Singapore UK Cyber Security Workshop February 2015

Size: px
Start display at page:

Download "Singapore UK Cyber Security Workshop 24 25 February 2015"

Transcription

1

2 Tuesday 24 Feb 2015 (Nanyang Executive LT2) Dress Code: Long sleeve shirt with no tie Time hrs Registration Activity hrs Opening and short introduction from all participants hrs Session 1: i. National Research Foundation (NRF) Cyber security research in Singapore, Mr Lim Hwee Kwang ii hrs Tea Break EPSRC The UK Research Councils and How They Support Research and Doctoral Skills Training in Cyber security, Dr John Braid hrs Session 2: Presentation by Universities/ Research institute i. Nanyang Technological University Prof Thambipillai Srikanthan ii. iii. iv hrs Lunch Imperial College London Secure by Design, Resilient Through Adaptation: Difficult Problems and The Challenge of Integration, Dr Emil Lupu National University of Singapore Trustworthy Systems from Untrusted Component Amalgamations, Prof Abhik Roychoudhury Lancaster University Security and concurrency challenges in programmable networks, Dr Shishir Nagaraja hrs Session 3: Presentation by Universities/ Research institute i. University of Newcastle Challenges in Protecting Critical Infrastructure: People and Systems, Prof. Aad van Moorsel ii. iii. Singapore University of Technology and Design (SUTD) Design of Secure Cyber Physical Sytems, Prof Aditya P Mathur University of Southampton Security Models for Cyber-Physical Systems, Prof. Vladimiro Sassone

3 Time hrs Tea Break Activity hrs Session 4: Presentation by Universities/ Research institute i. A*STAR Cyber Security & Intelligence (CSI), Dr Vrizlynn Thing Cyber-Physical Security, Dr Zhou Jianying ii. University of Oxford Cyber Security: Old Problems and New Contexts, Prof Andrew Martin hrs Wrap up for Day hrs Dinner hosted by Matt Crossman, Regional Director SEA Science and Innovation Venue: 76A Ridley Park, S Dress Code: Smart Casual Wednesday 25 Feb 2015 (Research Technoplaza (RTP)) Dress Code: Long sleeve shirt with no tie Time hrs Project Demo by NTU hrs Tea Break Venue: CHiPES (Level 3) hrs Session 5: Presentation by Industry i. BT Security Mr Hoo Chuan Wei Venue: NTU Reality Theatre (Level 2) Activity hrs Final Plenary discussion on opportunities for collaboration and closing hrs Lunch Venue: NTU Reality Theatre (Level 2) End of Workshop

4 Profiles on Singapore Researchers 1. Dr Jianying Zhou, Head of Infocomm Security Department, Institute for Infocomm Research(I2R) Jianying Zhou has been managing a number of R&D projects including EU funded project SMEPP , A*STAR funded project SEDS , EMA funded project SecSG-EPD090005RFP(D), and NRF funded project SecUTS-NRF2014NCR-NCR Dr. Zhou received PhD in Information Security from University of London, MSc in Computer Science from Chinese Academy of Sciences, and BSc in Computer Science from University of Science and Technology of China. His research interests are in applied cryptography, computer and network security, cyber-physical security, mobile and wireless security. Dr. Zhou worked in China, Singapore, and USA before joining I2R. He was an adjunct professor in Kyushu University, Shanghai Jiaotong University and University of Science and Technology of China. He is actively involved in the academic community, having served over 150 times in international crypto and security conference committees as general chair, program chair, and PC member, having been in the editorial board and as a regular reviewer for over 30 international journals. He has published over 200 referred papers at international conferences and journals. He is a co-founder and steering committee member of International Conference on Applied Cryptography and Network Security (ACNS), which is ranked in top 20 crypto and security conferences. 2. Prof Abhik Roychoudhury, Professor of Computer Science, and Vice Dean (Graduate Studies) at School of Computing, National University of Singapore. Abhik Roychoudhury received his Ph.D. in Computer Science from the State University of New York at Stony Brook in Since 2001, he has been employed at the National University of Singapore. His research has focused primarily on software testing and analysis, trustworthy software and real-time embedded software. His research has received various awards and honors, the most recent being his appointment as ACM Distinguished Speaker in He is currently leading the TSUNAMiproject, a large five-year long targeted research effort funded by National Research Foundation in the domain of software security. His research has been funded by various agencies and companies, including the National Research Foundation (NRF),

