Category / Computer Science

EU Radar – Societal Challenges – Secure societies – protecting freedom and security of Europe and its citizens

The following EU Horizon 2020 Societal Challenges’ calls are all closing after April 2015. If you are thinking of applying to any of these calls, please contact RKEO Funding Development Team as soon as you are able, so that we can help you with your submission.

The date given is the funder’s deadline with all closing at 17:00 Brussels local time, unless stated otherwise

Secure societies – protecting freedom and security of Europe and its citizens
Digital security,: Cyber security, privacy and trust – please check the specific topics – 27/8/15
Fight against terrorism and crime – please check the specific topics – 27/8/15
Border security and external security – please check the specific topics – 27/8/15

 

General / Multiple Topics

Horizon 2020 dedicated SME instrument phase 1 and phase 2 –  deadlines – 17/6/15, 17/9/15 and 25/11/15

Please check the specific topics within this call which may meet your research funding needs.

For more information on EU funding opportunities, contact Paul Lynch or Emily Cieciura, in the RKEO Funding Development Team.

Cloud and Weather Simulation for computer graphics

We would like to invite you to the next research seminar of the Creative Technology Research Centre.

 

Speaker: Leigh McLoughlin

Title: Cloud and Weather Simulation for Computer Graphics

Time: 2:00PM-3:00PM

Date: Wednesday 18th February 2015

Room: P335, Poole House, Talbot Campus

 

Abstract:

In this talk I will discuss my work on cloud simulation for computer graphics. This work was designed to provide a means of simulating clouds and weather features, such as rain, using desktop graphics hardware. This involves elements of meteorology, numerical weather simulation and computational fluid dynamics, taken from the sciences and adapted to meet the more artistic requirements of computer graphics in which an element of control is required and the laws of physics may be wilfully disobeyed. The result is a lightweight physically-inspired cloud simulation scheme, capable of emulating the dynamic properties of cloud formation and weather effects.

We hope to see you there.

Guest Talk “Machine Learning and Computer Vision for Intelligent Surveillance”, 11am 06Feb TAG32

I would like to invite you to a research presentation by Prof. Bailing Zhang, from Xi’an Jiaotong Liverpool University. We are hosting Prof. Zhang here for a week under the support of BU Fusion Funding. Please feel free to forward this invitation to your colleagues and PhD students if it is of their interests.

 

Title: Machine Learning and Computer Vision for Intelligent Surveillance

Time: 11:00-12:00

Date: Friday, 06 Feb 2015

Room: TAG32 (Talbot Campus)

 

Abstract:

The aim of intelligent video surveillance is to develop a way to provide reliable real-time alarms and situation awareness from existing surveillance networks without the enormous cost of intensive human monitoring. The tasks of video surveillance often include the detection of  the presence of people and vehicle and tracking them, and the subsequent analysis of their activities. Such research projects have broad implications for Homeland Security, law enforcement and many other types of military applications. There are many challenges to analyse a vast number of video streams in real-time to detect a range of events relevant to security needs. Computer vision and machine learning are the two interwove technologies for most of the modeling issues in video surveillance, for example, recognizing human behaviors. In this seminar, Dr. Bailing Zhang will briefly outline the ongoing projects with his group at XJTLU and discuss some relevant issues.

 

Biography:

Bailing Zhang received the Master’s degree in Communication and Electronic System from the South China University of Technology, Guangzhou, China, and Ph.D. degree in Electrical and Computer engineering from the University of Newcastle, NSW, Australia, in 1987 and 1999, respectively. He is currently Associate Professor in the Department of Computer Science and Software Engineering at Xi’an Jiaotong-Liverpool University, Suzhou, China. He had been a Lecturer in the School of Computer Science and Mathematics in the Victoria University, Australia since 2003. His research interest includes machine learning and computer vision, with applications in surveillance and biometrics. Bailing Zhang has over 100 referred papers published.

