optimizing IT Security Culture: A Social Technical Perspective Universitetslektor Christer Magnusson Risk Management, Reliability and authenticity evaluation of IT systems Universitetslektor Iskra Popova Matei Cioubanu Alan Davidson Finns som medlem i forskningsgruppen, men är osäker om Iskra forskar inom säkerhet. Project Framework for Security for Mobile and Wireless Network, project Project Secure Financial Transactions Measure information security through security metrics Rasika Dayarathna The aim is to find ways of estimating prior to implementations if privacy protection measures entail the effects and needed procedures for privacy to be accepted within a developing Asian country. Project with Fredrik Björk and Louise Yngström Margaretha Eriksson Measure information security through security metrics

10 GeoffreyRwezaura Karokola ICT security in developing countries/tanzania. The aim of the project is to incorporate security aspects into existing development models for e- Government in developing countries such as Tanzania. Yngve Monfelt Measure information security through security metrics Esmiralda Moradian Measure information security through security metrics. And Project: Security in software development. The project aims at investigating how security can be incorporated into normal software development. Jeffy Mwakalinga Investigating a holistic and immune system inspired security framework. The aim of the project is to investigate how security frameworks inspired by system theories and nature may be organized, developed and evaluated. Project Framework for Security for Mobile and Wireless Network Bilal Al Sabbagh placerad i Saudi Arabien? Optimizing IT Security Culture: A Social Technical Perspective. In this project we review how culture aspects can affect the adoption use and misuse of security technology in a system.

11 Shahzad Saleem Muhammad Awais Shibli Vesa Virta Gunnar Wahlgren Feng Zhang Universitetsadjunkt Ulrika Norman Digital and Cyber Forensics. The aim is to investigate various aspects of searching for and identifying digital evidence and procedures for e- Discovery. Professor Simin Nadjm- Tehrani Postdoc Jordi Cucurull Postdoc Mikael Asplund Maria Vasslevskaya Massimiliano Raciti Johan Sigholm datavetenskap, RTSLAB datavetenskap, RTSLAB datavetenskap, RTSLAB datavetenskap, RTSLAB datavetenskap, RTSLAB datavetenskap, RTSLAB Security for critical applications, formal analysis of safety and fault tolerance Intrusion detection applied to attacks in Mobile Ad- Hoc Networks (MANET) Security for critical applications, fault tolerance in networks, network desasters Security for critical applications, security and dependability applied to mobile ad-hoc networks Effective and secure systems in military

12 (lic) Anna Vapen Professor Nahid Shahmehri Adjungerad professor Germano Caronni lic David Byers Rahul Hiran Christian Vestlund Professor Ulf Nilsson datavetenskap, IISLAB datavetenskap, IISLAB datavetenskap, IISLAB datavetenskap, datavetenskap, datavetenskap, IISLAB datavetenskap, Information security and identity management. Security and Networks, software security, software engineering, vulnerability modeling, root cause analysis Methods and Tools for Secure Software, digital forensics, software security, software engineering, vulnerability modeling Intrusion detection, risk analysis and embedded system security Security, secure software Professor Zebo Peng datavetenskap, Software security, software engineering, intrusion detection, automotive software Docent Jan-Åke Larsson Linköping university systemteknik My current main research project is a study of the security of Quantum Cryptography, specifically the classical subsystems needed in the various proposed systems.

13 Universitetslektor (?) Viiveke Fåk Linköping university systemteknik Computer security and cryptology, with the scientific interests concentrated on authentication of computer users and of data Aysajan Abidin Linköping university systemteknik Security of classical subsystems of Quantum Cryptography Universitetslektor Dan Harnesk Luleå tekniska univeristet Forskare John Lindström Luleå tekniska univeristet Universitetslektor Sören Samuelsson Luleå tekniska univeristet Heidi Hartikainen Luleå tekniska univeristet Secure Communications in Emergency Management Information Security Management Behavioral Information Security Cloud computing and secuirty, inforamtion security management, informationssäkerhet rörande kontinuitet och tillgänglighet/pålitlighet Inforamtion security managment, strategic planning of security Secure emergency communications: technical and organisational aspects Förste forskare Jacob Löfvenberg FOI General IT security, Cryptography Ingen uppgift Martin Karresand FOI Security, digital forensics, incident management Forskningsingenjör Kristoffer Lundholm FOI Information security metrics, IT security assessment, Information security risk management Forskningsingenjör Johan Bengtsson FOI Information security metrics, IT security assessment, Information security risk management

