Rakesh Verma University of Houston

Slides:



Advertisements
Similar presentations
Cellular Networks.
Advertisements

©EverFi, Inc. All rights reserved. Please Contact: Sarah Pratt Ponder EverFi provides FREE online platforms High School:
Controlling Robot Car via Smartphone Supervisor: Dr. Jamal Kharousheh Prepared by : Hamza Qaddara Esmat Hedariya Hareth Hanani Faculty of Engineering Telecommunication.
Advanced Computer Networks CS4516 D11 Professor Bob Kinicki
Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile.
Emerging Trends in Computer Science Dr. Gurvinder Singh Reader, Deptt of Computer Science & Engineering, GNDU, Amritsar.
University of Kansas ITTC Research Overview Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science Executive.
Introduction to Computers. Michael R. Izzo
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
June 2008 WEI Short Course 1 Wireless Embedded InterNet working Foundations of Ubiquitous Sensor Networks EPIC – Open Embedded Networking Platform David.
Electronic and Computer Engineering D Azzi (PL)R Khusainov (SL) D Robinson (RF-HEIF IV)
Wireless Systems Instructional Design. Computer Science Electrical Engineering What is this course about? PHYLinkNetworkApplicationSpectrum.
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
1 CMPE1 Hands-on Computer Engineering Stephen Petersen Richard Hughey.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Privacy and Security Workgroup: Big Data Public Hearing November 10, 2014 Deven McGraw, chair Stan Crosley, co-chair.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Introduction to CS447 Department of Computer Science Southern Illinois University Edwardsville Fall, 2015 Dr. Hiroshi Fujinoki
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
Multimedia is a combination of text, art, sound, animation, and video.
CRA-W Graduate School Panel Dalhousie University, Faculty of Computer Science March 11, 2009.
Engineering and Physical Sciences Research Council Towards an Intelligent Information Infrastructure (TI 3 ) ENGINEERING AND PHYSICAL SCIENCES RESEARCH.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Successes and Failures applying to SaTC/TWC/TC/CT Nikita Borisov University of Illinois at Urbana- Champaign.
Wireless and Mobile Networks (ELEC6219) Session 1: Introduction to the Module Adriana Wilde and Jeff Reeve 22 January 2015.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Telecommunication II.
An Overview of IPTV Standards Development Chih-Hsiang Chou Advisor: Prof Dr. Ho-Ting Wu Department of Computer Science and Information Engineering, National.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
*** School of Information, Renmin University of China, China
AN OVERVIEW Rocky K. C. Chang13 Sept The web 2.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
QM/BUPT Joint Programme Final Year Projects Dr Jonathan Loo
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Network Concepts.
QM/BUPT Joint Programme
Rakesh Verma Computer Science Department University of Houston
Transfer of data in ICT systems
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
A Fault Tolerance Protocol for Uploads: Design and Evaluation
Some Issues in MANET, Wireless & Cellular Security/Privacy
Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes
Data and Applications Security Developments and Directions
CS447 - Networks and Data Communications
Lectures 1 and 2 Network Centric Computing Administrative Issues.
DIFFERENT TYPES OF INTERNET CONNECTIONS.
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong
Data Communication and Networks
Data Communication and Networks
Course Project Topics for CSE5469
Network Architecture for Cyberspace
Data Communication and Networks
Data Communication and Networks
EEL 6935 Wireless Ad Hoc Networks
Data Communication and Networks
Data and Applications Security Developments and Directions
5G/IoT Technologies for Smart Metering
Presentation transcript:

Rakesh Verma University of Houston Panel: Enriching Security Curricula with Research on Security and Privacy of MWSNs Rakesh Verma University of Houston MWSN-panel

Goal Prepare four modules that can be “dropped” into undergrad/grad security courses: Mobile Security and Privacy Security of Wireless Sensor Networks (WSNs) Timing & Implementation Issues of WSNs Intrusion Detection MWSN-panel

Focus Which research in the area of each module is essential and stable enough that it must be a part of these modules? MWSN-panel

Panelists In order of presentation: Stephen Wicker: Professor of Electrical & Computer Engg at Cornell University. Interests: wireless information networks, cellular networks, packet-switched computer networks, and digital telephony. Current focus: on the interface between information networking technology, law, and sociology, with a particular emphasis on how design choices and regulation can affect the privacy and speech rights of users. Shengli Yuan: Professor of Computer Information Science at University of Houston-Downtown Interests: Network Reliability and Security, Optical Networks, Wireless Networks MWSN-panel

Stephen Huang: Professor of Computer Science, University of Houston Wei W. Li: Professor and Chair (interim) of Computer Science, Texas Southern University Interests: wireless sensor networks, high-performance networking, wireless multimedia, wireless internet and mobile adhoc networks, performance evaluation and real-time, hybrid and embedded systems Stephen Huang: Professor of Computer Science, University of Houston Interests: Intrusion detection and data mining MWSN-panel

Format Each panelist gets up to 8 minutes for a position statement Drs. Yuan, Li and Huang will present module outlines Audience can ask a few short questions during initial presentation Important: “Fill as you hear” model: Please fill in the module evaluation forms as you receive them – they will be collected at the end of panel discussion Open discussion will follow panelists’ remarks MWSN-panel