————–

Dr. Xiaosong Yang

Senior Lecturer in Computer Animation National Centre for Computer Animation
Faculty of Media and Communication
Bournemouth University
Email: xyang@bournemouth.ac.uk
http://staffprofiles.bournemouth.ac.uk/display/xyang

Cyber Security Seminar: Persuasive Technology for Information Security – Today, 4pm

Our next Interdisciplinary Cyber Security Seminar will take place TODAY (Tuesday, 27th January) at 4pm. The seminar will take place at Poole House in P335 LT, and will be free and open to all.

Our speaker will be Marc Busch. Marc is scientist at the AIT – Austrian Institute of Technology and is active at the intersection of persuasive technology and usable privacy and security. Furthermore, he is specialized in advanced quantitative and qualitative usability and user experience methodology, research methods and statistics in Human-computer interaction. Marc is involved in several international and national research and industrial projects, such as MUSES – Multiplatform Usable Endpoint Security. Before joining AIT, Marc was at CURE – Center for Usability Research & Engineering, where he focused on user experience and usability.

Abstract: Persuasive Technology is a vibrant field of research and practice, aiming to change the attitude or behavior of people. Persuasive technology has various different application areas, e.g. games motivating physical activity. An emerging application area is persuasive technology to increase information security and to engage people to protect their privacy. In the seminar, participants will hear about design principles for persuasive technology for promoting information security and also about methods to evaluate persuasive technology. Concrete examples and “best practices” will be given from a recent research project, in which persuasive technology is used in organizations to make employees comply with information security policies.

Secure and cross border digital identity: issues and perspectives

Staff and students are invited to join us for the next cyber security seminar on:

‘Secure and cross border digital identity: issues and perspectives’

Tuesday 25th November, 4pm – 5pm

Room: P335

 

The talk will discuss requirements, issues and perspectives for an interoperability solution that allows citizens and organizations to establish new e-relations across borders, just by presenting their national eID.

Our speaker will be Dr Andrea Atzeni, from the “Dipartimento di Automatica e Informatica, Politecnico di Torino” who is based in the TORSEC Security group.

Dr Atzeni’s work addresses the definition of security requirements and mobile security, plus, investigation and modelisation of user expectation on security and privacy; risk analysis and threat modeling for complex cross-domain systems; specification of functional and security architectures; development of cross-domain usable security; development and integration of cross-border authentication mechanisms (including legal and technical issues).

Three for the price of one: Keynote Talk, Outstanding Contribution Award and Media Appearance.

Prof Gabrys delivers a keynote talk at the KES 2014 international conference, receives the Outstanding Contribution to the KES International organisation award and appears in two popular Polish TV’s “Panorama” news programmes.

It was a very nice and productive trip to a beautiful Polish seaside city of Gdynia where the 18th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems took place between the 14th and 17th of September 20014.

I thought that I was only going to deliver a keynote talk which in itself was a nice recognition of the ongoing work that we are doing in the areas of robust adaptive predictive modelling and data science and a great opportunity to talk to over 200 delegates from over 30 countries attending the conference but as it turned out there were some other attractions awaiting.

This very well organised conference attracted the attention of the Polish TV and the topics of data science, artificial intelligence or big data, all in the focus of our Data Science Institute at BU, were judged to be of considerable interest to the general public. Not only I had an opportunity to talk briefly about the conference topics during the TV coverage at the conference venue (which was aired in the evening news programme on the 15th of Sep) but together with one of the local organisers we were invited to the “Panorama” programme studio to take part in the morning news programme the following day (aired on the 16th of Sep). The interaction with the journalists and the production teams brought to my attention how important is our role in informing and educating about this very dynamically changing field and related technological innovations which have already had such a huge impact on our lives and will play even bigger role in the near future.

So whatever next, I thought. Well, there was another surprise around the corner. Though I have been involved in the KES International for a number of years it has come as a very pleasant surprise and an honour to receive the Outstanding Contribution to KES International award during the conference dinner.

