Differences

This shows you the differences between two versions of the page.

Link to this comparison view

lecture:2015 [2018/04/24 10:11]
ieee_hiroshima created
lecture:2015 [2018/05/06 16:41] (current)
ieee_hiroshima
Line 3: Line 3:
 ===== Scalable Graphical Security Models and Their Applications ===== ===== Scalable Graphical Security Models and Their Applications =====
  
-Date: 14 Dec. 2015\\+Date: Dec. 14th, 2015\\
 Time: 13:​00-14:​00\\ Time: 13:​00-14:​00\\
-Location: Hiroshima City University\\ +Location: Hiroshima City University 
-Sponsered: Hiroshima City University\\ + 
-SupportedIEEE Hiroshima Section\\+TitleScalable Graphical Security Models and Their Applications\\
 Speaker: Dr. Dong-Seong Kim (University of Canterbury, New Zealand) Speaker: Dr. Dong-Seong Kim (University of Canterbury, New Zealand)
  
 Abstract: To quantify and evaluate the network security, graphical security models can be used. Purely graph based (e.g., Attack Graphs) security models have a state-space explosion problem. Tree-based models (e.g., Attack Trees) cannot capture the path information explicitly. In this talk, we introduce hierarchical attack representation models (HARM) to deal with the above mentioned issues. The main idea is to separate the network topology information (in the upper level) from the vulnerability information of each host (in the lower level). We show how the HARM can be used to evaluate the cyber security of networked systems using security metrics. We also present how HARM with other method to evaluate the effectiveness of Moving Target Defenses. Finally, research revenues in graphical security modeling and assessment will be discussed. Abstract: To quantify and evaluate the network security, graphical security models can be used. Purely graph based (e.g., Attack Graphs) security models have a state-space explosion problem. Tree-based models (e.g., Attack Trees) cannot capture the path information explicitly. In this talk, we introduce hierarchical attack representation models (HARM) to deal with the above mentioned issues. The main idea is to separate the network topology information (in the upper level) from the vulnerability information of each host (in the lower level). We show how the HARM can be used to evaluate the cyber security of networked systems using security metrics. We also present how HARM with other method to evaluate the effectiveness of Moving Target Defenses. Finally, research revenues in graphical security modeling and assessment will be discussed.
  
-===== Application for Human-friendly Human Interface Design and Non-invasive Brain Function Measurement Technology ​=====+===== Technical Lecture ​=====
  
-Date: 28 Aug. 2015\\+Date: Nov. 21st, 2015\\ 
 +Location: Okayama University 
 + 
 +Title: Cross-Cultural Communication\\ 
 +Speaker: Mr. Matsuchiyo Ota (Benesse InfoShell Co., Ltd.) 
 + 
 +===== Technical Lecture ===== 
 + 
 +Date: Aug. 28th, 2015\\
 Time: 15:​00-17:​00\\ Time: 15:​00-17:​00\\
-Location: ​Faculty of Engineering, ​Yamaguchi University ​(D-34)\\ +Location: Yamaguchi University 
-SponseredIEEE Hiroshima Section\\+ 
 +TitleNoninvasive Measurement Technique of Brain Activity and Its Application to Human-Machine Interfaces Design\\
 Speaker: Prof. Keiichi Watanuki (Saitama University) Speaker: Prof. Keiichi Watanuki (Saitama University)
  
-===== Conference Operation ​for Easily, Rapidly and cheaply -Operation Assist using by All Conf- =====+===== Technical Lecture ​for Students ​=====
  
-Date: 30 May. 2015\\+Date: May. 30th, 2015\\
 Time: 13:​00-13:​50\\ Time: 13:​00-13:​50\\
-Location: ​Faculty of Engineering, ​Okayama University\\ +Location: Okayama University
-Sponsered: IEEE Hiroshima Section\\ +
-Speaker: Dr. Satoshi Taoka (Hiroshima University)+
  
-===== Topic for Grobalization of University =====+Title: Easily, Rapidly and Inexpensively to Manage Academic Conferences\\ 
 +Speaker: Prof. Satoshi Taoka (Hiroshima Univ.)
  
-Date: 17 Apr. 2015\\+===== Technical Lecture ===== 
 + 
 +Date: Apr. 17th, 2015\\
 Time: 16:15 - 16:45\\ Time: 16:15 - 16:45\\
-Location: ​Faculty of Engineering, ​Okayama University\\ +Location: Okayama University 
-SponseredIEEE Hiroshima Section|\\+ 
 +TitleWhat is Academic Globalization in YU?\\
 Speaker: Prof. Masashi Hotta (Yamaguchi University) Speaker: Prof. Masashi Hotta (Yamaguchi University)
 +
 +===== Sponsored Technical Lecture =====
 +
 +Date: Aug. 18th, 2015\\
 +Location: Hiroshima University
 +
 +Title: New Trend in Power System Frequency Control\\
 +Speaker: Prof. Hassan Bevrani (University of Kurdistan, Iran)
 +
 +===== Co-sponsored Technical Lecture =====
 +
 +Date: Aug. 18th, 2015\\
 +Location: Hiroshima University
 +
 +Title: Renewable Energy Effects on Egyptian Distribution Network\\
 +Speaker: Prof. Abdalla Ibrahim (Aswan University, Egypt)
 +
 +===== Sponsored Technical Lecture =====
 +
 +Date: Mar. 20th, 2015\\
 +Location: Hiroshima City University
 +
 +Title: Custom Computing: New Paradigm for Highly-Efficient High-Performance Computation\\
 +Speaker: Prof. Kentaro Sano (Tohoku University)
 +
 +===== Special Lecture =====
 +
 +Date: Jan. 27th, 2015\\
 +Location: Hiroshima Garden Palace
 +
 +Title: Integrated Circuits: The Past and the future\\
 +Speaker: Emeritus Prof. Hideo Sunami (Hiroshima University)\\
  
  
  • lecture/2015.txt
  • Last modified: 2018/05/06 16:41
  • by ieee_hiroshima