Sitemap       English   Japanese

 

We are going to hold "The 3rd International Workshop on Cybersecurity" at Kyushu University (Ito Campus) on January 7th.
Please refer to the information below for details regarding this event.

workshop

Schedule

10:00-10:30 Opening
10:30-11:30 Cybersecurity Technology
11:45-12:30 Cybersecurity Education
12:30-13:30 Lunch
13:30-14:45 IoT(1)
15:00-16:30 IoT(2)
16:45-18:00 Encryption
18:00-18:30 Closing

Workshop Venue: Co-Evolutional Social Systems (CESS) Facility 2F Hall, Kyushu University     http://coi.kyushu-u.ac.jp/access/

Cybersecurity Center, Kyushu University

Research Institute for Information Technology, Kyushu University

University of Maryland Baltimore County (UMBC)

The University of New South Wales (UNSW)

Indian Institute of Technology Delhi (IITD)

Royal Holloway, University of London (RHUL)

Welcome SpeechKoji OKAMURA
(Kyushu Univ.)
Keynote Speech
 
Approach to The Secure Global Live MigrationHidenobu Watanabe
(Kyushu Univ.)
Context-aware Security: Detecting Firmware Updates and attacks on VehicularNilanjan Banerjee
(UMBC)
Human Factors in Cyber Security - A Review for EducationP. VIGNESWARA ILAVARASAN
(IITD)
(Mis)Information Spread in Social Media SystemsAupam Joshi
(UMBC)
 
Advanced Cybersecurity Education Course Program using Cyber RangeKoji OKAMURA
(Kyushu Univ.)
Educational Cybersecurity Assessment ToolsAlan Sherman
(UMBC)
 
How to fight against Botnet of ThingsYaokai Feng
(Kyushu Univ.)
Embedded Systems Security: Virtualization and BeyondKolin Paul
(IITD)
Programming in the Internet of Things SecurelySanjiva Prasad
(IITD)
 
Wireless IoT for shaping a smart-futureRanjan Bose
(IITD)
A Changing Landscape: Securing the Internet of Things (IoT)Sanjay Jha
(UNSW)
Three Attacks, Many Process Variations and One Expansive CountermeasureSri Parameswaran
(UNSW)
Hardware Oriented Security for IoTRyan Robucci
(UMBC)
 
Efficient Lattice Reduction Algorithm and CryptographyMasaya Yasuda
(Kyushu Univ.)
Security Analysis of Cryptography based on Ideal LatticeShinya Okumura
(Kyushu Univ.)
Designs and Challenges in Authenticated EncryptionCarlos Cid
(RHUL)