Competence Center Security

Size: px
Start display at page:

Download "Competence Center Security"

Transcription

1 Competence Center Security DAI-Labor The Laboratory for Distributed Artificial Intelligence (DAI-Labor) is an institute of the Technische Universität Berlin; it currently is employing about 100 researchers, graduate students, postdocs and support staff. The research focus lies on agent technologies and its fast and safe deployment in diverse application areas of business and telecommunications. In particular, an open and scalable agent framework for the design, test and deployment of sophisticated services, the Java Intelligent Agent Componentware (JIAC) is developed at DAI-Labor. Additional fields of research at DAI- Labor are wireless technologies in heterogeneous networks and security issues concerning network operators and end users. Competence Center Security (CC SEC) The main focus of the Competence Center Security is the design and implementation of intelligent security solutions that operate autonomously. In our opinion, the ubiquity and pervasiveness of contemporary networked systems poses new challenges which can not be met with conventional monolithic approaches. Autonomous Security deals with the design and implementation of a security framework which is aware of its environment, detects changes in this environment indicating a threat to the system and makes decisions reacting to these threats in an intelligent and autonomous fashion.

2 The framework-inherent security mechanisms will assist end users and administrators in dealing with different threats and their rapid rate of propagation and allow them to master the complexity of contemporary IT infrastructures. Hence, the research directions in CC Security prominently include: Application of AI approaches for detecting unknown attack patterns Design of cooperative models for joint attack detection Combination of various different mathematical approaches to network analysis Design and implementation of secure software solutions Main Research Areas Autonomous Security Framework This cluster deals with the conceptual development and the implementation of Autonomous Security components, with the exception of the separately clustered Detection Units. This includes the abovementioned cooperation mechanisms as well as mathematical models for network analysis and tools for the simulation and evaluation of security functionality. Secure Services This cluster handles the development of autonomous security solutions as well as secure services on top of the JIAC IV agent framework. In this respect, the main focus is the realization of security mechanisms and the design of secure development processes for the JIAC IV Service Development methodology. Malware Detection The cluster Malware Detection deals with the various approaches originating from multiple domains for detecting malware. This ranges from bio-inspired techniques, supervised and unsupervised learning strategies to statistical analysis. Another goal is to intelligently combine different algorithms to achieve better detection results. Reference Projects JIAC Intelligent and autonomous agents are the key technology for realising flexible and distributed systems. In the JIAC project [Fricke 2001] a scalable serviceware framework for agents was developed, which allowed adaptive configuration relating to changing users, groups, security policies and interoperability.

3 The core of the JIAC serviceware framework is a component oriented architecture, which allows creating software agent from different software components [Sesseler 2002]. Each needed ability like understanding different communication protocols, knowledge processing and action managing as well as scheduling can be found in a special component. Further more, additional collections of services, possible tasks and ontologies can be found, e.g. billing and accounting services. Unlike JIAC components, services, actions and ontologies are not written in Java, they use a special logical and declarative programming language called JIAC Agent Description Language (JIAC), which allows fast creation and configuration of agents. Application specific, additional functions can be created by extending already existing components, services, actions or ontologies using Java or JADL. JIAC Agents base on the Belief, Desire, Intention (BDI-) Model, which means that they follow goals to achieve certain desired states. This is done more efficiently by having the ability to choose between different Actions. Communication between components of an agent is realized by asynchronous messages. For data exchange between agents and services, which base on FIPA conform messages. JIAC supports HTTP, TCP, and SSL for exchange of FIPA conform messages, where only HTTP is described in the FIPA standard, but using TCP and SSL increases security and reliability. An additional characteristic of JIAC is that security played an important role in design phase [Bsufka 1999]. Different security mechanisms are implemented in JIAC [Schmidt 2002], e.g. the protection of the transport layer with SSL, as well as the protection of the application layer. Further more, mechanisms like authorization and authentication of agents, agents owners and users are included. All these mentioned mechanisms base on the Public Key Infrastructure (PKI) mechanisms in JIAC [Bsufka 2006]. JIAC supports the PKI standards x.509 and SPKI. The migration of mobile agents basing on trusting systems for mobile agents [Albayrak 2001] is included, too. Further more, JIAC version is evaluated and certified for Common Criteria EAL 3 [DAILabor2004, Geissler 2004, BSI 2005]. Beside the ability of reading private keys from filesystem, in version agents are able to use private keys from chip cards with a special enhancement [Scheunemann2002]. With JIAC, development is not only supported by collections of components, services, actions and ontologies, several additional tools [Hirsch 2006] that help to create agents and to define their roles and communication protocols, are provided Other Projects We have also other reference projects in the security area. However, because of contract and IPR agreements we are not allowed to publish details about them officially. NetShield DDos Detection The objective of the project NetShield DDos Detection is to develop a smartphone security framework capable of detecting malicious code on mobile device and to initiate the appropriate counter measures.

