Singapore University of Technology and Design (SUTD) is a young university established in collaboration with MIT. Cyber security is one of its most important areas and grows very fast with rich research funding. It has the world's best facilities in cyber-physical systems (CPS) including testbeds for Secure Water Treatment (SWaT), Water Distribution (WADI), Electric Power and Intelligent Control (EPIC), and IoT. (See more info at https://itrust.sutd.edu.sg/research/testbeds/)
I am looking for postdocs with expertise on cyber-physical system security, especially in the areas of autonomous vehicle and IoT. The candidates should have track record of strong R&D capability, be able to perform deep system-level investigations of security mechanisms, be a good team player, and also have good written/oral communication skills. The position will provide an excellent opportunity to perform both basic and translational research in close collaboration with industry. Successful candidates will be offered internationally competitive remuneration, and enjoy high-quality living and low tax rates in Singapore.
Interested candidates please send your CV with a research statement to Prof. Jianying Zhou.
Contact: Prof. Jianying Zhou
Email: jianying_zhou(a)sutd.edu.sg
Home: http://jianying.space/
Singapore University of Technology and Design (SUTD) is a young university established in collaboration with MIT. Cyber security is one of its most important areas and grows very fast with rich research funding. It has the world's best facilities in cyber-physical systems (CPS) including testbeds for Secure Water Treatment (SWaT), Water Distribution (WADI), Electric Power and Intelligent Control (EPIC), and IoT. (See more info at https://itrust.sutd.edu.sg/research/testbeds/)
I am looking for PhD interns with interest in cyber-physical system security (IoT, autonomous vehicle, and power grid etc.), especially on the topics such as 1) Lightweight and low-latency crypto algorithms for CPS devices, 2) Resilient authentication of devices and data in CPS, 3) Advanced SCADA firewall to filter more sophisticated attacking packets in CPS, 4) Big data based threat analytics for detection of both known and unknown threats, 5) Attack mitigation to increase the resilience of CPS. The attachment will be at least 3 months. Allowance will be provided for local expenses.
Interested candidates please send your CV with a research statement to Prof. Jianying Zhou.
Contact: Prof. Jianying Zhou
Email: jianying_zhou(a)sutd.edu.sg
Home: http://jianying.space/
1st International Workshop on A.I. in Security.
An IJCAI Workshop, Melbourne, Australia, 20th August 2017 .
Details and submissions: http://iwaise.it.nuigalway.ie/
Deadline for submissions: 15 May 2017.
Artificial intelligence has an important role to play in improving the resilience of society to both digital and physical threats, and in safeguarding the privacy of individuals, as the world becomes increasingly interconnected. Relevant AI techniques include: knowledge representation; probabilistic reasoning; machine learning; anomaly detection; image recognition; speech recognition; social network analysis; and many others. For example, anomaly detection and temporal data mining can enable the automated detection of physical and/or digital threats; while advances in AI for autonomous vehicles can allow robotic vehicles to be used to secure remote locations that are hazardous to humans, and for search and rescue. AI for physical security is also being successfully used in homeland security applications.
To date the physical and digital security communities have limited opportunities to share their research findings and to engage with the wider AI community. This workshop will to bring together academic researchers and industry practitioners in a single location, to present and discuss their new research. It will also provide an opportunity for attendees to highlight current challenges in AI for digital and physical security, propose multi-disciplinary solutions, and showcase the application of AI in this domain.
