Cyber Security Institute Dr. Ferhat Ozgur Catak TÜBİTAK BİLGEM Cyber Security Institute Role: Senior Researcher Proposal activity:

Slides:



Advertisements
Similar presentations
Nokia Technology Institute Natural Partner for Innovation.
Advertisements

What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Data Analytics Program at Drake Brad C. Meyer, Chair Information Management and Business Analytics.
Agile Manufacturing Industries From Mechatronics to Collaborative Supply Chains Industrial Technologies Aarhus, 19 June Dr. Massimo Mattucci Session.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 1 Introduction of Sakurai Lab. Kyushu Univ. JAPAN.
SME based in Dublin, Ireland. Data Analytics solutions deriving actionable insights for government SMI2G brokerage event, January DS
Today's Landscape We’re living in an era of profound technological change and innovation.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
ABIDE Anonymised BIg Data Environment, ABIDE. ABIDE is an Anonymized Data Science Sharing Platform for laboratories and big data users of all types. Uniquely,
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1.
Olga E. SegouDr. Stelios C.A. Thomopoulos Integrated Systems.
U.S. Government Coordinated Approach to Intellectual Property Enforcement Third Global Congress on Counterfeiting & Piracy January 30, 2007 Office of the.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Dr Niall Ó Dochartaigh Conflict, Rights and Security Research Cluster National University of Ireland Galway Topic: BES 12 – 2014: Enhancing the civilian.
Investigative Analytics Data science for everybody Curt A. Monash, Ph.D. President, Monash Research Editor, DBMS2
Application Modernization Step by Step. Copyright ©2009, Oracle. All rights reserved. Oracle Confidential PACE OF BUSINESS Increasing expectations from.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
Big Data to Knowledge Panel SKG 2014 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China August Geoffrey Fox
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
SME based in Dublin, Ireland. Data Analytics solutions deriving actionable insights for government SMI2G brokerage event, January FCT
CUMASC: Collaboratively Unify and Aggreagte Streams of Media Khurshid Ahmad/Shane Finan Trinity College Dublin, The University of Dublin.
Multi Service Multi Domain C2 André Oliveira TEKEVER ASDS Role: Coordinator Proposal activity: SEC-20-BES-2016: Border Security:
Gprocurement(Globalproc) Professor David Meehan PhD, MEng, MSc,BSc,MIET, CEng,HDE Proposal.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
CROSS C ost R eduction O ffering S uperior S ecurity at land border crossing Peretz Gurel Athena Security Implementations Ltd. Role: Coordinator,
TÜBİTAK – BİLGEM – SGE Cyber Security Institute
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
ORGANİZED CRİME AND BORDER SECURİTY İskender Güray KESKİN Turkish National Police Role: End User Proposal activity: SEC-07-FCT
Developing Big Data and Data Fusion Methods for Maritime Security Applications Aslihan Duman STM Savunma Teknolojileri Mühendislik ve.
ONTOREST Ontology based integrated disaster response tool Zeynep Sofuoglu MD PhD MSc AAHD / Emergency Ambulance Physicians Association.
Combined NMR/MW/sub-THZ detection of liquid (improvised) explosives Prof.Dr.B. Aktaş (GTU) &
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Copyright © 2016 Pearson Education, Inc. Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman, Heikki Topi CHAPTER 11: BIG DATA AND.
Cybersecurity Assessment Framework (MCSAF) focused on multidisciplinary assessment of system failures Andrzej Bialas Institute.
LETS-CROWD Novel Law Enforcement methodologies and ToolS for CROWD protection Santiago Cáceres ETRA Research and Development.
Preliminar idea on City Lab Dr. Mariana Zuleta Ferrari Tilburg Law School Role: WP leader/participant Proposal activity:
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
Technologies for maritime surveillance and border security Dr Rodoula Makri Institute of Communications & Computer Systems – National.
Data Analytics and Fusion for Early Warning and Prevention Against Radicalization in the EU Aslihan Duman STM Savunma Teknolojileri Mühendislik.
Présentation des compétences
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Présentation de l’idée de projet
How design is shaping thinking at the heart of the UK Government
Center of Excellence in Cyber Security
HEPTech Conference in Slovakia, 2018
The Internet of Things (IoT) and Analytics
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Published: Aug 2017 Single User PDF: US$ 2500 No. of Pages: 499
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Dr Paul Lewis Chief Technology Officer
Institute of Informatics UM FERI
Institute of Informatics UM FERI
Cybersecurity Insider Threat Analytics
Digitalization of Manufacturing
Artificial Intelligence in Manufacturing
Forensics Week 6.
Digital Policy -Transformation Towards Society 5.0-
Data Warehousing Data Mining Privacy
Driving sustainable food production with Precision Agriculture.
CELTIC-NEXT Event 20th June 2019, Valencia
Présentation de l’idée de projet
Présentation des compétences
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Cyber Security Institute Dr. Ferhat Ozgur Catak TÜBİTAK BİLGEM Cyber Security Institute Role: Senior Researcher Proposal activity: SEC-17-BES-2017: Architectures and organizations, big data and data analytics for customs risk management of the international goods supply chain trade movements SEC-19-BES-2016: Data fusion for maritime security applications DS : EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation DS : Cryptography DS : Privacy, Data Protection, Digital Identities Disclaimer: with the submission of this presentation the consent is given by its author for the organisers to distribute the presentation. SMIG January

Previous/on going projects and capabilities Cloud Computing and Big Data Laboratory, Cloud And Big Data Security and Privacy Project (2014-…) (funded by Republic of Turkey Ministry of Development) Data Leakage Prevention (DLP), Machine Learning Based Classification Tool (2014-…) (funded by Republic of Turkey Ministry of Development) Capabilities : Threat/Risk Modeling Relational and NoSQL Database security PostgreSQL, Oracle, MySQL etc MongoDB, Hadoop HDFS etc Privacy techniques Anonymization techniques Statistical perturbation techniques Secure Multi-Party Computation Data Science Big Data Analytics Data Mining: Classification, Clustering, Trend Analysis, Correlation Analysis Data Visualization 2 SMIG January 2016

Potential partner activity SEC-17-BES-2017: Architectures and organizations, big data and data analytics for customs risk management of the international goods supply chain trade movements Design and implementation of Big Data Analytics Systems, Data Visualization, Predictive Modeling DS : EU Cooperation and International Dialogues in Cybersecurity and Privacy Research and Innovation, DS : Cryptography Developing security and privacy tools and techniques for Cloud computing, big data, IoT, smart cards, Identifying new opportunities for cyber-security like homomorphic encryption based privacy preserving computation. Developing custom techniques, tools and systems for anonymization, obfuscation, perturbation to reduce data leakage DS : Privacy, Data Protection, Digital Identities Developing custom techniques, tools and systems for aiding Privacy Enhanced Technologies. Incorporating big data into various analysis steps. SMIG January