4 NetShield Malware Filtering The project Malware Filtering focuses on the net centric approach of Malware Detection. Therefore the network security simulator (NeSSi) is developed capable of evaluating detection algorithms. The development of new algorithms in the area of network security is the second foundation of the project. Selected Publications [Albayrak 2001] Sahin Albayrak and Karsten Bsufka. Integration von Public-Key- Infrastruktur-Funktionalitäten in Agenten-Toolkits. In S. Jablonski, S. Kirn, M. Plaha, E.J. Sinz, A. Ulbrich vom Ende, and G. Weiß, editors, Verteile Informationssysteme auf der Grundlage von Objekten, Komponenten und Agenten. PROCEEDINGS der Verbundtagung VertIS 2001, pages , October [Albayrak 2005] Sahin Albayrak, Achim Müller, Christian Scheel, and Dragan Milosevic. Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In M. Mohammadian, editor, Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), Vienna, Austria, [Bsufka 1999] Karsten Bsufka, Stefan Holst, and Torge Schmidt. Realization of an Agent- Based Certificate Authority and Key Distribution Center. In Sahin Albayrak, editor, Intelligent Agents for Telecommunication Applications, number 1699 in Lecture Notes in Artifical Intelligence, pages , Third International Workshop, IATA 99, Stockholm, Sweden, August [Bsufka 2006] Karsten Bsufka. Public Key Infrastrukturen in Agentenarchitekturen zur Realisierung dienstbasierter Anwendungen. Dissertation, Technische Universität Berlin, [Bsufka 2006b] Karsten Bsufka, Olaf Kroll-Peters Sahin Albayrak. Intelligent Network- Based Early Warning Systems. Proceedings of 1st International Workshop on Critical Information Infrastructures Security, Samos Greece Lecture Notes in Computer Science LNCS Vol Editor Javier Lopez. Springer-Verlag Berlin Heidelberg, [BSI 2005] Bundesamt für Sicherheit in der Informationstechnik. Certification Report BSI- DSZCC for Java Intelligent Agent Componentware IV Version from DAI- Labor Technische Universität Berlin [DAI-Labor 2004] DAI-Labor. Security Target Java Intelligent Agent Componentware IV [Fricke 2001] Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler, and Sahin Albayrak. Agent-based telematic services and telecom applications. Communications of the ACM, 44(4):43 48, April 2001.

