{"id":662,"date":"2016-02-29T16:43:37","date_gmt":"2016-02-29T07:43:37","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/?post_type=event&#038;p=662"},"modified":"2020-12-23T08:38:45","modified_gmt":"2020-12-22T23:38:45","slug":"workshop_on_cybersecurity_rhul_and_ku","status":"publish","type":"event","link":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/event\/workshop_on_cybersecurity_rhul_and_ku\/","title":{"rendered":"\u30102016\/02\/29\u3011Workshop on Cyber Security"},"content":{"rendered":"<p><span style=\"font-size: 1.75rem;\">Workshop on Cyber Security &#8211; Royal Holloway, University of London and Kyushu University<\/span><\/p>\n<p>We held &#8220;Workshop on Cyber Security &#8211; Royal Holloway, University of London and Kyushu University&#8221; at Kyushu University Ito Campus on February 29th.<\/p>\n<p>Please refer to the following for details regarding this event.<\/p>\n<h4>Schedule<\/h4>\n<table class=\"table\">\n<tbody>\n<tr>\n<td>10:00-12:00<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#first-session\">First Session<\/a><\/td>\n<\/tr>\n<tr>\n<td>12:30-13:30<\/td>\n<td>Lunch<\/td>\n<\/tr>\n<tr>\n<td>13:00-15:30<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#second-session\">Second Session<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Workshop Venue: Co-Evolutional Social Systems (CESS) Facility 3F seminar room, Kyushu University<\/strong>\u00a0\u00a0\u00a0\u00a0<a href=\"http:\/\/coi.kyushu-u.ac.jp\/access\/\">http:\/\/coi.kyushu-u.ac.jp\/access\/<\/a><\/p>\n<div class=\"page-header\">\n<h4>Sponsors<\/h4>\n<\/div>\n<p><strong><a href=\"http:\/\/staff.cs.kyushu-u.ac.jp\/en\/index.html\">Cybersecurity Center, Kyushu University<\/a><\/strong><\/p>\n<p><strong><a href=\"http:\/\/ri2t.kyushu-u.ac.jp\/index-page\">Research Institute for Information Technology, Kyushu University<\/a><\/strong><\/p>\n<p><strong><a href=\"http:\/\/imaq.kyushu-u.ac.jp\/en\/index.php\">Academic Research and Industrial Collaboration Management office of Kyushu University<\/a><\/strong><\/p>\n<div class=\"page-header\">\n<h4>Participating Universities<\/h4>\n<\/div>\n<p><strong><a href=\"https:\/\/www.royalholloway.ac.uk\/home.aspx\">Royal Holloway, University of London (RHUL)<\/a><\/strong><\/p>\n<p><!-- \u30d7\u30ed\u30b0\u30e9\u30e0\u3000\u7b2c1\u30bb\u30c3\u30b7\u30e7\u30f3 ================================================== --><\/p>\n<div class=\"page-header\">\n<h3>Program<\/h3>\n<p>First Session<strong> \u00a0 <\/strong><strong>Moderator: Naoki Oketani (Yahoo Japan Corporation)<\/strong><\/p>\n<\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td>Welcome Speech<\/td>\n<td><strong>Koji OKAMURA<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td>Keynote Speech\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/03\/160329_Koji_Okamura_10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Introduction of Cybersecurity Center of Kyushu University<\/a><\/td>\n<td><strong>Koji OKAMURA<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Sean_Murphy-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Symmetric Cryptanalytic Techniques<\/a><\/td>\n<td><strong>Sean Murphy<\/strong><br \/>\n(RHUL)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Tsuyoshi_Takagi-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Developments of Post-Quantum Cryptography<\/a><\/td>\n<td><strong>Tsuyoshi Takagi<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Rachel_Player-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On the Hardness of LWE with Binary Error<\/a><\/td>\n<td><strong>Rachel Player<\/strong><br \/>\n(RHUL)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Lunch<\/p>\n<p><!-- \u30d7\u30ed\u30b0\u30e9\u30e0\u3000\u7b2c2\u30bb\u30c3\u30b7\u30e7\u30f3 ================================================== --><\/p>\n<div class=\"page-header\">\n<p>Second Session<b> \u00a0 <\/b><strong>Moderator: Naoki Oketani (Yahoo Japan Corporation)<\/strong><\/p>\n<\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td>Cyber Insurance as an Actuary Economics\u3000\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Koichi_Sakurai_01-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">material 1<\/a>\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Koichi_Sakurai_02-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">material 2<\/a><\/td>\n<td><strong>Koichi Sakurai<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td>CopperDroid: Analysis and Classification of Android Malware\u3000\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Lorenzo_Cavallaro-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">material<\/a><\/td>\n<td><strong>Lorenzo Cavallaro<\/strong><br \/>\n(RHUL)<\/td>\n<\/tr>\n<tr>\n<td>Early DDos on detection close to SMTP server attack target\u3000\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Mohd_Zafran-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">material<\/a><\/td>\n<td><strong>Mohd Zafran Abdul Aziz<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td>Game Theoretic Modelling of Cyber Security Information Sharing Schemes\u3000\u3000<a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/02\/160229_Carlos_Cid-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">material<\/a><\/td>\n<td><strong>Carlos Cid<\/strong><br \/>\n(RHUL)<\/td>\n<\/tr>\n<tr>\n<td>Closing<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We held &#8220;Workshop on Cyber Security &#8211; Royal Holloway, University of London and Kyushu University&#8221; at Kyushu University Ito Campus on February 29th.<\/p>\n","protected":false},"author":5,"featured_media":397,"comment_status":"closed","ping_status":"closed","template":"","event_period":[],"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/662"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/types\/event"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/comments?post=662"}],"version-history":[{"count":2,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/662\/revisions"}],"predecessor-version":[{"id":681,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/662\/revisions\/681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/media\/397"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/media?parent=662"}],"wp:term":[{"taxonomy":"event_period","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event_period?post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}