14 Förste forskare Jonas Hallberg FOI Forskare Amund Hunstad FOI Information security metrics, IT security assessment, Information security risk management Security in software-defined radio system, IT security assessment, Information security risk management Forskningsingenjör Henrik Karlzén FOI Social media and security, data-centric security Computer network defence, Platforms for IT Forskningsledare Mikael Wedlin FOI security training Forskningsingenjör Jonas Almroth FOI Security experimentation Forskare Mats Persson FOI Förste forskare Alf Bengtsson FOI Linux security, Computer network defence, Log analysis Service-based security, Security in virtual machines Forskare Arne Vidström FOI Windows security, malware analysis Forskningsingenjör David Lindahl FOI Computer network operations, IT security training Forskare Lars Westerdahl FOI Data-centric security, Service-based security, Security in system coallitions Ingen uppgift Viiveke Fåk FOI/Linköping universitet IT security training, Cryptography Professor (?) Ben Smeets Lund tekniska högskola, Crypto and Security Cryptography

15 Forskarassistent, PhD Martin Hell Lund tekniska högskola, Crypto and Security Cryptology and computer security Professor (?) Johansson, Thomas Lund tekniska högskola, Crypto and Security Cryptology and computer security Christopher Jämthagen th Lund tekniska högskola, Crypto and Security Cryptology and computer security Carl Löndahl Lund tekniska högskola, Crypto and Security Cryptology and computer security Paul Stankovski Lund tekniska högskola, Crypto and Security Automated Algebraic Cryptanalysis Martin Ågren Lund tekniska högskola, Crypto and Security Cryptography Universitetsadjunkt (Fil.licentiat) Ella Kolkowska Örebro Universitet, Informatik Behavioral security, compliance, security culture, values and goals Universitetslektor Karin Hedström Örebro Universitet, Informatik Docent Fredrik Karlsson Örebro Universitet, Informatik Behavioral security, compliance, security culture, values and goals Behavioral security, compliance, security culture, values and goals, ledningssystem för informationsäkerhet

16 Social engineering, Securing Information Assets Understanding, Measuring and Protecting against Social Engineering Attacks Universitetslektor MarcusNorhlberg Högskolan i Skövde Universitetslektor Rose-Mharie Åhlfeldt Högskolan i Skövde Informationssäkerhet i vården, Patientsäkerhet och patientintegritet, standard och policies Docent Eva Söderström Högskolan i Skövde Trust Jann K. Kleffner Försvarshögskolan International legal aspects of cyberwarfare Ingen uppgift Lars Nicander Försvarshögskolan Asymetriska hot, cybersäkerhet Ingen uppgift Magnus Ranstorp Försvarshögskolan Cyberterrorism Helena Andersson Stockholm universitet, The Swedish Law & Informatics Research Institute, MSB Informationssäkerhet och legala aspekter

KTH Linnaeus Center ACCESS

KTH Linnaeus Center ACCESS KTH Linnaeus Center ACCESS [ACCESS] is the largest and leading research center in its field in Europe, being able to generate world-class research and being highly attractive for international recruitments

More information

Provably Secure Execution Platforms for Embedded Systems ---- The PROSPER Project. Mads Dam KTH Royal Institute of Technology

Provably Secure Execution Platforms for Embedded Systems ---- The PROSPER Project. Mads Dam KTH Royal Institute of Technology Provably Secure Execution Platforms for Embedded Systems ---- The PROSPER Project Mads Dam KTH Royal Institute of Technology Programvara för konkurrenskraft, SSF, Vinnova, 10 Feb 2015 The Evolving Security