5 [Geissler 2004] Tim Geissler and Olaf Kroll-Peters. Applying Security Standards to Multi Agent Systems. In The First International Workshop on Safety and Security in Multiagent Systems (SASEMAS) Part of AAMAS held at Columbia University New York City, 20 July 2004, July [Hirsch 2006] B. Hirsch, T. Konnerth, A. Hessler, and S. Albayrak. A serviceware framework for designing ambient services. In A. Mana and V. Lotz, editors, Proceedings of the First International Conference on Ambient Intelligence Developments (AmID 06), pages Springer France, [Luther 2007] Katja Luther, Rainer Bye, Tansu Alpcan, Sahin Albayrak, Achim Müller. A cooperative AIS framework for Intrusion Detection. (accepted) IEEE International Conference on Communications 2007 ( [Luther 2006] Katja Luther. Entwurf eines Künstlichen Immunsystems zur Netzwerküberwachung auf Basis eines Multi-Agenten-Systems. Diplomarbeit, Technische Universität Berlin, [Scheel 2005] Christian Scheel. Managing Strategies for a Self-Organising Map based Filtering Agent Community. Diplomarbeit, Technische Universität Berlin, [Scheunemann 2002] Heiko Scheunemann. Einbindung der TCOS-Chipkarten- Funktionalitäten In der Agentenarchitektur JIAC IV. Diplomarbeit, Technische Universität Berlin, 2002 [Schmidt 2002] Torge Schmidt. ASITA: Advanced Security Infrastructure for Multi-Agent Applications in the Telematic Area. Dissertation, Technische Universität Berlin, [Schmidt 2006] Aubrey-Derrick Schmidt. Monitoring of Mobile Devices for Anomaly Detection on Agent Framework JIAC. Diplomarbeit, Technische Universität Berlin, [Schmidt 2007] Stephan Schmidt, Tansu Alpcan, Tamer Basar, Achim Müller, Sahin Albayrak. A Malware Detector Placement Game for Intrusion Detection. Eingereicht für IEEE International Conference on Communications [Sesseler 2002] Ralf Sesseler. Eine modulare Architektur für dienstbasierte Interaktionen zwischen Agenten. Dissertation, Technische Universität Berlin, [Wetzker 2005] Robert Wetzker. Beherrschbarkeit zukünftiger Bedrohungen durch ein Künstliches Immunsystem (AIS) auf Basis von Agententechnologien. Diplomarbeit, Technische Universität Berlin, 2005.

6 Persons Dr.-Ing- Karsten Bsufka finished his doctoral studies at Technische Universität Berlin with the topic Public Key Infrastrukturen in Agentenarchitekturen zur Realisierung dienstbasierter Anwendungen /(engl.: Public Key Infrastructures in Agent Architectures for Realising Service-Oriented Applications ) in He is employed at DAI-Labor for nine years, starting as student assistant and afterwards working as academic staff, where he developed together with others the Serviceware Framework JIAC. Most on his work on JIAC was designing and implementing security and communication mechanisms, where the security mechanisms where certified for Common Criteria by German Bundesanstalt fuer Sicherheit in der Informationstechnologie (BSI). In 2005 he got project leader of the research project DDoS Detection and in 2006 leader of the whole Competence Center Security. His scientific/research interests lie on development of secure distributed systems. Dipl.-Inform. Rainer Bye got the grade Diplom Informatiker, comparable with int. master degree, in 2005 at Technische Universität Carolo-Wilhelmina zu Braunschweig. His research focus lies on distributed systems, which lead him to DAI-Labor Berlin, where he got project leader of the Malware Filtering projects in In this project he develops a network simulator which includes routing and TCP/IP components for traffic analysis. In addition, he is supervisor for diploma thesis s regarding security, databases and distributed systems and is active in acquiring new projects. His scientific/research interests lie on distributed systems and their deployment for cooperative detection of attacks in networks.

7 Dr. Seyit Ahmet Çamtepe received the Ph.D. degree in Computer Science from Rensselaer Polytechnic Institute, Troy, NY, in He received the B.S. and M.S. degrees in Computer Engineering from Boğaziçi University, Istanbul, Turkey, in 1996 and 2001 respectively. He worked as a Network and Security Engineer in Pamukbank (currently Halkbank), Istanbul, Turkey, from 1996 to During his Ph.D. study, he worked on variety of security research projects including key management in wireless sensor networks, attack modelling and detection and social network analysis. He is currently working as a senior researcher in DAI-Labor at Technische Universität Berlin. His research interests include autonomous security, economy of information security, malicious cryptography, key management, distributed system security, attack modelling-detection-prevention, social network analysis and VoIP security. Dipl.-Inform. Olaf Kroll-Peters got the degree Diplom Informatiker in 1999 and worked in different companies in the section of quality assurance. As leader of the support and quality assurance of the company Fresenius Netcare he had intensive contact to the customers, where got to know the special problems concerning user interfaces, which in turn lead to his research field of usability. Besides, first he was project leader of the Common Criteria certification of Agent Framework JIAC IV and then started teaching at Technische Universität Berlin courses relating to security and usability. Olaf Kroll-Peters is supervisor for several diploma thesis s, where the main topics relate to usability, quality assurance and security in distributed systems and cryptologic methods. His scientific/research interests lies on the connection of usability and security, which means realising easy to use systems that nevertheless are secure.