This workshop seeks novel research, case studies and survey papers in topics that include, but are not limited to, the following:
Security Analytics: Machine Learning; Security Threat Detection and Visualization; Future Threat Inference; Situational Awareness Monitoring; Automated Message Monitoring; Security Decision Support; Network Event Detection
Finance: Applications of AI to: Digital Currencies; Secure Payments; Detection of Tax Evasion or Money Laundering; etc
Forensics: Automated Physical Evidence Gathering; Data and Network Analysis; Digital Forensic Tools; Decision Support for Rare Events
Images, Text & Networks: Automated Crowd Scanning; Video Analytics; Damage Assessment; Automatic Detection of Hate Speech and Radicalisation on Social Media; Security Sentiment Analysis
Physical Security: Automated Monitoring of Secure Locations; Automated Threat Detection; Crisis Management; Sensor Data Analytics; Spatio-Temporal Reasoning; Reasoning from Distributed, Dissimilar and Noisy Data Stream
Digital Security: AI for Detection and Mitigation of Threats Such as: Spear Phishing; Social Engineering; Botnets; Intrusion, as well as AI methods for improving Penetration Testing
Software Engineering: AI Applied to: Design for Security; Program Analysis; Fault Detection; Compiler and Language Design; Verification of Privacy and Security Compliance; Adaptive Security/Privacy
Robotics: Securing Remote or Restricted Locations; Operations in Remote or Dangerous locations; Roboguards; Search and Rescue
Privacy and Identity Biometrics: Face Recognition; Innovative Cryptography; Anonymization and De-anonymization; Ethics of AI for Security
Organizing Committee:
• Michael Madden (National University of Ireland Galway, Ireland)
• Barry O’Sullivan (University College Cork, Ireland)
• Jo Ueyama (University of Sao Paulo, Brazil)
• Brett Drury (National University of Ireland Galway, Ireland)
--
Dr Michael Madden
Head of Data Mining & Machine Learning Group
National University of Ireland, Galway
+353-91-493797 / +353-86-7952802
http://datamining.it.nuigalway.ie/
*** Apologies for multiple copies ***
================================================================================
C a l l F o r P a p e r s
COMPUTER NETWORKS JOURNAL - Elsevier
Special Issue: Security and Privacy in Cloud-Assisted Cyber-Physical
Systems
================================================================================
Cloud-assisted Cyber-Physical Systems (CPS) feature a tight coupling
between embedded computing devices and their physical environment. CPSes
can be viewed as the bridge between physical components/processes and
the cyber space. Specifically, the notion of CPSes is to use computing
(e.g. sensing, analyzing and predicting), communication (e.g.
interaction, intervene and interface management), and controlling (e.g.
inter-operation, evolving and evidence-based certification) to make
intelligent and autonomous systems. Recent years have seen a dramatic
rise in the development of CPSes services, including ubiquitous health
care, smart electricity grid, and smart buildings. However, the
fast-growing data volume is hard to process. The present CPSes cannot
support ultra-fast computing, and thus it cannot provide real-time and
reliable services to meet the requirements, which are essential for
mission-critical systems. Fortunately, cloud infrastructures and
platforms can provide flexible and on-demand processing power and
high-capacity storage for data streams, as well as provisioning of a
variety of services using telecommunication and networking technologies.
Thus, the large-scale nature of CPSes can be effectively and efficiently
supported and assisted by cloud systems, which is referred to as
cloud-assisted CPSes (Cloud-CPS).
The coupling of cloud systems and CPSes, though advantageous, is subject
to new forms of risks that have not been considered adequately in the
traditional computing domain. CPSes often collect sensitive and private
information about the physical environment. A loss of security for a CPS
can therefore have significant negative impact including loss of
privacy, potential physical harm, discrimination, and abuse. Though
numerous security primitives have been developed in the cyber domain to
address the very same problems, their applicability to the Cloud-CPSes
domain is still questionable due to the reason that they are usually
complex to implement and oblivious to cyber-physical interactions.
The goal of this special issue is to unveil and address the security and
privacy aspects associated to the Cloud-CPeSs.
Suggested topics include, but are not limited to the following.
* Secure data sharing in Cloud-CPSes
* Big data security and privacy in Cloud-CPSes
* Secure computation in Cloud-CPSes
* Location privacy in Cloud-CPSes
* Lightweight block ciphers for low-resource devices in Cloud-CPSes
* Searchable encryption in Cloud-CPSes
* End to end secure communications in Cloud-CPSes
* Access control in Cloud-CPSes
* Key management in Cloud-CPSes
These topics remark the differences between the classical CPSes and
Cloud-CPSes, and particularly when designing security and privacy
solutions for specific Cloud-assisted CPSes applied in restricted
environments with rigorous performance requirements and criticality in
mind.
-----------------------------------------
Important Dates
-----------------------------------------
* Submission deadline: June 30, 2017
* Notification of acceptance: August 31, 2017
* Final manuscript due: October 15, 2017
-----------------------------------------
Paper Submission Guidelines
-----------------------------------------
All submitted papers to this special issue must be well written in
English, and must be original and not be under review in any other
journal or conference proceedings. When submitting their papers authors
must select “Security in Cloud CPS” as the article type.
Submitted papers should be presented according to the journal style. For
more detailed information regarding the requirements for submission,
please refer to:
https://www.elsevier.com/journals/computer-networks/1389-1286/guide-for-aut….
Requests for additional information should be addressed to the guest
editors.
-----------------------------------------
Guest Editors
-----------------------------------------
Cristina Alcaraz, University of Malaga, alcaraz(a)lcc.uma.es
Xinyi Huang, Fujian Normal University, xyhuang81(a)gmail.com
Eric Rome, Fraunhofer, erich.rome(a)iais.fraunhofer.de