Collaborative and Confidential Information Sharing and Analysis for Cyber Protection

Speaker: Rogerio de Lemos, University of Kent, UKWhen: Wednesday, April 03rdWhere: Sala Riunioni di Matematica, Coppito I building at: 2:30 PM Abstract:Analysing cyber threat information (CTI) provides organisations with valuable intelligence about which of their systems are being attacked, and who is attacking them. If organisations could pool their CTI then it is quite likely that other, possibly low level, distributed […]

Towards Compositional Transformations for Dependability Analysis of Evolving and Reconfigurable Systems

Speaker: Kristof Marussy, Fault Tolerant Systems Research Group, University of BudapestWhen: Tuesday, March 19, 3:15PM Where: Aula 1.7 (Coppito 1)Title: Towards Compositional Transformations for Dependability Analysis of Evolving and Reconfigurable Systems Abstract: Evaluation of the reliability and performance of variable and adaptable architectures as well as the co-evolution of architectures and analyses remains difficult. Evolving system structure often requires repeated […]

Discovering complex individual and social behavior patterns via Social network Analysis

Speaker: Prof. Pasquale De Meo, Università di Messina When: Wednesday, February 6, 2019 Where: AULA A1.4 COPPITO ZERO Title: Discovering complex individual and social behavior patterns via Social network Analysis Thanks to the availability of user profiles and records of activity, online social network analysis is relevant to discover complex individual and social behavior patterns. The emergence of trust between […]

Seminar “Facing Uncertainty in Complex Cyber-Physical System Design”

Speaker: Malina Software Corp. (Canada), Simula Research Laboratory (Norway), Monash University (Australia) When: Thursday, February 7, 2019 Where: room Alan Turing, Coppito Zero (Blocco 0) Title: Facing Uncertainty in Complex CPS Design ABSTRACT: The unprecedented complexity of many modern-day cyber-physical systems (CPS) requires changes in how we design and develop such systems. Traditional methods were typically based on the assumption that a capable and responsible […]