Please review all events below for early registration as events are arranged by closest upcoming date!
Application of Game Theory to High Assurance Cloud Computing
Date/Time: 1:30PM, Thursday, September 15, 2016, pre-meeting pizza starting at 1:15 PM
Location: Muscarelle Center, M105, Fairleigh Dickinson University, 1000 River Road, Teaneck, NJ 07666
Contact: For more information contact: Hong Zhao (201)-692-2350, email@example.com; or Alfredo Tan, firstname.lastname@example.org; or Howard Leach, email@example.com
About the Speaker
Charles A. Kamhoua received the BS in electronic from the University of Douala (ENSET), Cameroon, in 1999, and the MS in telecommunication and networking and the PhD in electrical engineering from Florida International University (FIU), in 2008 and 2011, respectively. In 2011, he joined the Cyber Assurance Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, as a National Academies Postdoctoral Fellow and became a Research Electronics Engineer in 2012. Prior to joining AFRL, he was an educator for more than 10 years. His current research interests include the application of game theory to cyber security, survivability, cloud computing, hardware Trojan, online social network, wireless communication and cyber threat information sharing. He has more than 60 technical publications in prestigious journals and International conferences along with a Best Paper Award at the 2013 IEEE FOSINTSI. He has mentored more than 40 young scholars at AFRL counting Summer Faculty Fellow, postdoc, and students. He has been invited to more than 30 keynote and distinguished speeches in the USA and abroad. He has been recognized for his scholarship and leadership with numerous prestigious awards including 30 Air Force Notable Achievement Awards, the 2016 FIU Charles E. Perry Young Alumni Visionary Award, the 2015 AFOSR Windows on the World Visiting Research Fellowship at Oxford University, UK, an AFOSR Basic Research Award, the 2015 lack Engineer of the Year Award (BEYA), the 2015 NSBE Golden Torch Award—Pioneer of the Year, selection to the 2015 Heidelberg Laureate Forum, and the 2011 NSF PIRE Award at the Fluminense Federal University, Brazil. He is currently an advisor for the National Research Council, a member of ACM, the FIU alumni association, NSBE and a senior member of IEEE.
About the Talk
The growth of cloud computing has spurred many entities, both small and large, to use cloud services for cost savings. Public cloud computing has allowed for quick, dynamic scalability without many overhead or long-term commitments. However, concern over cyber security is the main reason many large organizations with sensitive information such as the Department of Defense have been reluctant to join a public cloud. This is due to three challenging problems. First, the current cloud nfrastructures lack provable trustworthiness. Integrating Trusted Computing (TC) technologies with cloud infrastructure shows a promising method for verifying the cloud’s behaviors, which may in turn facilitate provable trustworthiness. Second, public clouds have the inherent and unknown danger stemming from a shared platform - namely, the hypervisor. An attacker that subverts a virtual machine (VM) and then goes on to compromise the hypervisor can readily compromise all virtual machines on that hypervisor. We propose a security-aware virtual machine placement scheme in the cloud. Third, a sophisticated attack in a cloud has to be understood as a sequence of events that calls for the detection/response model to encompass observations from varying dimensions. We discuss a method to automatically determine the best response, given the observations on the system states from a set of monitors. Game theory provides a rich mathematical tool to analyze conflict within strategic interactions and thereby gain a deeper understanding of cloud security issues. Theoretical constructs or mathematical abstractions provide a rigorous scientific basis for cyber security because they allow for reasoning quantitatively about cyber-attacks. This talk will address the three cloud security challenging problems identified above and report on our latest findings from this body of work.
Approved for Public Release; Distribution Unlimited: 88ABW-2015-5683, Dated 19 Nov 2015
IEEE Computer Society North Jersey Chapter IEEE Signal Processing Society North Jersey Chapter FDU Gildart Haase School of Computer Sciences and Engineering
You do not have to be a member of the IEEE to attend. Bring your friends and network during the free pizza starting at 1:15 PM.
4th Annual Symposium on Cybersecurity and Internet of Things (IoT): Student Research Poster Competition
Date/Time: Wednesday, September 28, 2016
Host: Fairleigh Dickinson University Center for Cybersecurity and Information Assurance (CCIA)
Register: For more information, and to register click here. For more information about the symposium click here.
Contact: Any questions, please contact Dr. Hong Zhao at firstname.lastname@example.org.
The organizing committee invites STUDENTS to submit abstracts of recent work, research results and cutting edge developing technologies in IoT and related security fields. The poster presentation consists of a visual display of research findings combined with an interactive question and answer period with a panel of judges. A total of 10-15 finalists will showcase their posters. A panel of internal and external judges will vote on each presentation. Three (3) outstanding posters will be chosen to receive 2016 IEEE North Jersey Cybersecurity Poster Award Cash Prizes.
Deadlines and Important Dates:
Last Date for Abstract Submission- 11:59 pm Tuesday, 09/06/2016
Notification of Acceptance- Monday, 09/12/2016
Electronic Version of the Poster Due- Wednesday, 09/21/2016
Presentation at the Symposium- 09/28/2016