5 Ministry of Education (MoE), A*STAR, Defense Research and Technology Office (DRTech), DSO National Laboratories, Microsoft and IBM. He has authored a book on "Embedded Systems and Software Validation" published by Elsevier (Morgan Kaufmann) Systems-on- Silicon series in 2009, which has also been officially translated to Chinese by Tsinghua University Press. He has served in various capacities in the program committees and organizing committees of at least fifty conferences, and is currently serving as an Editorial Board member of IEEE Transactions on Software Engineering (TSE). 3. Dr Vrizlynn Thing, Head Cyber Security & Intelligence (CSI) R&D Department, Institute of Infocomm Research (I2R) Vrizlynn Thing department focuses on digital forensics, cybercrime analysis, cyber security & intelligence, and mobile security research and technology development. She is also an Adjunct Associate Professor at the National University of Singapore (School of Computing), and the Singapore Management University (School of Information Systems). She has over 13 years of security and forensics R&D experience with in-depth expertise in various aspects of cyber security, forensics & intelligence. Her research draws on her multidisciplinary background in computer science (Ph.D. from Imperial College London, United Kingdom), and electrical, electronics, computer and communications engineering (B.Eng. and M.Eng by Research from Nanyang Technological University, Singapore). During her career, she has taken on various advisory and consultancy roles for national level cyber security initiatives. She also participates actively as the Lead Scientist of collaborative projects with industry partners such as MNCs, SMEs and the government agencies. 4. Prof Aditya Mathur, Head of Information Systems Technology and Design Pillar, Singapore University of Technology and Design(SUTD) Aditya has designed and taught numerous courses in Computer Science ranging from freshman to senior graduate levels. Focus on student engagement and active learning are two critical components of Aditya s teaching style. He has authored several textbooks. His most well known book Introduction to Microprocessors was first published in 1980 by Tata McGraw Hill and its third edition is now in its 36th reprint. This book, the first on the subject in India, led to the initiation and subsequent proliferation of undergraduate courses in microprocessors. His most recent book is titled Foundations of Software Testing and was published by Addison Wesley Professional in In collaboration with Barry Wittman and Tim Korb, Mathur has co-authored A Gentle Introduction to Programming Using Java. This book is intended to serve as a text in freshman programming courses.

6 Research Aditya s research spans software testing, reliability, and process control. His foundational work, published in over 130 papers, relates to investigations into the effectiveness of testing techniques and their applicability to the testing of sequential and distributed software systems, methods for the estimation of software system reliability, and techniques and tools for managing a collection of Internet-enabled devices. Service Aditya was a member of a small team of faculty members who started the first computer science department in India.Subsequently Aditya served as the head of this department. Later Aditya served as the associate head and head of Computer Science, Associate Dean of College of Science, and Director of the Software Engineering Research Center all at Purdue University. Education PhD, Electrical Engineering, 1977 MS, Electrical Engineering, 1972 BS, Electrical Engineering and Computer Science, 1970 Research Projects Software testing and reliability: Aditya has been a crusader for the use of code coverage criteria in the estimation of software reliability or as an orthogonal metric to assess confidence in the reliability estimates. He has proposed the Saturation Effect as a motivating device, and as a fundamental principle, for the quantitative test assessment using an increasingly powerful suite of criteria. Vendors to enhance marketing of their test tools often use this device. Mathur, in collaboration with Raymond DeCarlo, has pioneered research into the use of feedback control in software development. This research has led to the development of a new area now known as Software Cybernetics. Information retrieval: Aditya, in collaboration with Luo Si and Jason Fish, is the prime architect of the INDURE expertise search system. This system is in use at four universities in the state of Indiana and serves as a model for expertise search systems under development in other states. The success of INDURE led the State of Indiana to fund the MapIN project. The goal of this ongoing project is to extend the academic expertise in INDURE by including the expertise in the commercial sector.