More information

LeGrand Tour West Coast Adventure Race Stockholm Extreme 1-2 of May 6-7 of June 30-31 of August Rank Points Class Rank Points Class Rank Points Class

LeGrand Tour West Coast Adventure Race Stockholm Extreme 1-2 of May 6-7 of June 30-31 of August Rank Points Class Rank Points Class Rank Points Class Rank Team Surname Family name Total Stockholm Extreme 1 Karlstad Multisport Annalena Axelsson 305 2 80 Ladies 5 45 Mix Erik Pütsep 2 80 Mix Henrik Beckman 4 50 Male Christer Eriksson 4 50 Male 2 Mölndal

More information

09:40 The electric car market and the automotive industry strategies

09:40 The electric car market and the automotive industry strategies PROGRAM Day 1 Tuesday April 8 08:25 Registration and morning coffee with exhibition visit 08:55 Moderator Fredrik Sidahl, CEO, FKG opening presentation 09:00 KEYNOTE Embedded software development at BMW

More information

09.00-09.30 Courtesy Call at DG FOI Director General Madelene Sandstrom Mr Dick Strang

09.00-09.30 Courtesy Call at DG FOI Director General Madelene Sandstrom Mr Dick Strang 1 V-u_)1\111 Time Topic Responsibility Location 19 Feb 08.20 Transport from Hotel Scandic Anglais Visit to FOI HQ Kista 09.00-09.30 Courtesy Call at DG FOI Director General Madelene Sandstrom Mr Dick Strang

More information

The Energy Systems Program Post graduate school and research program

The Energy Systems Program Post graduate school and research program The Energy Systems Program Post graduate school and research program Mats Söderström, Program director Magnus Karlsson, Director of postgraduate studies Head Sponsor: Understanding energy systems, their

More information

Control over wireless networks 9/3/2008. Sensor and actuator network applications. Networked Embedded Systems

Control over wireless networks 9/3/2008. Sensor and actuator network applications. Networked Embedded Systems 9/3/2008 Networked Embedded Systems School of Electrical Engineering Royal Institute of Technology Stockholm, Sweden Karl H. Johansson, Mikael Johansson, Carlo Fischione, Henrik Sandberg, Dimos Dimoragonas,

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

Final Results SDC 4 - Växjö 2013-06-30

Final Results SDC 4 - Växjö 2013-06-30 Final Results SDC 4 - Växjö 2013-06-30 Results for SDC 4 - Växjö OPEN results MATCH MATCH REG 1 100.00 575.6464 78. Robert Kunst +Open - U SWE bangatbeep 2 99.27 571.4647 85. Mattias Gustafsson -Open -

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Workshop on Building international cooperation WG2 : Network Information Security / cyber security Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel michel.riguidel@telecom-paristech.fr WG2 : network information & cybersecurity International

More information

The VIKING Project: An Initiative on Resilient Control of Power Networks

The VIKING Project: An Initiative on Resilient Control of Power Networks The VIKING Project: An Initiative on Resilient Control of Power Networks Annarita Giani, Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley,

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

SRS Meeting 2010 Stockholm University, Department of Meteorology (MISU) PARTICIPANTS

SRS Meeting 2010 Stockholm University, Department of Meteorology (MISU) PARTICIPANTS SRS Meeting 2010 PARTICIPANTS Achtert, Peggy peggy@misu.su.se André, Mats mats.andre@irfu.se Arredal Harvey, Therese Stockholm University, Department of System Ecology therese@ecology.su.se Ban, Yifang

More information

Cyber Security Assessment of Enterprise-Wide Architectures

Cyber Security Assessment of Enterprise-Wide Architectures Cyber Security Assessment of Enterprise-Wide Architectures Mathias Ekstedt, Associate Prof. Industrial Information and Control Systems KTH Royal Institute of Technology Agenda Problem framing Management/design

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Arvika Stadslopp. 6Km Löpning Provisional Team Results. Team type: 4 Manna Lag. 4 members per team used to calculate result