An icing on the cake, you could say. 🙂

Cyber Security seminars for 2014-2015 start with a bang

Yesterday, we held the first of this academic year’s cyber security seminars.  We hosted Dr John Lyle from Facebook, who spoke to a packed audience in the Barnes Lecture Theatre about some of the challenges fighting spam at Facebook.  After his talk, John described how impressed he was with some of the thought provoking questions raised by audience.

Our next seminar will be on Tuesday, 25th November and will be delivered by Dr Andrea Atzeni from the Computer and Network Security group at Politecnico di Torino.  Andrea will be visiting us that week as part of our Fusion funded Bournemouth European Network in Interdisciplinary Cyber Security (BENICS) project.  Watch this space for more details about  Andrea’s talk.

Our interdisciplinary seminar series on Cyber Security is a wonderful opportunity to hear interesting, thought-provoking talks on a variety of topics related to security and privacy.  Although some of these speakers will be academic, their talks will be approachable and require nothing more than a general interest in security, and an enquiring mind.  We’re also interested in ideas about possible speakers or seminar topics, so please get in touch if you have any suggestions.

BU helping to evolve security and privacy by design

On Monday, BU researchers co-organised a workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) at the 22nd IEEE International Requirements Engineering Conference (RE 2014) in Karlskrona, Sweden.  The workshop brought together practitioners and researchers from around the world, who shared their thoughts about how security and privacy can be incorporated into the design of software as early as possible, without compromising productivity or sacrificing innovation.  The RE conference series is one of the premier conferences in software engineering, and the ESPRE workshop is the successor of several successful secure software engineering workshops.  Shamal Faily (SciTech) organised this workshop, together with colleagues from Germany (University of Duisberg-Essen), South Korea (Ajou University), and the USA (Carnegie Mellon University).

The workshop began with a keynote talk from Professor Angela Sasse (UCL), who described some recent research examining how companies build security into products they develop, and the need to change the discourse around usability and security.  Three technical paper sessions followed, before the workshop was concluded with an invited talk by Aljosa Pasic (Atos Research & Innovation) on some of the market trends and business challenges in security engineering.  Further information about the workshop itself can be found at http://espre2014.org .

We’re grateful to the Faculty of Science & Technology for co-sponsoring this workshop, and to all the workshop attendees for sharing their work.

Rich-cores in networks

The next of our research seminars will take place on Wednesday the 23rd of July, 14:00 at PG10 (Poole House)

Our guest speaker is Dr Athen Ma, Senior Lecturer at the School of Electronic Engineering and Computer Science, Queen Mary University of London; Invited by our colleague Dr Darius Krol

The title of her exciting talk is “Rich-cores in networks”  a topic which is of wide interest way beyond computing ; for instance in areas such as Social Networks, Biology etc.

Abstract: “A core comprises of a group of central and densely connected nodes which governs the overall behaviour of a network, and it is recognised as one of the key meso-scale structures in complex networks. Profiling this meso-scale structure currently relies on a limited number of methods which are often complex and parameter dependent or require a null model, and as a result, scalability issues are likely to arise when dealing with very large networks together with the need for subjective adjustment of parameters. The notion of a rich-club describes nodes which are essentially the hub of a network, as they play a dominating role in structural and functional properties. The definition of a rich-club naturally emphasises high degree nodes and divides a network into two subgroups. Here, we develop a method to characterise a rich core in networks by theoretically coupling the underlying principle of a rich-club with the escape time of a random walker. The method is fast, scalable to large networks and completely parameter free. In particular, we show that the evolution of the core in World Trade and C. elegans networks correspond to responses to historical events and key stages in the physical development respectively.”

I very much encourage to the persons interested in the topic to attend. Coffee and cakes will be served.