7 Profiles on UK Delegates 1. Dr John Baird, Lead for Cyber Security within the Partnership for Conflict, Crime and Security Research, Engineering and Physical Sciences Research Council (EPSRC) Since May 2011 John has been the Lead for the interdisciplinary RCUK Digital Economy Theme. This is a major initiative in the RCUK strategy to crossconnect disciplines and have impact through large scale interdisciplinary research. The Digital Economy Theme has evolved new ways of carrying out research, innovative means of achieving impact, new research ecologies, supporting high quality research students from new sources and has been an agent of transformational change. Since August 2013 he has also taken on the lead for EPSRC s activities in Cyber-security within the Partnership for Conflict, Crime and Security Research (PaCCS, formerly known as the RCUK GU Programme). John joined the Research Councils after doing post-doctoral research in pharmacology. He has held a variety of positions, including responsibility for EPSRC s fellowships activities and Knowledge Transfer and Impact activities (including KTP and LINK) as well as heading EPSRC s Chemistry Programme. 2. Prof. Aad van Moorsel, University of Newcastle Aad van Moorsel is a Professor in Distributed Systems and Head of School in the School of Computing Science at Newcastle University. His group conducts research in security, privacy and trust. Almost all of the group's research contains elements of quantification, be it through system measurement, predictive modelling or on-line adaptation. Aad worked in industry from 1996 until 2003, first as a researcher at Bell Labs/Lucent Technologies in Murray Hill and then as a research manager at Hewlett-Packard Labs in Palo Alto, both in the United States. He got his PhD in computer science from Universiteit Twente in The Netherlands (1993) and has a Masters in mathematics from Universiteit Leiden, also in The Netherlands. After finishing his PhD he was a postdoc at the University of Illinois at Urbana-Champaign, Illinois, USA, for two years. Aad became the Head of the School of Computing Science in Research Interests My group takes the perspective of the user and the decision-maker, and asks the questions: how can we run IT, make decisions about IT, and implement IT such that the business is secured but efficient and people feel safe but can be productive. We provide new, scalable technologies and methodologies in pursue of the holy grail: make decisions, operate and optimize information systems for the proven good of an organisation without any human intervention. That will never succeed completely, but it poses us interesting research targets. Our research is based on sound foundations in systems research. Our research is heavy on quantification, combining system measurement with mathematical modelling and system implementation. We build software and systems, apply math, and invent algorithms and architectures.