Arvika Stadslopp. 6Km Löpning Provisional Team Results. Team type: 4 Manna Lag. 4 members per team used to calculate result Team Set Sail 01:22:25 1 1 1 88 Lars-Olov Gävert 00:18:57 2 4 134 Anders Frykblom 00:20:34 3 5 87 Christian Nilsson 00:20:44 4 14 56 Mona Hallberg 00:22:08 Volvos hälsocoacher och AG 01:33:20 2 1 6 108

More information

20 Years Swedish Legal Integration in the EU: A Two-way Street Conference Program. February 16-17, 2015 THE SWEDISH NETWORK FOR EUROPEAN LEGAL STUDIES

20 Years Swedish Legal Integration in the EU: A Two-way Street Conference Program. February 16-17, 2015 THE SWEDISH NETWORK FOR EUROPEAN LEGAL STUDIES THE SWEDISH NETWORK FOR EUROPEAN LEGAL STUDIES HAS THE GREAT PLEASURE OF INVITING YOU TO AN INTERNATIONAL CONFERENCE ON: 20 Years Swedish Legal Integration in the EU: A Two-way Street Conference Program

More information

STUDENT COUNCIL. Student Council spring 2011. Student Council spring 2012. Student Council autumn 2010. Student Council autumn 2011

STUDENT COUNCIL. Student Council spring 2011. Student Council spring 2012. Student Council autumn 2010. Student Council autumn 2011 STUDENT COUNCIL The student council meets every fortnight to discuss issues of common interests and to plan for coming activities. The council is formed by the students and serves as the continuous contact

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015) TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,

More information

Invitation Conference on RF Measurement Technology, for State of The Art Production and Design The Conference on RF Measurement Technology is a

Invitation Conference on RF Measurement Technology, for State of The Art Production and Design The Conference on RF Measurement Technology is a Invitation Conference on RF Measurement Technology, for State of The Art Production and Design Gävle September 11 th -12 th 2007 The Conference on RF Measurement Technology is a joint arrangement between

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

2 nd National Workshop on Functional Products - Development and Sales

2 nd National Workshop on Functional Products - Development and Sales 2 nd National Workshop on Functional Products - Development and Sales Luleå, October 24-25 2007 Final schedule (v.071021) 2007, Tobias Larsson, tobias@ltu.se 1 Welcome!! With 4 keynotes, one policy speaker

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren Department of Computer Science and Engineering Chalmers University of Technology Sweden https://www.youtube.com/watch?v=kpyvenbpj5c

More information

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666

Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666 Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666 The world is a book and he who stays at home read only one page Augustine of Hippo, 3 November 354 28 August 430

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se FOCUS Workshop on Security Research - Drivers, research and outcome hans.frennberg@foi.se Workshop - objectives Provide forum for representatives from Swedish security research initiatives to meet and

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666

Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666 Tuition fees at LU/Richard Stenelo 2015 EDUCATION, RESEARCH AND COLLABORATION SINCE 1666 An international University Exchange students Outgoing 1 180 Incoming 2 120 Other international students: 3 300

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

Final Results SDC 6 2014 - Ystad 2014-08-23

Final Results SDC 6 2014 - Ystad 2014-08-23 Final Results SDC 6 2014 - Ystad 2014-08-23 OPEN results 1 100.00 604.9840 58. Pär Hylander +Open - U SWE hylander 2 99.17 599.9526 66. Daniel Holmberg +Open - U SWE rioter 3 87.31 528.2399 20. Carsten

More information

A Strategic Innovation Program in Medical Technology

A Strategic Innovation Program in Medical Technology A Strategic Innovation Program in Medical Technology A strategic research and innovation program financed by VINNOVA, Sweden s innovation agency MedTech4Health addresses one of the largest global social

More information

Cyber Security @ DTU. Lars Ramkilde Knudsen

Cyber Security @ DTU. Lars Ramkilde Knudsen Cyber Security @ DTU Lars Ramkilde Knudsen Professor @ Technical University of Denmark (DTU) Member of the Academy of Technical Sciences in Denmark Chief Cryptographer @ Dencrypt Finans IT Dagen About

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Eligible Master Programmes for the Swedish Institute Visby Programme - the Academic Year 2014/2015 University Name of Master Programme Application

