Antoine will on Monday 28th October give a 45 minutes lecture on statistical signal processing as part of a special curriculum. Title of the lecture is: "Estimation theory in signal processing"
This case-study-based presentation demonstrates how open-source information can be collected and leveraged to attack critical infrastructure assets. Speaker: Sujeet Shenoi (University of Tulsa).
This presentation describes various electronic, physical and chemical techniques for extracting data and firmware from embedded devices. Speaker: Sujeet Shenoi (University of Tulsa).
5G networks promise to transform industries and our digital society by providing enhanced capacity, higher data rates, lower battery for machine-type devices, higher availability and reduced power consumption. In this talk, we visit 5G security architecture & outline potential security challenges in deployed networks. We use previously known and severe telecom security attacks examples to demonstrate potential risks of 5G.
This talk by Mauno Pihelgas is about building an availability scoring system for NATO CCDCOE's annual international cyber defence exercise Locked Shields. All interested are welcome.
Norsk Informasjonssikkerhetsforum (ISF) arrangerer Sikkerhetsfestivalen 2019 i dagene 26. - 28. august på Lillehammer.
Privacy Threat of Keystroke Profiling on the Web
In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is a biometric modality which can be used by any Web service to profile users. The collection of keystroke dynamics does not require any additional sensors and can be done without the users' knowledge. Keystroke Dynamics can be used to authenticate users, but also to profile otherwise anonymous web users, and thereby represents a privacy threat. This talk first discusses the performance of Keystroke Dynamics and how it poses a serious threat to users privacy. The talk then discusses several potential real-time methods for anonymization of Keystroke Dynamics, and gives some recommendations for building and implementing Keystroke Dynamics Anonymization Systems.
In this talk we present Vegvisir, a partition-tolerant blockchain for use in power-constrained IoT environments with limited network connectivity.
Security Trends: 1) Factorization, 2) AI/ML in Cyber Security
AFSikkerhet seminar om CyberSmart og GenCyber
EOS-utvalgets kontroll av de hemmelige tjenesters IT-systemer.
The 23rd Nordic Conference on Secure IT Systems
IMPORTANT! The entire Ole-Johan Dahls building will be closed on Monday 2nd and Tuesday 3rd of July 2018 due to power shutdown.
The Estate Department will carry out required service and maintenance on all electrical fuses in every building at UiO. In order to perform this operation, it is necessary to close Ole-Johan Dahls building for two entire days.
The 17th European Conference on Cyber Warfare and Security
On behalf of the section for Digitalization and Entrepreneurship (DigEnt), we are thrilled to invite you to attend two guest lectures by Robert Wuebker (University of Utah David Eccles School of Business) and Russ McBride (University of California, Merced) on the topics of entrepreneurship, strategy and artificial intelligence.
Unique opportunity with 15 vacant PhD positions at Department of informatics (IFI). Are you curious?
Beamforming has long been a topic for physicists and signal processing researchers. By this talk, Tobas Dahl aim to open up the principles of beamforming for researchers with backgrounds from multiple quantitative disciplines; partial differential equations, statistics, machine learning and data analysis, chemometrics, psychometrics, cybernetics and others who feel they could understand the basics without taking on a (new) master's degree in physics or digital signal processing.
Final presentation for MSc
Final presentation for MSc
Norsk Informasjonssikkerhetskonferanse 2017
Ian Horrocks is a new honorary doctor at the University of Oslo, faculty of Mathematics and Natural Sciences, and will hold a lecture entitled “Representing and Reasoning About Knowledge.” The lecture is open to everyone. Welcome!
Purpose of the workshop: To bring together the community to learn about examples of reuse of healthcare data and methods for working with large and varied datasets.