8 3. Dr. Emil Lupu, Faculty of Engineering, Department of Computing, Imperial College London Dr. Emil Lupu leads the Academic Centre of Excellence in Cyber Security Research at Imperial College and is an Associate Director with Imperial s Institute for Security Science and Technology. His research interests are in the design of trustworthy and adaptive systems that are resilient to malicious compromise across a broad range of applications ranging from wireless sensor networks to cloud environments. His current research projects include work on detecting and diagnosing malicious data injections in wireless sensor networks, analysis of threat propagation in cloud environments and making decisions with partially trusted information, amongst others. Dr Lupu s past work has led to numerous contributions to policy-based network and systems management covering all aspects of the policy life-cycle: specification, analysis, refinement, deployment and learning. This work has been applied in both pervasive computing environments and more traditional networked infrastructures. 4. Prof. Vladimiro Sassone, Electronic and Computer Science, Faculty of Physical Sciences and Engineering, University of Southampton Vladimiro Sassone is Professor of Computer Science in ECS, University of Southampton, and Director of the Centre of Excellence for Cyber Security Research. His background is in the theory of computing, with emphasis on computational models for concurrency, language-based security and types, and on formal methods. Recently his work focussed on predictive (Bayesian) trust models, privacy and anonymisation, and anonymity mechanisms such as TOR. In particular he has pioneered the application of Markov models to trust evaluation and of game-theory and mechanism design to the design and evaluation of incentive schemes in anonymity networks. His current interests include safety/security co-design, cyber security of cyber-physical systems and the Internet-of-Things. Professor Sassone is president of European Association for Theory and Practice of Software, member of the Academia Europaea, of the board of the European Association for Theoretical Computer Science, and editor in chief of the Springer ARCOSS series and of ACM Selected Readings in Computing. 5. Dr. Shishir Nagaraja, School of Computing and Communications, Faculty of Science and Technolgy Dr. Shishir Nagaraja is a Senior Lecturer at Lancaster University. He specialises in network security and privacy. His long term research aim is to develop secure programmable networks. His current interests lie in solving security and concurrency challenges in the context of SDN and NFV. He is also engaged in several projects on privacy-enhancing technologies such as unobservable communication networks, location-anonymous cameras, and location-anonymous audio recorders. He has been instrumental in discovering social malware and uncovering ISP-level censorship practices across the world. He is concurrently Adjunct Professor at ECE, UIUC. He holds several patents in security. Dr. Nagaraja holds a Ph.D. from Cambridge University. His thesis explored the foundational aspects of adversarial complex networks.

9 6. Prof. Andrew Martin, Director, Centre for Doctoral Training in Cyber Security, Department of Computer Science, University of Oxford. Prof. Andrew Martin undertakes research and teaching in the area of Systems Security, in the University of Oxford. He conceived the University's new Cyber Security Centre and helps to direct it, leading the University's successful bid to be recognised as a Centre of Excellence in Cyber Security Research. He directs the new Centre for Doctoral Training in Cyber Security, which admits 17 students each year for inter-disciplinary education and research. His recent research focus has been on the technologies of Trusted Computing, exploring how they can be applied in grid and cloud computing contexts, as well as in mobile devices, in order to address their emerging security challenges. He has published extensively in this area, hosting several related international events in Oxford and speaking on the subject all over the world. These technologies are now emerging as crucial components in the internet of things, which is proving a fruitful additional research area. Andrew wrote a doctoral thesis on the subject 'Machine-Assisted Theorem Proving for Software Engineering', in the early 1990s. He then worked as a Research Fellow in the Software Verification Research Centre at the University of Queensland, Australia. Returning to the UK, he was briefly a lecturer at the University of Southampton, before returning to Oxford to take up his present post in Dr Martin is a fellow of Kellogg College, Oxford. He is presently the supervisor for seven doctoral students, and holds several research grants.

10 Date: 24 February 2015 Time: 9am to 4.30pm Venue : Nanyang Executive Centre (NEC), Lecture Room 2

11 Date : 25 Feb 2015 (Wednesday) Time : 8.30 am to 1.30 pm Venue : Research Techno Plaza (RTP), CHiPES (level 3) & NTU Reality Theatre (level 2) By Car: (Please refer to the green coloured route in the map above) Coming from Pan Island Expressway (PIE) towards Tuas. Exit PIE via Exit 38, Pioneer Road North and turn right into Nanyang Technological University (NTU). Upon entering NTU, keep left and turn left at the Nanyang Crescent T-junction. Keep left and drive for about 2 km until you see the 9-storey Research Techno Plaza (RTP) Building on your right. Turn into the driveway of RTP and head towards the underground carpark. After parking your vehicle, look for the door to "BorderX Block Lift Lobby" and take Lift #3 or #4 to Level 3.

