Die Mathematik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Verwaltung des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Mathematik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Universität Bremen


INHALT & PFAD:
Startseite Textformat


Für den Fall, dass Ihr Computer das entsprechende Format nicht angezeigen kann, können Sie sich hier das Dokument als unformatierte Textausgabe ansehen.

(Bitte haben Sie dafür Verständnis, dass gewisse Dokumente nicht als Textalternative zur Verfügung stehen.)


Download:
Download Cases of Adversarial Manipulations in Computational Resource Constrained Networks (application/pdf 85.6 KB)


Textalternate  Cases of Adversarial Manipulations in Computational Resource Constrained Networks
Fulltext:




Einladung zum Vortrag


08. September 2015, 16.00 Uhr c.t.
Universität Bremen | Cartesium Rotunde


Dr. Anne Kayem
University of Cape Town's Department of Computer Science


Cases of Adversarial Manipulations in Computational
Resource Constrained Networks
Computational resource constrained or lossy networks (LNs) are increasingly being used as a lowcost
alternative to supporting communitybased service oriented architectures (SoAs) in economically
challenged and/or technologically poor areas. LNs are typically characterized by embedded devices
with limited power, memory, and processing resources. Application areas range from building
automation to wireless healthcare and energy metering on smart/microgrids.
Services provided over LNs are to large degree supported by user participation and so service
providers need to provide users with firm guarantees of network reliability and dependability. Failure
to do so, results in a loss of trust on the part of the users and a refusal to participate in or support the
network. Lack of user cooperation can ultimately result in a breakdown of the network, which is
undesirable.
This talk considers security and privacy from the perspective of LN adversarial manipulations that
provoke disruptions to affect LN stability negatively. Examples of why and how such adversarial
situations are provoked and some of preliminary solutions are discussed.

Biografie
Anne Kayem is currently a Senior Lecturer at the University of Cape Town's Department of Computer Science and
heads the Information Security Laboratory. She holds a PhD in Computer Science obtained from Queen's University,
Kingston, Ontario, Canada. Her research interests lie in the areas of Key Management, Data Anonymization, Security
and Privacy in lossy networks.


Dieser Gast wurde von Dieter Hutter eingeladen.

Microsoft Word - Kayem2015.docx Microsoft Word - Kayem2015.docx jungmann PScript5.dll Version 5.2.2 Acrobat Distiller 10.1.14 (Windows) Fri Aug 28 12:55:52 2015 Fri Aug 28 12:55:52 2015 no 1 no 595.22 x 842 pts (A4) 87609 bytes yes 1.5
Cases of Adversarial Manipulations in Computational Resource Constrained Networks
Cases of Adversarial Manipulations in Computational Resource Constrained Networks


 



zurück  




Seitenanfang  -  Impressum Zuletzt geändert durch: jungmann [b]   28.08.2015 Admin-Login