challenges in cyber security an academic vie · malicious hardware use of cots components . why to...
TRANSCRIPT
http://www.ict-forward.eu/
”…The Web will be understood not as
screenfulls of text and graphics but as
a transport mechanism, the ether
through which interactivity happens…”
DiNucci, 1999
A map of the World,
showing the most
popular social
networks by country,
according to Alexa &
Google Trends for
Websites traffic data
(June, 2010).
Intuitive entity-relationship notation;
Details’ consideration in I-SCIP*;
Familiar to the scientific world for more
then half a century.
The Universe
of Physical
Realities
Decision
Verification
Discretization
Errors
Validation
Observ.
Errors Modelling
Errors
Computational
Models
Theory/
Mathematical
Models Observations
Knowledge
http://www.syssec-project.eu/
SysSec
Community
Industry
Other Stakeholders
Center of Academic Excellence (Education)
Center of Research
Excellence
Academia
SysSec Europe
Italy
Nether-land
France
Austria
Bulgaria
Sweden
Turkey
Greece
SysSec Europe
AT&T
Microsoft
Panda
Hispasec
Orange
F-Secure
Symantec