Difference between revisions of "Events"

From Asset
Jump to: navigation, search
Line 28: Line 28:
 
= Special Issue on Adaptive Security for IoT =
 
= Special Issue on Adaptive Security for IoT =
 
*[http://asset.nr.no/asset/index.php/Special_Issue_on_Adaptive_Security_for_IoT Call For Papers: Special Issue on Adaptive Security for IoT]of [http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc International Journal of Pervasive computing and Communications (IJPCC)]
 
*[http://asset.nr.no/asset/index.php/Special_Issue_on_Adaptive_Security_for_IoT Call For Papers: Special Issue on Adaptive Security for IoT]of [http://www.emeraldinsight.com/products/journals/journals.htm?id=ijpcc International Journal of Pervasive computing and Communications (IJPCC)]
 
= 4 Master's Theses Available in the ASSET Project<br/> =
 
 
== ASSET Project<br/> ==
 
 
The ASSET project is a cooperation project between NR, Gjøvik University College (GUC), Oslo University Hospital (OUH) and international partners, and is financed by The Research Council of Norway in the VERDIKT program. The project is in the process of building and optimizing light-weight abilities in Smart Things that will allow them to detect in real-time unknown security and privacy threats, and respond and adapt to them. In this connection the following concrete topics for three master's theses are available. The candidates are required to register in the Norwegian Universities' master's program.
 
 
== Topics for four master's theses<br/> ==
 
 
'''1. Design, deploy, and use an accurate energy-monitoring system''' for body-sensor networks. The goal is to have a dashboard depicting information about the residual energy of the sensor nodes and their expected lifetime. Electronic instrumentation skills are required for this task.
 
 
'''2. Hardware implementation of lightweight encryption/signature''' algorithms on sensor boards. This allows consistent delay reduction and energy saving since the encryption routines will be executed in assembly. FPGA (Field-programmable gate array) and VHDL (VHSIC Hardware Description Language) skills are required for this task.
 
 
'''3. Software implementation of game theoretic models''' for the estimation and prediction of unknown threats and analysis of their impacts. This allows accurate security risk impact assessment in order to estimate and predict risk damages and future benefits. Security decisions should therefore be adapted according to those estimates and predictions. Mathematics and programming in Matlab and C++ (preferably on Linux OS) skills are required for this task.
 
 
'''4. Analysis and Validation of Critical Parameters for Adaptive Security in eHealth'''. The project is in final stage establishing and validating critical working parameters for adaptive security for a concrete IoT-based patient monitoring system in both home and hospital scenarios. In this connection this concrete topic for a master's thesis is available. The candidate is required to register in the master's program of one of the Norwegian Universities. The goal is to study and answer the following three questions applying the DELPHI study method:
 
 
*(i) What is the acceptable "minimal deviations from normal operation" in security adaptation at various levels of adaptation?
 
*(ii) How do we "enable adaptation across multiple time scales" and what are the acceptable time scales?
 
*(iii) Where and how much risk do we accept to take, and are risk damages possible to control?
 
 
Skills required for this task are DELPHI study ([http://is.njit.edu/pubs/delphibook/ http://is.njit.edu/pubs/delphibook/]), content analysis, categories and coding rules, and good English written communication.
 
 
 
 
We provide possibilities of publishing results in international conferences/journals
 
 
== Contact ==
 
 
Habtamu Abie, Principal Investigator and Project Manager
 
 
Tel:(+47) 22852595
 
 
Email: Habtamu.Abie@nr.no
 
 
  
  

Revision as of 08:10, 2 May 2019

FINSEC 2019 : 1st International Workshop on Security for Financial Critical Infrastructures and Services

FINSEC 2019 : 1st International Workshop on Security for Financial Critical Infrastructures and Services co-located with ESORICS 2019 : The 24th European Symposium on Research in Computer Security, Sep 23, 2019 - Sep 27, 2019, Luxembourg

Designing and Measuring CyberSecurity in Software Architectures (DeMeSSA)

Designing and Measuring CyberSecurity in Software Architectures (DeMeSSA) at 13th European Conference on Software Architecture (ECSA), 9-13 September 2019 in Paris, France at FIAP Jean Monnet.

The 2nd International Conference on Science of Cyber Security - SciSec 2019

The 2nd International Conference on Science of Cyber Security - SciSec 2019 August, 09-11, 2019 | Nanjing, China

Special Session on Cybersecurity in Healthcare

Special Session on Cybersecurity in Healthcare at IEEE 13th International Symposium on Medical Information and Communication Technology (ISMICT 2019), which will be held in Oslo, Norway on 8-10 May 2019

5th International Workshop on Measurability of Security in Software Architectures (MeSSa 2018)

5th International Workshop on Measurability of Security in Software Architectures held in conjunction with The 12th European Conference on Software Architecture (ECSA 2018), 24–28 September, 2018, Madrid, Spain

The 1st International Conference on Science of Cyber Security

The 1st International Conference on Science of Cyber Security - SciSec 2018, August, 12-14, 2018 | Beijing, China

4th International Workshop on Measurability of Security in Software Architectures

4th International Workshop on Measurability of Security in Software Architectures held in conjunction with The 11th European Conference on Software Architecture (ECSA 2017), 11–15 September 2017 at the University of Kent at Canterbury, United Kingdom

3rd International Workshop on Measurability of Security in Software Architectures

3rd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 10th European Conference on Software Architecture (ECSA 2016), September 5-9, 2016, Istanbul, Turkey

2nd International Workshop on Measurability of Security in Software Architectures

2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria

Special Issue on Adaptive Security for IoT


International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013)

International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013) held in conjunction with UbiComp 2013, September 8-12, 2013, in Zurich, Switzerland

Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013

Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013 co-located with the BodyNets 2013 Conference sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET
Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.

Call For Papers SeTTIT 2013 in PDF

Local Sponsors

ResearchCouncilofNorway.gif

Asset logo.png