8 Dipl.-Inform., Dipl.-Bio. Katja Luther finished studying computer science at Technischel Universität Berlin in Before, she already worked as student assistant at DAI-Labor, where now she is an academic employee. Besides security in networks and machine learning, she is interested in bio-inspired algorithms like Artificial Immune Systems (AIS) or swarm algorithms. In 2005, she works in Malware Filtering project on the Network Security Simulator NeSSi, where she designed and realized the implementation of the TCP protocol as well as the sockets. Since 2006 she develops and implements a Detection Unit in the project DDoS Detection. Her scientific/research interests lie on machine learning (anomaly detection) in network security and cooperative security solutions. Dipl.-Inform. Arik Messerman finished his Diploma (M.S.) in Computer Science department at Technische Universität Berlin in His research interests include operating systems, cryptology and network security. During the years , he worked as a teaching assistant in DAI-Labor. He is currently employed as a scientific researcher in DAI-Labor and working in the project Malware Filtering).

9 Dipl.-Inform. Aubrey-Derrick Schmidt finished his studies at Technische Universität Berlin in While writing his diploma thesis Monitoring of Mobile Devices for Anomaly Detection on Agent Framework JIAC he worked in DDoS Detection project, where he realized the client side monitoring of Symbian devices. His scientific/research interests lie on mobile devices and related security topics. Dipl-Inform. Stephan Schmidt received his diploma degree in computer science in 2005 at the Technische Universität Berlin specializing in operating and communication systems. Additionally, he received a minor degree in mathematics. He is working as a scientific researcher at the DAI laboratories in the Malware Filtering project. His main areas of interest are network algorithms, game theory, optimization techniques and their application to the network security domain. He is furthermore assisting Rainer Bye in the project management and student mentoring

An Agent-Based Serviceware Framework for Ubiquitous Context-Aware Services

An Agent-Based Serviceware Framework for Ubiquitous Context-Aware Services An Agent-Based Serviceware Framework for Ubiquitous Context-Aware Services Jens Wohltorf, Richard Cissée, Andreas Rieger, and Heiko Scheunemann DAI-Labor Technische Universität Berlin GOR 1-1, Franklinstraße

More information

Agents do it for Money - Accounting features in Agents

Agents do it for Money - Accounting features in Agents Agents do it for Money - Accounting features in Agents Jan Keiser, Benjamin Hirsch, Sahin Albayrak {Jan.Keiser,Benjamin.Hirsch,Sahin.Albayrak}@dai-labor.de DAI-Labor, Technische Universität Berlin, Germany

More information

From Simulation to Emulation- An Integrated Approach for Network Security Evaluation

From Simulation to Emulation- An Integrated Approach for Network Security Evaluation From Simulation to Emulation- An Integrated Approach for Network Security Evaluation Martin Möller, Rainer Bye, Karsten Bsufka, Ahmet Camtepe, Sahin Albayrak DAI-Labor, Technische Universität Berlin martinsemails@googlemail.com,

More information

Personalized Fall Risk Assessment Tool by using the Data Treasure contained in Mobile Electronic Patient Records

Personalized Fall Risk Assessment Tool by using the Data Treasure contained in Mobile Electronic Patient Records Personalized Fall Risk Assessment Tool by using the Data Treasure contained in Mobile Electronic Patient Records Elif ERYILMAZ a,1, Sebastian AHRNDT a, Johannes FÄHNDRICH a and Sahin ALBAYRAK a a DAI Lab,