12 By Mass Rapid Transit & Bus: (Refer to the red coloured route in the map above) Route A Take a Mass Rapid Transit (MRT) train to the Boon Lay train station in the west. Proceed to the bus interchange and take SBS Transit bus number 179. The bus will travel along Nanyang Drive, and will pass the Halls of Residences, School of Arts, Media & Design and the School of Biological Sciences. Alight at the bus stop just after RTP. Enter the RTP lobby, go to the BorderX Block Lift Lobby and take Lift #3 or #4 to Level Level 3. Route B Take a Mass Rapid Transit (MRT) train to the Pioneer train station in the west. Upon exiting the control station, turn left, head to the bus-stop below the train station and take SBS Transit bus number 179 The bus will travel along Nanyang Drive, and will pass the Halls of Residences, School of Arts, Media & Design and the School of Biological Sciences. Alight at the bus stop just after RTP. Enter the RTP lobby, go to the BorderX Block Lift Lobby and take Lift #3 or #4 to Level 3.

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call PRESS RELEASE NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call Singapore, 15 October 2014 (Wednesday) The National Research Foundation (NRF), Prime Minister s Office,

More information

Advancing cyber security. Cyber Security Academy

Advancing cyber security. Cyber Security Academy Advancing cyber security. Cyber Security Academy An industry/university partnership to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

More information

Cyber Security in the University of Oxford: Collaborating without Conforming?

Cyber Security in the University of Oxford: Collaborating without Conforming? Cyber Security in the University of Oxford: Collaborating without Conforming? Andrew Martin June 2013 Workshop on Addressing R&D Challenges in Cybersecurity: Innovation and Collaboration Strategy Cybersecurity

More information

MASTERS IN BUSINESS ADMINISTRATION MBA PLUS

MASTERS IN BUSINESS ADMINISTRATION MBA PLUS MASTERS IN BUSINESS ADMINISTRATION MBA PLUS INTRODUCING THE NORTHAMPTON BUSINESS SCHOOL MBA PLUS The Northampton Business School MBA Plus is an internationally recognised postgraduate qualification in

More information

Professor John Varcoe (Department of Chemistry, University of Surrey, UK) Plamen Atanassov

Professor John Varcoe (Department of Chemistry, University of Surrey, UK) Plamen Atanassov Electronic Supplementary Material (ESI) for Energy & Environmental Science. This journal is The Royal Society of Chemistry 2014 Professor John Varcoe (Department of Chemistry, University of Surrey, UK)

More information

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western

More information

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of

More information

FINAL ASSESSMENT REPORT Graduate Review of Electrical and Computer Engineering (MEng, MSc, PhD) March 2013

FINAL ASSESSMENT REPORT Graduate Review of Electrical and Computer Engineering (MEng, MSc, PhD) March 2013 Review Process FINAL ASSESSMENT REPORT Graduate Review of Electrical and Computer Engineering (MEng, MSc, PhD) March 2013 The self-study was produced with the assistance of a committee which included the

More information

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE

LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE LIVERPOOL HOPE UNIVERSITY FACULTY OF SCIENCE COMPUTER SCIENCE YOUR FUTURE STARTS WITH HOPE 021015 Computer Science Fact File Faculty: Science Department: Mathematics and Computer Science Campus Location:

More information

Geoff Coyle: legacy and prospects for system dynamics

Geoff Coyle: legacy and prospects for system dynamics UK Chapter of the International System Dynamics Society Hosts: Department of Earth Science and Engineering, Imperial College Location: Royal School of Mines, Imperial College, London Wednesday 29 May 2013

More information

Masters in Applied Cyber Security Upskilling Existing Employees

Masters in Applied Cyber Security Upskilling Existing Employees Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies

More information

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer.

We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to Senior Lecturer. Faculty of Engineering School of Computing Lecturer / Associate Professor in Computer Science We have introduced the title of Associate Professor for our grade 9 academic staff, which is equivalent to

More information

Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems

Faculty of Engineering School of Electronic and Electrical Engineering. University Academic Fellow Smart Energy Systems Faculty of Engineering School of Electronic and Electrical Engineering University Academic Fellow Smart Energy Systems With a vision and drive to develop a prestigious internationally competitive research

More information

MSc in Software and Systems Security. (part-time) flexible, professional education

MSc in Software and Systems Security. (part-time) flexible, professional education MSc in Software and Systems Security (part-time) flexible, professional education Software and Systems Security As computing technologies become more pervasive, more connected, and more indispensable,

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

H103: General Engineering

H103: General Engineering H103: General Engineering Undergraduate BEng 2016 Essentials UCAS code Degree Professional accreditation Mode of study Duration Location A-Level International Baccalaureate Department(s) Website Email

More information

MSc Computer Security & Resilience 2015-16. Steve Riddle Degree Programme Director

MSc Computer Security & Resilience 2015-16. Steve Riddle Degree Programme Director MSc Computer Security & Resilience 2015-16 Steve Riddle Degree Programme Director Welcome! 1. Computer Security & Resilience 2. Computing Science at Newcastle our School 3. Principles of Study at MSc Level

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool

1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool Invited Speakers (Tentative) 1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool The worldwide market for DC technologies in buildings is estimated

More information

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract

David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

Energy Technology and Policy

Energy Technology and Policy A new course of study leading to M.S. in Technological Systems Management Energy Technology and Policy Department of Technology and Society College of Engineering and Applied Sciences State University

More information

How To Discuss The Importance Of Relevant Research In Supply Chain And Operations Management

How To Discuss The Importance Of Relevant Research In Supply Chain And Operations Management Saturday Plenary Session May 9, 2015, 2:00 PM 3:30 PM; Venue: Columbia 5-8 Aleda Roth, College of Business and Behavioral Science, Clemson University Vinod Singhal, Associate Dean, Scheller College of

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

1. To develop the multidisciplinary skills essential to produce the trained experts in cloud computing and big data required by academia and industry

1. To develop the multidisciplinary skills essential to produce the trained experts in cloud computing and big data required by academia and industry PROGRAMME SPECIFICATION 1 Awarding Institution Newcastle University 2 Teaching Institution Newcastle University 3 Final Award MRes / PGDip 4 Programme Title Cloud Computing for Big Data 5 Programme Code

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

Nuclear Engineering Doctorate Programme Prospectus

Nuclear Engineering Doctorate Programme Prospectus Nuclear Engineering Doctorate Programme Prospectus Enhance your career opportunities through postgraduate training - undertaken in close collaboration with companies - equipping you to take up leading

More information

Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION

Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION Business Transformation Through IT Leadership BUTLER UNIVERSITY CORPORATE AND EXECUTIVE EDUCATION Context There exists a need for business school curriculum that prepares experienced managers with technology

More information

G603: Software Development for Business

G603: Software Development for Business G603: Software Development for Business Undergraduate BSc 2016 Essentials UCAS code Degree Professional accreditation Mode of study Duration Location A-Level International Baccalaureate Department(s) Website

More information

Service Component Architecture for Building Cloud Services

Service Component Architecture for Building Cloud Services Service Component Architecture for Building Cloud Services by Dr. Muthu Ramachandran, Principal Lecturer in the Computing and Creative Technologies School Abstract: The emergence of cloud computing has

More information

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

More information

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6 Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and

More information

MEng/BEng (Honours) COMPUTER and ELECTRONIC SYSTEMS

MEng/BEng (Honours) COMPUTER and ELECTRONIC SYSTEMS MEng/BEng (Honours) COMPUTER and ELECTRONIC SYSTEMS MEng/BEng (Honours) COMPUTER and ELECTRONIC SYSTEMS MEng COMPUTER and ELECTRONIC SYSTEMS with INTERNATIONAL STUDY What do 3D-TV, digital cameras, smart

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

More information

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Information Technology Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information

More information

GOING TO GRADUATE SCHOOL IN THE MATHEMATICAL SCIENCES

GOING TO GRADUATE SCHOOL IN THE MATHEMATICAL SCIENCES GOING TO GRADUATE SCHOOL IN THE MATHEMATICAL SCIENCES By Ricardo Cortez and Colette Patt. Produced by the Physical Sciences Student Diversity Program, Dean's Office of the College of Letters and Science,

