Events

From Asset
Revision as of 10:25, 27 June 2018 by Abie (talk | contribs)

Jump to: navigation, search

5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

5th International Workshop on Measurability of Security in Software Architectures held in conjunction with The 12th European Conference on Software Architecture (ECSA 2018), 24–28 September, 2018, Madrid, Spain

The 1st International Conference on Science of Cyber Security

The 1st International Conference on Science of Cyber Security - SciSec 2018, August, 12-14, 2018 | Beijing, China

4th International Workshop on Measurability of Security in Software Architectures

4th International Workshop on Measurability of Security in Software Architectures held in conjunction with The 11th European Conference on Software Architecture (ECSA 2017), 11–15 September 2017 at the University of Kent at Canterbury, United Kingdom

3rd International Workshop on Measurability of Security in Software Architectures

3rd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 10th European Conference on Software Architecture (ECSA 2016), September 5-9, 2016, Istanbul, Turkey

2nd International Workshop on Measurability of Security in Software Architectures

2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria

Special Issue on Adaptive Security for IoT

4 Master's Theses Available in the ASSET Project

ASSET Project

The ASSET project is a cooperation project between NR, Gjøvik University College (GUC), Oslo University Hospital (OUH) and international partners, and is financed by The Research Council of Norway in the VERDIKT program. The project is in the process of building and optimizing light-weight abilities in Smart Things that will allow them to detect in real-time unknown security and privacy threats, and respond and adapt to them. In this connection the following concrete topics for three master's theses are available. The candidates are required to register in the Norwegian Universities' master's program.

Topics for four master's theses

1. Design, deploy, and use an accurate energy-monitoring system for body-sensor networks. The goal is to have a dashboard depicting information about the residual energy of the sensor nodes and their expected lifetime. Electronic instrumentation skills are required for this task.

2. Hardware implementation of lightweight encryption/signature algorithms on sensor boards. This allows consistent delay reduction and energy saving since the encryption routines will be executed in assembly. FPGA (Field-programmable gate array) and VHDL (VHSIC Hardware Description Language) skills are required for this task.

3. Software implementation of game theoretic models for the estimation and prediction of unknown threats and analysis of their impacts. This allows accurate security risk impact assessment in order to estimate and predict risk damages and future benefits. Security decisions should therefore be adapted according to those estimates and predictions. Mathematics and programming in Matlab and C++ (preferably on Linux OS) skills are required for this task.

4. Analysis and Validation of Critical Parameters for Adaptive Security in eHealth. The project is in final stage establishing and validating critical working parameters for adaptive security for a concrete IoT-based patient monitoring system in both home and hospital scenarios. In this connection this concrete topic for a master's thesis is available. The candidate is required to register in the master's program of one of the Norwegian Universities. The goal is to study and answer the following three questions applying the DELPHI study method:

  • (i) What is the acceptable "minimal deviations from normal operation" in security adaptation at various levels of adaptation?
  • (ii) How do we "enable adaptation across multiple time scales" and what are the acceptable time scales?
  • (iii) Where and how much risk do we accept to take, and are risk damages possible to control?

Skills required for this task are DELPHI study (http://is.njit.edu/pubs/delphibook/), content analysis, categories and coding rules, and good English written communication.


We provide possibilities of publishing results in international conferences/journals

Contact

Habtamu Abie, Principal Investigator and Project Manager

Tel:(+47) 22852595

Email: Habtamu.Abie@nr.no


International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013)

International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013) held in conjunction with UbiComp 2013, September 8-12, 2013, in Zurich, Switzerland

Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013

Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013 co-located with the BodyNets 2013 Conference sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET
Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.

Call For Papers SeTTIT 2013 in PDF

Local Sponsors

ResearchCouncilofNorway.gif

Asset logo.png