More information

On Ubiquitous Network Security and Anomaly Detection *

On Ubiquitous Network Security and Anomaly Detection * On Ubiquitous Network Security and Anomaly Detection * Colin Van Dyke Çetin K. Koç Electrical & Computer Engineering Oregon State University {vandyke,koc}@ece.orst.edu Abstract As networking trends move

More information

A Multi-Agent Framework for Personalized Information Filtering

A Multi-Agent Framework for Personalized Information Filtering 2007 German e-science Available online at http://www.ges2007.de This document is under the terms of the CC-BY-NC-ND Creative Commons Attribution A Multi-Agent Framework for Personalized Information Filtering

More information

How To Create A Network Security Simulator

How To Create A Network Security Simulator Application-level simulation for network security Rainer Bye, Stephan Schmidt Katja Luther and Sahin Albayrak 1 DAI-Labor, Technische Universität Berlin {rainer.bye, stephan.schmidt, katja.luther, sahin.albayrak}@dai-labor.de

More information

Software Agent Technology in Mobile Service Environments 1

Software Agent Technology in Mobile Service Environments 1 Software Agent Technology in Mobile Service Environments 1 Ralf Sesseler, Alexander Keiblinger, Nicolas Varone DAI-Lab at Technische Universität Berlin Sekretariat FR 6-7, Franklinstraße 28/29, 10587 Berlin,

More information

Monitoring Smartphones for Anomaly Detection

Monitoring Smartphones for Anomaly Detection Monitoring Smartphones for Anomaly Detection Aubrey-Derrick Schmidt aubrey.schmidt@dailabor.de Frank Peters frank.peters@dailabor.de Sahin Albayrak sahin.albayrak@dailabor.de Florian Lamour florian.lamour@dailabor.de

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Advanced Grid Management Software for. Seamless Services

Advanced Grid Management Software for. Seamless Services Advanced Grid Management Software for Seamless Services Sahin Albayrak 1, Silvan Kaiser 1, Jan Stender 1 1 DAI-Labor, Technische Universität Berlin, Secretary GOR 1-1, Franklinstrasse 28/29, D-10587 Berlin,

More information

Advanced Grid Management Software for Seamless Services

Advanced Grid Management Software for Seamless Services Advanced Grid Management Software for Seamless Services Sahin Albayrak¹, Silvan Kaiser¹, Jan Stender¹ ¹DAI-Labor, Technische Universität Berlin, Secretary GOR 1-1, Franklinstrasse 28/29, D-10587 Berlin,

More information

K 066/921. Master Curriculum. Computer Science. (in English)

K 066/921. Master Curriculum. Computer Science. (in English) K 066/921 Master Curriculum Computer Science (in English) 1_MS_ComputerScience_Curr Seite 1 von 11 Inkrafttreten: 1. 10. 2013 Table of Contents 1 Qualification Profile...3 2 Admissions...5 3 Structure

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

Network Security Using Job Oriented Architecture (SUJOA)

Network Security Using Job Oriented Architecture (SUJOA) www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Load Balancing Management by Efficient Controlling Mobiles Agents

Load Balancing Management by Efficient Controlling Mobiles Agents International Journal of Soft Computing and Engineering (IJSCE) Load Balancing Management by Efficient Controlling Mobiles Agents Mohamed Bahaj, Abdellatif Soklabi, Ilias Cherti Abstract- Load balancing

More information

Agent-based dam monitoring

Agent-based dam monitoring Agent-based dam monitoring V. BETTZIECHE, Ruhrverband (Ruhr River Association), Essen, GER SYNOPSIS. The monitoring of security relevant structures is a task of growing importance in civil engineering.

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

ArneKesting. Publication List. Journal Articles as First Author { A. Kesting, M. Treiber, D. Helbing: Enhanced Intelligent Driver Model to Access the

ArneKesting. Publication List. Journal Articles as First Author { A. Kesting, M. Treiber, D. Helbing: Enhanced Intelligent Driver Model to Access the ArneKesting Publication List Journal Articles as First Author { A. Kesting, M. Treiber, D. Helbing: Enhanced Intelligent Driver Model to Access the Impact of Driving Strategies on Traffic Capacity Philosophical

More information

Memo: August 27, 2015. To: new or prospective students entering our PhD or MS program who are interested in computer networking.

