Explore the Latest Breakthroughs in Information Security 🔐 - Insights from Prof. Edgar Weippl (ICISSP 2015)
Discover the cutting-edge research topics in information security presented by Prof. Edgar Weippl at ICISSP 2015, covering emerging threats and innovative solutions in the cybersecurity landscape.

INSTICC
3.1K views • May 26, 2015

About this video
Keynote Title: Current Research Topics in Information Security
Keynote Lecturer: Edgar Weippl
Presented on: 10/02/2015, ESEO, Angers, Loire Valley, France
Abstract: Over the last years, there is an increasing number of descriptive works observing and describing complex phenomena, e.g., the efficiency of different spam campaigns, the distribution of bots, or the likelihood of users to accept false identities as friends in social networks. These studies are characterized by large sets of samples. Future research will focus on networks and cloud systems; the research methodology will be empirical systems security: (1) passively observing large systems and (2) active probing that stimulates revealing behavior of the systems. The research contribution lies in observing, describing and inferring the behavior of complex systems that cannot be directly observed and have a large impact on users.
Presented at the following Conference: ICISSP, 1st International Conference on Information Systems Security and Privacy
Conference Website: icissp.org
Keynote Lecturer: Edgar Weippl
Presented on: 10/02/2015, ESEO, Angers, Loire Valley, France
Abstract: Over the last years, there is an increasing number of descriptive works observing and describing complex phenomena, e.g., the efficiency of different spam campaigns, the distribution of bots, or the likelihood of users to accept false identities as friends in social networks. These studies are characterized by large sets of samples. Future research will focus on networks and cloud systems; the research methodology will be empirical systems security: (1) passively observing large systems and (2) active probing that stimulates revealing behavior of the systems. The research contribution lies in observing, describing and inferring the behavior of complex systems that cannot be directly observed and have a large impact on users.
Presented at the following Conference: ICISSP, 1st International Conference on Information Systems Security and Privacy
Conference Website: icissp.org
Video Information
Views
3.1K
Likes
6
Duration
3:01
Published
May 26, 2015
User Reviews
3.8
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now