【2016/01/07】The 3rd International Workshop on Cybersecurity

We are going to hold “The 3rd International Workshop on Cybersecurity” at Kyushu University (Ito Campus) on January 7th.

Please refer to the information below for details regarding this event.

Schedule

10:00-10:30 Opening
10:30-11:30 Cybersecurity Technology
11:45-12:30 Cybersecurity Education
12:30-13:30 Lunch
13:30-14:45 IoT(1)
15:00-16:30 IoT(2)
16:45-18:00 Encryption
18:00-18:30 Closing

Workshop Venue: Co-Evolutional Social Systems (CESS) Facility 2F Hall, Kyushu University
http://coi.kyushu-u.ac.jp/access/

Cybersecurity Center, Kyushu University

Research Institute for Information Technology, Kyushu University

University of Maryland Baltimore County (UMBC)

The University of New South Wales (UNSW)

Indian Institute of Technology Delhi (IITD)

Royal Holloway, University of London (RHUL)

Welcome Speech Koji OKAMURA
(Kyushu Univ.)
Keynote Speech

Chair: ●●

Approach to The Secure Global Live Migration Hidenobu Watanabe
(Kyushu Univ.)
Context-aware Security: Detecting Firmware Updates and attacks on Vehicular Nilanjan Banerjee
(UMBC)
Human Factors in Cyber Security – A Review for Education P. VIGNESWARA ILAVARASAN
(IITD)
(Mis)Information Spread in Social Media Systems Aupam Joshi
(UMBC)

Advanced Cybersecurity Education Course Program using Cyber Range Koji OKAMURA
(Kyushu Univ.)
Educational Cybersecurity Assessment Tools Alan Sherman
(UMBC)

Chair: ●●

How to fight against Botnet of Things Yaokai Feng
(Kyushu Univ.)
Embedded Systems Security: Virtualization and Beyond Kolin Paul
(IITD)
Programming in the Internet of Things Securely Sanjiva Prasad
(IITD)

Chair: ●●

Wireless IoT for shaping a smart-future Ranjan Bose
(IITD)
A Changing Landscape: Securing the Internet of Things (IoT) Sanjay Jha
(UNSW)
Three Attacks, Many Process Variations and One Expansive Countermeasure Sri Parameswaran
(UNSW)
Hardware Oriented Security for IoT Ryan Robucci
(UMBC)

Chair: ●●

Efficient Lattice Reduction Algorithm and Cryptography Masaya Yasuda
(Kyushu Univ.)
Security Analysis of Cryptography based on Ideal Lattice Shinya Okumura
(Kyushu Univ.)
Designs and Challenges in Authenticated Encryption Carlos Cid
(RHUL)


Closing

 

【2016/01/07】第3回サイバーセキュリティ国際ワークショップ

(さらに…)