Memo: August 27, 2015. To: new or prospective students entering our PhD or MS program who are interested in computer networking. Memo: August 27, 2015 To: new or prospective students entering our PhD or MS program who are interested in computer networking. So you want to study networking.congratulations!! In this memo, I identify

More information

Application-level simulation for network security

Application-level simulation for network security Application-level simulation for network security Stephan Schmidt, Rainer Bye, Joël Chinnow Karsten Bsufka, Ahmet Camtepe and Sahin Albayrak nessi@dai-labor.de DAI-Labor, Berlin Institute of Technology,

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

An Extensible Simulation Framework for Critical Infrastructure Security

An Extensible Simulation Framework for Critical Infrastructure Security An Extensible Simulation Framework for Critical Infrastructure Security Technical Report: TUB-DAI 09/09-1 Joël Chinnow, Rainer Bye, Stephan Schmidt Karsten Bsufka, Seyit Ahmet Çamtepe, Şahin Albayrak E-Mail:

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject

More information

Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft

Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft Technical Report: TUB-DAI 08/08-02 Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Kamer Ali Yüksel, Osman

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

Ontology based Recruitment Process

Ontology based Recruitment Process Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Autonomy for SOHO Ground Operations

Autonomy for SOHO Ground Operations From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. Autonomy for SOHO Ground Operations Walt Truszkowski, NASA Goddard Space Flight Center (GSFC) Walt.Truszkowski@gsfc.nasa.gov

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Management and optimization of multiple supply chains

Management and optimization of multiple supply chains Management and optimization of multiple supply chains J. Dorn Technische Universität Wien, Institut für Informationssysteme Paniglgasse 16, A-1040 Wien, Austria Phone ++43-1-58801-18426, Fax ++43-1-58801-18494

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks

A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks Khalil Salah Advanced Informatics School Universiti Teknologi Malaysia Kuala Lumpur, 54100, Malaysia Ardavan Ashabi

More information

for High Performance Computing

for High Performance Computing Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Software Construction

Software Construction Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:

More information

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA)

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA) Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report STANDARDS FOR AGENTS AND AGENT

More information

Bio-inspired mechanisms for efficient and adaptive network security

Bio-inspired mechanisms for efficient and adaptive network security Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Securing VoIP Networks using graded Protection Levels

Securing VoIP Networks using graded Protection Levels Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn Andreas.Schmidt@bsi.bund.de Abstract

More information

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site

Resume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site vedatcoskun@isikun.edu.tr vedatcoskun@me.com www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische

More information

Seminar TK: Ubiquitous Computing

Seminar TK: Ubiquitous Computing Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2 Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität

More information

Intelligent Agents Serving Based On The Society Information

Intelligent Agents Serving Based On The Society Information Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical

More information

Attack Taxonomies and Ontologies

Attack Taxonomies and Ontologies Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik Technische Universität München Attack Taxonomies and Ontologies Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Service-Oriented Security Architecture for CII based on Sensor Networks

Service-Oriented Security Architecture for CII based on Sensor Networks Service-Oriented Security Architecture for CII based on Sensor Networks Javier Lopez, Jose Antonio Montenegro, Rodrigo Roman Computer Science Department, E.T.S. Ingenieria Informatica University of Malaga,

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

MULTIDIMENSIONAL META-MODELLING FOR AIR TRAFFIC MANAGEMENT SERVICE PROCESSES

MULTIDIMENSIONAL META-MODELLING FOR AIR TRAFFIC MANAGEMENT SERVICE PROCESSES Computer Modelling and New Technologies, 2010, Vol.14, No.2, 50 57 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia MULTIDIMENSIONAL META-MODELLING FOR AIR TRAFFIC MANAGEMENT

More information

Making Simulation Work for the Organizational Design of Communication Centers: Challenges and Practical Experience