Eligible Master Programmes for the Swedish Institute Visby Programme - the Academic Year 2014/2015 University Name of Master Programme Application Eligible Master Programmes for the Swedish Institute Visby Programme - the Academic Year 2014/2015 University Name of Master Programme Application Code Credits Blekinge Institute of Technology Computer

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Unified Security Management

Unified Security Management Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

9.00-9.10 9.10-9.40 9.40-10.00 10.00-10.10 10.10-10.30 10.30-10.50 10.50-11.10 11.10-11.30 11.30-11.50 12.00-13.00 13.00-14.00 14.15-15.30 15.

9.00-9.10 9.10-9.40 9.40-10.00 10.00-10.10 10.10-10.30 10.30-10.50 10.50-11.10 11.10-11.30 11.30-11.50 12.00-13.00 13.00-14.00 14.15-15.30 15. KICK-OFF 9.00-9.10 Inledning 9.10-9.40 Security Link: mål, visioner och organisation (Fredrik Gustafsson, Staffan Rudner) 9.40-10.00 Robust kommunikation (Erik G Larsson, Peter Stenumgaard) 10.00-10.10

More information

Cyber Security Modeling and Assessment of SCADA System Architectures

Cyber Security Modeling and Assessment of SCADA System Architectures Cyber Security Modeling and Assessment of SCADA System Architectures Mathias Ekstedt, Associate Professor Teodor Sommestad Hannes Holm Industrial Information and Control Systems KTH Royal Institute of

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden Motivation Course

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Supplementary Regulations

Supplementary Regulations Supplementary Regulations Winner 2015 Stoffe Nilsson 11 Index 1. Organiser 13 2. Organisation committee 13 3. Officials of the event 13 4. Scrutineers 14 5. Chairman of the Stewards 14 6. Stewards 14 7.

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Big Data and Cyber Security A bibliometric study Jacky Akoka, Isabelle Comyn-Wattiau, Nabil Laoufi Workshop SCBC - 2015 (ER 2015) 1 Big Data a new generation of technologies and architectures, designed

More information

Research in Embedded Systems at the CSC School

Research in Embedded Systems at the CSC School Research in Embedded Systems at the CSC School Prof. Mads Dam Theoretical Computer Science School of Computer Science and Communication mfd@kth.se, tel.08-790 6229 CSC Departments CB Computational Biology

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

Security Visualization Past, Present, Future

Security Visualization Past, Present, Future Security Visualization Past, Present, Future Greg Conti West Point @cyberbgone http://dl.acm.org/citation.cfm?id=2671501 http://link.springer.com/chapter/10.1007%2f978-3-540-85933-8_11 http://images.cdn.stuff.tv/sites/stuff.tv/files/styles/big-image/public/25-best-hacker-movies-ever-the-matrix.jpg?itok=kiwtknw1

More information

Eligible master s level programs for the Visby Program Swedish Institute Baltic Sea Region Exchange Program

Eligible master s level programs for the Visby Program Swedish Institute Baltic Sea Region Exchange Program Eligible master s level programs for the Visby Program Swedish Institute Baltic Sea Region Exchange Program University in Sweden Name of the master program Code of the master program Blekinge Institute

More information

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 Martin.Euchner@itu.int

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Johan Hillergren Marketing Engineer, NI. Erik van Hilten Marketing Engineer, NI

Johan Hillergren Marketing Engineer, NI. Erik van Hilten Marketing Engineer, NI Johan Hillergren Marketing Engineer, NI Erik van Hilten Marketing Engineer, NI LabVIEW 2013 New Features Code Management Software Engineering Deployment Experience Mobile and Web Overhauled Resources

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

A Tool for Automatic Enterprise Architecture Modeling

A Tool for Automatic Enterprise Architecture Modeling A Tool for Automatic Enterprise Architecture Modeling Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, and Khurram Shahzad Industrial Information and Control Systems, KTH Royal Institute

