{"id":666,"date":"2016-01-07T16:51:02","date_gmt":"2016-01-07T07:51:02","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/?post_type=event&#038;p=666"},"modified":"2020-12-23T08:39:41","modified_gmt":"2020-12-22T23:39:41","slug":"international_workshop_on_cybersecurity_3","status":"publish","type":"event","link":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/event\/international_workshop_on_cybersecurity_3\/","title":{"rendered":"\u30102016\/01\/07\u3011The 3rd International Workshop on Cybersecurity"},"content":{"rendered":"<div class=\"page-header\">\n<h3>\u00a0The 3rd International Workshop on Cybersecurity<\/h3>\n<\/div>\n<p>We are going to hold &#8220;The 3rd International Workshop on Cybersecurity&#8221; at Kyushu University (Ito Campus) on January 7th.<\/p>\n<p>Please refer to the information below for details regarding this event.<\/p>\n<div align=\"center\"><\/div>\n<p><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/event6-1.jpg\"><img loading=\"lazy\" class=\"aligncenter wp-image-145 size-large\" src=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2017\/09\/event6-1-1024x366.jpg\" alt=\"\" width=\"1024\" height=\"366\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2017\/09\/event6-1-1024x366.jpg 1024w, https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2017\/09\/event6-1-300x107.jpg 300w, https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2017\/09\/event6-1-768x274.jpg 768w, https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2017\/09\/event6-1.jpg 1496w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<div align=\"center\"><\/div>\n<h4>Schedule<\/h4>\n<table class=\"table\">\n<tbody>\n<tr>\n<td>10:00-10:30<\/td>\n<td>Opening<\/td>\n<\/tr>\n<tr>\n<td>10:30-11:30<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#Cybersecurity-Technology\">Cybersecurity Technology<\/a><\/td>\n<\/tr>\n<tr>\n<td>11:45-12:30<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#Cybersecurity-Education\">Cybersecurity Education<\/a><\/td>\n<\/tr>\n<tr>\n<td>12:30-13:30<\/td>\n<td>Lunch<\/td>\n<\/tr>\n<tr>\n<td>13:30-14:45<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#IoT-1\">IoT(1)<\/a><\/td>\n<\/tr>\n<tr>\n<td>15:00-16:30<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"#IoT-2\">IoT(2)<\/a><\/td>\n<\/tr>\n<tr>\n<td>16:45-18:00<\/td>\n<td><a class=\"table-item\" style=\"text-decoration: none;\" href=\"Encryption\">Encryption<\/a><\/td>\n<\/tr>\n<tr>\n<td>18:00-18:30<\/td>\n<td>Closing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Workshop Venue: Co-Evolutional Social Systems (CESS) Facility 2F Hall, Kyushu University<\/strong><br \/>\n<a href=\"http:\/\/coi.kyushu-u.ac.jp\/access\/\">http:\/\/coi.kyushu-u.ac.jp\/access\/<\/a><\/p>\n<div class=\"page-header\">\n<h4>Sponsors<\/h4>\n<\/div>\n<p><strong><a href=\"http:\/\/staff.cs.kyushu-u.ac.jp\/en\/index.html\">Cybersecurity Center, Kyushu University<\/a><\/strong><\/p>\n<p><strong><a href=\"http:\/\/ri2t.kyushu-u.ac.jp\/index-page\">Research Institute for Information Technology, Kyushu University<\/a><\/strong><\/p>\n<div class=\"page-header\">\n<h4>Participating Universities<\/h4>\n<\/div>\n<p><strong><a href=\"http:\/\/www.umbc.edu\/\">University of Maryland Baltimore County (UMBC)<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.unsw.edu.au\/\">The University of New South Wales (UNSW)<\/a><\/strong><\/p>\n<p><strong><a href=\"http:\/\/www.iitd.ac.in\/\">Indian Institute of Technology Delhi (IITD)<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.royalholloway.ac.uk\/home.aspx\">Royal Holloway, University of London (RHUL)<\/a><\/strong><\/p>\n<p><!-- \u30d7\u30ed\u30b0\u30e9\u30e0\u3000opening ================================================== --><\/p>\n<div class=\"page-header\">\n<h3>Program\u00a0\u00a0\u00a0<span class=\"label label-warning\">Update !<\/span><\/h3>\n<\/div>\n<div class=\"page-header\">\n<h4>Opening<\/h4>\n<\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td>Welcome Speech<\/td>\n<td><strong>Koji OKAMURA<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td>Keynote Speech<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000session1 ================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"Cybersecurity-Technology\"><\/a>Cybersecurity Technology<\/h4>\n<\/div>\n<p><!-- div class=\"text-right\"&gt;--><\/p>\n<p><strong>Chair: \u25cf\u25cf<\/strong><\/p>\n<div id=\"carousel_03\" class=\"carousel slide\" style=\"width: 640px; margin-left: 20px;\" data-ride=\"carousel\" data-interval=\"2000\">\n<p>&nbsp;<\/p>\n<\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Hidenobu_Watanabe-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Approach to The Secure Global Live Migration<\/a><\/td>\n<td><strong>Hidenobu Watanabe<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Nilanjan_Banerjee-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Context-aware Security: Detecting Firmware Updates and attacks on Vehicular<\/a><\/td>\n<td><strong>Nilanjan Banerjee<\/strong><br \/>\n(UMBC)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_VIGNESWARA_ILAVARASAN-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Human Factors in Cyber Security &#8211; A Review for Education<\/a><\/td>\n<td><strong>P. VIGNESWARA ILAVARASAN<\/strong><br \/>\n(IITD)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Anupam_Joshi-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">(Mis)Information Spread in Social Media Systems<\/a><\/td>\n<td><strong>Aupam Joshi<\/strong><br \/>\n(UMBC)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000session2 ================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"Cybersecurity-Education\"><\/a>Cybersecurity Education<\/h4>\n<\/div>\n<div style=\"line-height: 10pt;\"><\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Koji_Okamura-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Cybersecurity Education Course Program using Cyber Range<\/a><\/td>\n<td><strong>Koji OKAMURA<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Alan_Sherman-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Educational Cybersecurity Assessment Tools<\/a><\/td>\n<td><strong>Alan Sherman<\/strong><br \/>\n(UMBC)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000lunch break\u3000================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"Lunch\"><\/a>Lunch Break<\/h4>\n<\/div>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000session3\u3000================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"IoT-1\"><\/a>IoT (1)<\/h4>\n<\/div>\n<p><!-- div class=\"text-right\"&gt;--><\/p>\n<p><strong>Chair: \u25cf\u25cf<\/strong><\/p>\n<div style=\"line-height: 10pt;\"><\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Yaokai_Feng-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">How to fight against Botnet of Things<\/a><\/td>\n<td><strong>Yaokai Feng<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Kolin_Paul-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Embedded Systems Security: Virtualization and Beyond<\/a><\/td>\n<td><strong>Kolin Paul<\/strong><br \/>\n(IITD)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Sanjiva_Prasad-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Programming in the Internet of Things Securely<\/a><\/td>\n<td><strong>Sanjiva Prasad<\/strong><br \/>\n(IITD)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000session4\u3000================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"IoT-2\"><\/a>IoT (2)<\/h4>\n<\/div>\n<p><!-- div class=\"text-right\"&gt;--><\/p>\n<p><strong>Chair: \u25cf\u25cf<\/strong><\/p>\n<div style=\"line-height: 10pt;\"><\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Ranjan_Bose-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Wireless IoT for shaping a smart-future<\/a><\/td>\n<td><strong>Ranjan Bose<\/strong><br \/>\n(IITD)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Sanjay_Jha-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Changing Landscape: Securing the Internet of Things (IoT)<\/a><\/td>\n<td><strong>Sanjay Jha<\/strong><br \/>\n(UNSW)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Sri_Parameswaran-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Three Attacks, Many Process Variations and One Expansive Countermeasure<\/a><\/td>\n<td><strong>Sri Parameswaran<\/strong><br \/>\n(UNSW)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Ryan_Robucci-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Hardware Oriented Security for IoT<\/a><\/td>\n<td><strong>Ryan Robucci<\/strong><br \/>\n(UMBC)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30a4\u30d9\u30f3\u30c8\u60c5\u5831\u3000session5\u3000================================================== --><\/p>\n<div class=\"page-header\">\n<h4><a style=\"text-decoration: none; color: #333;\" name=\"Encryption\"><\/a>Encryption<\/h4>\n<\/div>\n<p><!-- div class=\"text-right\"&gt;--><\/p>\n<p><strong>Chair: \u25cf\u25cf<\/strong><\/p>\n<div style=\"line-height: 10pt;\"><\/div>\n<p><!-- \u30c6\u30fc\u30d6\u30eb --><\/p>\n<table class=\"table table-hover\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Masaya_Yasuda-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Efficient Lattice Reduction Algorithm and Cryptography<\/a><\/td>\n<td><strong>Masaya Yasuda<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Shinya_Okumura-1.pdf\">Security Analysis of Cryptography based on Ideal Lattice<\/a><\/td>\n<td><strong>Shinya Okumura<\/strong><br \/>\n(Kyushu Univ.)<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-content\/uploads\/sites\/2\/2016\/01\/160107_Carlos_Cid.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Designs and Challenges in Authenticated Encryption<\/a><\/td>\n<td><strong>Carlos Cid<\/strong><br \/>\n(RHUL)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- \u30d7\u30ed\u30b0\u30e9\u30e0\u3000closing ================================================== --><br \/>\n<!-- div class=\"page-header\"&gt;--><\/p>\n<h4>Closing<\/h4>\n<div class=\"text-right\"><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are going to hold &#8220;The 3rd International Workshop on Cybersecurity&#8221; at Kyushu University (Ito Campus) on January 7th.<\/p>\n","protected":false},"author":5,"featured_media":145,"comment_status":"closed","ping_status":"closed","template":"","event_period":[],"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/666"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/types\/event"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/comments?post=666"}],"version-history":[{"count":2,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/666\/revisions"}],"predecessor-version":[{"id":683,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event\/666\/revisions\/683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/media\/145"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/media?parent=666"}],"wp:term":[{"taxonomy":"event_period","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/icsg\/wp-json\/wp\/v2\/event_period?post=666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}