Submitted by kgudeman on Mon, 04/13/2015 - 11:33am
Title: Assessing the Global Cyber and Biological Threat Candidate: Ghita Mezzour When: Tue April 14, 9-11am, Where: GHC 6115, Carnegie Mellon University
The Information Trust Institute at the University of Illinois at Urbana-Champaign is seeking applicants for the Herman M. Dieckamp endowed postdoctoral fellowship. The successful candidate will conduct research on trustworthy systems (e.g., highly reliable, fail-safe, and/or resilient), particularly those systems which protect critical infrastructure.
Submitted by Katie Dey on Fri, 03/20/2015 - 10:21am
This summer school will provide a rare opportunity for researchers in mathematics, computer science, engineering, and related sciences to learn about recent research directions and future challenges in this area. Funding is available to support graduate students and postdoctoral researchers in the early stages of their career, as well as more senior researchers interested in undertaking new research in this area. Encouraging the careers of women and minority mathematicians and scientists is an important component of IPAM's mission, and we welcome their applications.
Submitted by Anonymous on Mon, 03/16/2015 - 3:22pm
2015 Safe and Secure Systems and Software Symposium (S5) - Save the Date!
The Air Force Research Laboratory, Aerospace Systems Directorate, Power and Control Division will be hosting the 2015 Safe and Secure Systems and Software Symposium (S5) on
9 - 11 June 2015 at The Crowne Plaza Dayton, Ohio. Please mark your calendars!
Graphical security models provide an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. Formal methods and computer security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes.