Seminars
Date: Monday, 7th May 2018
Time: 11:00 AM
Location: B09 – F106 (College Meeting Room)
Abstract: Cyber-physical systems pose a complex challenge for engineering systems safe and secure properties. In the context of automotive, this brings to fore problems of autonomy, connectivity and design complexity. This talk shares a research mission aiming to address questions of: how do we build secure systems? Essentially, what are the methods for rigorous design and qualified tools to deliver on such design? Once deployed, how do we analyze such systems to detect and monitor for stealthy threats? Finally, what national policy instruments are needed to ensure safe and secure operation of such systems? From pure technical problems of security assurance to evidence-based cybersecurity policymaking, we review through a number of such challenges.
Click here for more Information.
Dr. Abdullatif Shikfa, Assistant Research Professor, KINDI Center for Computing Research, Qatar University
Date: Thursday, 8th March 2018
Time: 5:00 PM - 6:00 PM
Location: G209
Abstract: Searchable encryption is a primitive that enables searching on encrypted data. This technology is particularly relevant when data is outsourced, typically in a cloud computing environment. In such an environment privacy and confidentiality concerns lead to encrypting the data, which makes it safe but with low utility. Searchable encryption enables to keep the data safe while retaining the capability to do a search on the encrypted data.
Click here for more Information.
Date: Wednesday, 28th February 2018
Time: 12:30 - 1:30 PM
Location: B09 – F106 (College Meeting Room)
Agenda:
- Overview of the Blockchain
- Use cases
- How IBM can help faculty, researchers, and professionals at QU
Dr. Mamoun Alazab, Australian National University
Date: Wednesday, 21th February 2018
Time: 11:30 AM- 12:30 PM
Location: B09 – F106 (College Meeting Room)
Abstract: Malicious content in spam emails is increasing in the form of attachments and URLs. Malicious attachments and URLs attempt to deliver software that can compromise the security of a computer. These malicious attachments also try to disguise their content to avoid virus scanners used by most email services to screen for such risks. Malicious URLs add another layer of disguise, where the email content tries to entice the recipient to click on a URL that links to a malicious Web site or downloads a malicious attachment.
Click here for more Information.
Dr. Mehmet Sabir Kiraz, Assoc. Prof. Unit Manager, Chief Researcher of Blockchain Research Labs at TUBITAK BILGEM
Date: Tuesday, 20th February 2018
Time: 1:30 PM - 2:30 PM
Location: B09 – F106 (College Meeting Room)
Abstract: After an anonymous writer using the alias Satoshi Nakamoto described the concept of a cryptocurrency called Bitcoin in 2008, the world begun to talk about the existence of a new international currency. While in the beginning it was only studied and adopted as a currency, the underlying revolutionary Blockchain technology was later noticed. Blockchain technology has become remarkable due to its role in transforming centralized (trusted) systems into decentralized systems. Therefore, it has potential to eliminate the single point of failure in terms of availability and to reduce the risk to the centralized trusted parties of being coerced to compromise privacy.
Click here for more Information.