Best wishes, Emili

Emili Balaguer-Ballester, PhD

Faculty of Science and Technology , Bournemouth University

Bernstein Center for Computational Neuroscience, University of Heidelberg

Attention all WordPress users – Wordcamp is coming to BU

WordPress is the powerhouse behind 1 in 5 sites on the web.  Everything from this research blog, JayZ’s lifeandtimes.com, Ebay, and even the New York Times online is based on a WordPress template.

This July, BU and Silicon South are hosting the 7th Wordcamp UK developers conference, inviting the best and brightest WordPress developers and users to come and share their tips and tricks to get the most out of your site.

Taking place in the EBC on the weekend of the 12th and 13th July there are lots of ways you can get involved:

  • Tickets cost £20 (including a free t-shirt), these are selling fast so purchase quickly to secure your place.  To find out more click here
  • Perhaps you know a thing or two about WordPress you’d like to share? You can submit your own sessions you might like to run, this could be an hours talk or a five minute lightning presentation – find out more about proposing a session here
  • If you’d like to be involved but don’t know want to run a session, we are looking for a few volunteers to help with the running of the event.  This would be fairly light touch, just helping with registration as people arrive and helping ensure sessions keep to time.  In return we can offer you a free ticket for the weekend, including lunch on both days. If you’d be interested, or know someone who might be, please send me an email and I can give you more details.

 

Goal Modelling for Investigating Fraud

Staff and students are invited to join us for the next Cyber Security Seminar…

‘Goal Modelling for Investigating Fraud’

Tuesday 17th June 2014

Lawrence Lecture Theatre, Talbot Campus

4pm – 5pm

 

Join us for this informative seminar presented by Clive Blackwell, who is currently a Research Engineer at Airbus Innovation Works.

This seminar will present a systematic process for analysing fraud using the KAOS tool, which is widely used in requirements engineering. Interestingly, Clive will analyse the case of Paul Ceglia vs Mark Zuckerberg and Facebook, where Ceglia claims 50% of Facebook supported by an alleged contract signed by Zuckerberg. Clive believes this technique could be extended to help provide a general model for fraud and also aid better analysis of the cyber security of complex systems in general.

 If you would like to join us for this presentation, please book your place via Eventbrite. We will look forward to seeing you!

Speaker Bio: Clive Blackwell is currently a Research Engineer at Airbus Innovation Works where his main research is in threat detection and modelling. Clive was formerly a Research Fellow at Oxford Brookes University between 2010 and 2013, where his main area of research was in cyber security and digital forensics with a particular interest in the development of a scientific basis for digital forensics. He has over 50 publications including two books to his name.

What happens next: can the future of tech-enabled crime ever be predicted?

Dr Christopher Richardson from the BUCSU delivered a thought provoking presentation at the CIFAS Fraud Conference, which was held at Dexter House London on the 3 June 2014. It was attended by the UK’s financial and insurance communities.

The conference was alerted to the fact that UK fraud is currently running at 25 incidents per hour; with an annual cost estimated above £52 billion.

Dr Richardson’s oversight expanded that through the continuance of pervasive technologies; increased crime wave and progressive skills shortage within the security industry, has all resulted in a perfect storm.

In forecasting the cyber threat landscape Dr Richardson projected the increase of insider threat, malicious software and human error, which if not corrected will bring the cost of fraud above £100 billion. The real question is, at what point will society, enterprise and individuals demand government action, and in particular a more determined approach to the investigation and prosecution of fraudulent activities? A characteristic of cybercrime is that it’s global, whereas policing is local.  In order to rescue our beleaguered and often under skilled law enforcement agencies, we need to tackle the issues from an international perspective, with global partnerships engaging business communities and overcoming their reluctance to breach reporting.

This conference follows on from the BUCSU’s strategic cyber policing conference in February, where cyber enabled and cyber dependent crimes were discussed. Please visit previous blog post for further info on the South West Police Cybercrime Conference.