Making Simulation Work for the Organizational Design of Communication Centers: Challenges and Practical Experience UNIVERSITY OF BAYREUTH Lehrstuhl für Betriebswirtschaftslehre VII Wirtschaftsinformatik Making Simulation Work for the Organizational Design of Communication Centers: Challenges and Practical Experience

More information

A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb

A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb Robert Manger, Goranka Nogo, Mladen Vuković Department of Mathematics, University of Zagreb Bijenička cesta 30, 10000

More information

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014 Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS

More information

FIoT: A Framework for Self-Adaptive and Self-Organizing Internet of Things Applications. Nathalia Moraes do Nascimento nnascimento@inf.puc-rio.

FIoT: A Framework for Self-Adaptive and Self-Organizing Internet of Things Applications. Nathalia Moraes do Nascimento nnascimento@inf.puc-rio. FIoT: A Framework for Self-Adaptive and Self-Organizing Internet of Things Applications Nathalia Moraes do Nascimento nnascimento@inf.puc-rio.br Roadmap Motivation FIoT Main Idea Application Scenario Decentralized

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,

More information

CGHub Client Security Guide Documentation

CGHub Client Security Guide Documentation CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................

More information

Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter

Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Syddansk Universitet Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Published in: Lecture Notes in Computer Science Publication

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK DR AYŞE KÜÇÜKYILMAZ Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK http://home.ku.edu.tr/~akucukyilmaz a.kucukyilmaz@imperial.ac.uk

More information

Static Analysis of Executables for Collaborative Malware Detection on Android

Static Analysis of Executables for Collaborative Malware Detection on Android Static of Executables for Collaborative Malware Detection on Android Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Ali Yüksel, Seyit Ahmet Camtepe, and Sahin

More information

Publications of Ugo Fiore

Publications of Ugo Fiore Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal

More information

Seamless, Intelligent Grid Services for e-science

Seamless, Intelligent Grid Services for e-science Silvan Kaiser, Collin Müller, Sahin Albayrak Seamless, Intelligent Grid Services for e-science DAI-001-2004 Zuerst erschienen: DAI-Labor, Berlin, March 2004 DAI-Labor, Technische Universität Berlin Fakultät

More information

Abdullah Mohammed Abdullah Khamis

Abdullah Mohammed Abdullah Khamis Abdullah Mohammed Abdullah Khamis Jeddah, Saudi Arabia Email: Abdullahkhamis@gmail.com Mobile: +966 567243182 Tel: +966 2 6340699 (Yemeni) Research and Professional Objective To Complete my Ph.D. in Pattern

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Meeting Scheduling with Multi Agent Systems: Design and Implementation

Meeting Scheduling with Multi Agent Systems: Design and Implementation Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and

More information

Using Artificial Intelligence in Intrusion Detection Systems

Using Artificial Intelligence in Intrusion Detection Systems Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology mimannin@niksula.hut.fi Abstract Artificial Intelligence could make the use of Intrusion Detection

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract)

Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Johann Eder 1, Heinz Frank 1, Tadeusz Morzy 2, Robert Wrembel 2, Maciej Zakrzewicz 2 1 Institut für Informatik

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

B.Sc. in Computer Engineering, School of Electrical and Computer Engineering,

B.Sc. in Computer Engineering, School of Electrical and Computer Engineering, Narges Khakpour Postdoctoral Researcher Theoretical Computer Science School of Computer Science and Communication Royal Institute of Technology (KTH) Stockholm E-mail: nargeskh@kth.se Leiden Institute

More information

Teaching Statement. Verzeichnis von Veranstaltungen und Aktivitäten in der Lehre. Dr. rer. nat. Matthias Klusch

Teaching Statement. Verzeichnis von Veranstaltungen und Aktivitäten in der Lehre. Dr. rer. nat. Matthias Klusch Teaching Statement Verzeichnis von Veranstaltungen und Aktivitäten in der Lehre Dr. rer. nat. Matthias Klusch Content 1 TEACHING INTERESTS...3 2 TEACHING EXPERIENCE...3 2.1 COURSES AND LECTURES...3 2.2

More information