More information

Anomaly Detection and its Adaptation: Studies on Cyber-Physical Systems

Anomaly Detection and its Adaptation: Studies on Cyber-Physical Systems Linköping Studies in Science and Technology Licentiate Thesis No. 1586 Anomaly Detection and its Adaptation: Studies on Cyber-Physical Systems by Massimiliano Raciti Department of Computer and Information

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

Svenska Ishockeyförbundet - Official Statistics

Svenska Ishockeyförbundet - Official Statistics Svenska Ishockeyförbundet - Official Statistics Division C 2-2-5 Current Playing Day Date Game Result Spectators Venue 4/2 Surahammars IF - Borlänge HF 4-6 (-,2-2,-4) Surahallen 4/2 Enköpings SK HK - Hedemora

More information

NIST Big Data Public Working Group

NIST Big Data Public Working Group NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

Cybersecurity at ODU ( www.odu.edu/ccser )

Cybersecurity at ODU ( www.odu.edu/ccser ) Cybersecurity at ODU ( www.odu.edu/ccser ) We offer a variety of options for individuals to learn about cybersecurity. These include: a. Twenty-one separate undergraduate courses related to the topic.

More information

Report 2010. Innovation and Product Realization

Report 2010. Innovation and Product Realization Annual Report 2010 Innovation and Product Realization 2 Innovation and Product Realization Innovation and Product Realization Mats Jackson is leader of IPR and professor of Innovative Production E-mail:

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

Realizing Trusted Clouds

Realizing Trusted Clouds Realizing Trusted Clouds with Trusted Computing and SCAP SICS Security Seminar April 08, 2014 Mudassar Aslam (Researcher,PhD Student) Security LAB (SEC Lab) 1 Outline Cloud Computing Trusted Clouds Cloud

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Eligible Master Programmes for the Swedish Institute (SI) Visby Programme - the Academic Year 2015/2016

Eligible Master Programmes for the Swedish Institute (SI) Visby Programme - the Academic Year 2015/2016 University Eligible Master Programmes for the Swedish Institute (SI) Visby Programme - the Academic Year 2015/2016 Name of Master Programme Application Code Blekinge Institute of Technology Mobile and

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Proceedings. Produktmodeller -96 12-13 november PRODUKTMODELLER '96 ISBN 91-7871-861-9 IKP-R-937 PRODUKTMODELLER *96.

Proceedings. Produktmodeller -96 12-13 november PRODUKTMODELLER '96 ISBN 91-7871-861-9 IKP-R-937 PRODUKTMODELLER *96. Proceedings Produktmodeller 96 1213 november ISBN 9178718619 IKPR937 UB/TIB Hannover 123 415 705 89 PRODUKTMODELLER *96 1213 november i LinkSping Konferenskommitte 3 Sid Introduktion 5 Register 7 Forfattarregister

More information

Human Factors in Information Security

Human Factors in Information Security University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

A System Design for Surveillance Systems Protecting Critical Infrastructures

A System Design for Surveillance Systems Protecting Critical Infrastructures A System Design for Surveillance Systems Protecting Critical Infrastructures 1 FOI (Swedish Defence Research Agency) Box 1165, SE-581 11 Linköping, Sweden {jungert, nikha, niclas.wadstromer}@foi.se Erland

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR MASTER OF SCIENCE IN ELECTRICAL ENGINEERING (MS EE) FIRST YEAR Elective 3 Elective 3 Elective 3 Seminar Course (EE 296) 1 TOTAL 12 TOTAL 10 SECOND YEAR Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300)

More information

Embedded Systems at the CSC School

Embedded Systems at the CSC School Embedded Systems at the CSC School Prof. Mads Dam Theoretical Computer Science School of Computer Science and Communication mfd@kth.se, tel.08-790 6229 CSC Departments CB Computational Biology CVAP Computer

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

List of Participants and Publications Vinnova project COMPLEX "Support for Operation and Man-hour Planning in Complex Production

List of Participants and Publications Vinnova project COMPLEX Support for Operation and Man-hour Planning in Complex Production List of Participants and Publications Vinnova project COMPLEX "Support for Operation and Man-hour Planning in Complex Production (Komplex produktion: Stöd för optimering av direkt och indirekt arbete,

More information