More information

SCHOOL OF ENGINEERING. www.warwick.ac.uk/go/engineering RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS

SCHOOL OF ENGINEERING. www.warwick.ac.uk/go/engineering RESEARCH DEGREES TAUGHT MASTER S DEGREES CONTACT DETAILS RESEARCH GROUPS Warwick s is one of the leading engineering schools in the UK. We offer a range of specialist taught Master s courses and research degrees. The School has a strong research profile placing it in the top

More information

1) Chemical Engg. PEOs & POs Programme Educational Objectives

1) Chemical Engg. PEOs & POs Programme Educational Objectives 1) Chemical Engg. PEOs & POs Programme Educational Objectives The Programme has the following educational objectives: To prepare students for successful practice in diverse fields of chemical engineering

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/

CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/ CURRICULUM VITAE 1 Igor V. Maslov Contact information 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304 Tokyo 151-0073 E-mail: [email protected] Japan Web: http://www.columbia.edu/~ivm3/ Education

More information

2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu

2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu 2014-15 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.

More information

Special Issue on Advances of Utility and Cloud Computing Technologies and Services

Special Issue on Advances of Utility and Cloud Computing Technologies and Services Special Issue on Advances of Utility and Cloud Computing Technologies and Services Aims Computing is rapidly moving towards a model where it is provided as services that are delivered in a manner similar

More information

2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu

2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu 2015-16 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.

More information

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud [email protected]

More information

SASA: Strategic planning for the future

SASA: Strategic planning for the future SASA: Strategic planning for the future Roelof Coetzer 6 November 2013 An era of great excitement for statistics Statistician voted the fourth best job in the world! There is a fantastic job outlook: Chief

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

SMU PhD IN PSYCHOLOGY. Cutting-edge insights into individuals, organisations and societies

SMU PhD IN PSYCHOLOGY. Cutting-edge insights into individuals, organisations and societies SMU PhD IN PSYCHOLOGY Cutting-edge insights into individuals, organisations and societies Our research-oriented PhD programme prepares students to gain both content knowledge and hands-on skills for being

More information

ENHANCING BIOMEDICAL ENGINEERING EDUCATION WITH INTERNSHIPS. P.H. Tan*, C.S. Gwee* and K.S. Tang**

ENHANCING BIOMEDICAL ENGINEERING EDUCATION WITH INTERNSHIPS. P.H. Tan*, C.S. Gwee* and K.S. Tang** ENHANCING BIOMEDICAL ENGINEERING EDUCATION WITH INTERNSHIPS P.H. Tan*, C.S. Gwee* and K.S. Tang** * Ngee Ann Polytechnic/School of Engineering, ECE Division, Singapore ** Ngee Ann Polytechnic/School of

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Engineering Attractiveness

Engineering Attractiveness 1 SEFI Deans Meeting Birmingham, 29 & 30 March 2012 Engineering Attractiveness Mervyn Jones Imperial College London Outline 2 Introduction Issues in Engineering Attractiveness Student perceptions a survey

More information

CONTENT. King Abdullah II Faculty of Engineering

CONTENT. King Abdullah II Faculty of Engineering CONTENT About Mission, Vision & Goals Engineering Faculty Engineering Resources Bachelor Programs B. Sc. Program in Electronics Engineering B. Sc. Program in Computer Engineering B. Sc. Program in Communication

More information

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site [email protected] [email protected] www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is

More information

The Value of E-Resources in the Cloud Era

The Value of E-Resources in the Cloud Era EBSCO User Conference The Value of E-Resources in the Cloud Era E-resource in the Cloud is revolutionizing the information industry. It is changing how we access, view and store information. As partners

More information

University of Cambridge: Programme Specifications MASTER OF PHILOSOPHY (A) IN ENVIRONMENTAL DESIGN IN ARCHITECTURE

University of Cambridge: Programme Specifications MASTER OF PHILOSOPHY (A) IN ENVIRONMENTAL DESIGN IN ARCHITECTURE University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed

More information

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Software Engineering (B.S.S.E.) Goals of the Software Engineering Program The focus of the Software Engineering degree

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman [email protected]

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman [email protected] Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

About the Double Honours Degree in Accountancy and Business. Bachelor of Accountancy and Bachelor of Business

About the Double Honours Degree in Accountancy and Business. Bachelor of Accountancy and Bachelor of Business Reg. No. 200604393R Fact Sheet About the Double Honours Degree in Accountancy and Business 会 计 与 商 科 双 学 士 荣 誉 学 位 课 程 School: Bachelor of Accountancy and Bachelor of Business 3.5 to 4 years Nanyang Business

More information

WE ARE FUTURE LEADERS

WE ARE FUTURE LEADERS WE ARE FUTURE LEADERS WE ARE THE DEPARTMENT OF BIOENGINEERING Why should you study biomedical engineering? Of all the engineering disciplines, none has the power to transform lives quite so dramatically

More information

UMD Department of Mechanical and Industrial Engineering

UMD Department of Mechanical and Industrial Engineering UMD Department of Mechanical and Industrial Engineering Indices and Standards for Tenure and Promotion to Professor as Required by Section 7.12 of the Board of Regents Policy on Faculty Tenure (June 10,

More information

University of York. The York Management School. Lecturer in International Business. Ref: UoY00919. Job Description and Person Specification

University of York. The York Management School. Lecturer in International Business. Ref: UoY00919. Job Description and Person Specification University of York The York Management School Lecturer in International Business Ref: UoY00919 Job Description and Person Specification Requirements of the post This is a new post arising from continuing

More information

Introduction to MSc Program in Operations Management & Logistics

Introduction to MSc Program in Operations Management & Logistics Introduction to MSc Program in Operations Management & Logistics Today s program What is OML? The Master s Program Program structure International semester Thesis After OML Student experience / School

More information

Tutorials: Abstracts and Speakers Bio

Tutorials: Abstracts and Speakers Bio Tutorials: Abstracts and Speakers Bio 1. Name of Speaker: Rene van Dorp Affiliation: George Washington University, Washington, DC Email or other contact info:[email protected] Brief bio: J. Rene van Dorp

More information

Cybersecurity education for the next generation Emerging best practices

Cybersecurity education for the next generation Emerging best practices Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate

More information

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,

More information

Teaching in School of Electronic, Information and Electrical Engineering

Teaching in School of Electronic, Information and Electrical Engineering Introduction to Teaching in School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University Outline Organization of SEIEE Faculty Enrollments Undergraduate Programs Sample Curricula

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme BEng Computer Systems Engineering/BEng Computer Systems Engineering with Placement

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme BEng Computer Systems Engineering/BEng Computer Systems Engineering with Placement PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme BEng Computer Systems Engineering/BEng name Computer Systems Engineering with Placement Award BEng (Hons) School School of Engineering

More information

Graduate Program Policies and Procedures

Graduate Program Policies and Procedures The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures May 2007 Table of Contents 1 Introduction 4 2 Programs 4 3 Admissions 4 3.1 Eligibility 4 3.2

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE

TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section MASTER S PROGRAMME IN FORENSIC SCIENCE UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE TEACHING AND EXAMINATION REGULATIONS PART B: programme specific section Academic year 2015 2016 MASTER S PROGRAMME IN FORENSIC SCIENCE Chapter 1 Article 1.1 Article

More information

School of Computing and Technology

School of Computing and Technology School of Computing and Technology We offer employmentfocused education and research in computing, the built environment and engineering, giving our students industry-relevant skills and knowledge. Applied

More information

Knowledge and Understanding

Knowledge and Understanding PROGRAMME SPECIFICATION 1 Awarding Institution Newcastle University 2 Teaching Institution Newcastle University 3 Final Award MSc 4 Programme Title Computer Security and Resilience 5 UCAS/Programme Code

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information