Las JNIC 2020 se posponen como consecuencia de la situación generada por la pandemia del coronavirus (SARS-CoV-2),
así que desde la organización de JNIC 2020 se ha decidido aplazar su celebración a junio de 2021.
Las Jornadas se celebrará del 9 al 11 de junio de 2021,
Ciudad Real – Castilla-La Mancha https://2021.jnic.es
The results of MOTAM project, developed by NICS Lab in collaboration with Nokia and CryptULL research group from University of La Laguna has been presented to the public in Ada Byron research building.
NICS Labs has suscesfully integrated NuCypher technology in the on-board device used in MOTAM project. In the OBDX project, the OBDII data from the vehicle is encrypt locally in the vehicle and sent over the air to any interesed party using the MQTT protocol. Any party willing to access the data can request Alice access to and use the NuCypher network to get access to the decrypted data.
El 20 de Noviembre de 2018 ha tenido lugar una nueva entrega de esta cita anual que pone el foco en el fomento de las vocaciones investigadoras en el alumnado preuniversitario a través del testimonio y las experiencias de quienes hacen ciencia a diario. En esta ocasión, una veintena de expertos de la Universidad de Málaga (UMA) distribuidos en once mesas han dado a conocer su trabajo en temas tan diversos como la ciberseguridad, la biotecnología, el ecosistema de las Islas Galápagos o la enfermedad de Párkinson.
David Nuñez, postdoctoral researcher at NICS Labs, has been honored with the Best Thesis Award in JNIC 2017 (the National Conference on Cybersecurity Research), for his doctoral dissertation, entitled “New Security Definitions, Constructions and Applications of Proxy Re-Encryption”. David defended his thesis on January 2016, with professors Isaac Agudo and Javier Lopez as advisors.
Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There are a multitude of CPS devices and applications being deployed to serve critical functions in our lives. The security of CPS becomes extremely important. This workshop will provide a platform for professionals from academia, government, and industry to discuss how to address the increasing security challenges facing CPS. Besides invited talks, we also seek novel submissions describing theoretical and practical security solutions to CPS. Papers that are pertinent to the security of embedded systems, SCADA, smart grid, and critical infrastructure networks are all welcome, especially in the domains of energy and transportation. Topics of interest include, but are not limited to:
- Authentication and access control for CPS
- Autonomous vehicle security
- Availability, recovery and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security
- EV charging system security
- Industrial control system security
- Intrusion detection for CPS
- IoT security
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- Risk assessment for CPS
- SCADA security
- Security architectures for CPS
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security
- Submission due: Jan 12, 2017
- Notification: Feb 15, 2017
- Camera-ready due: Feb 25, 2017
- Dieter Gollmann (Hamburg University of Technology, Germany) Ravishankar
- Iyer (UIUC, USA)
- Douglas Jones (ADSC, Singapore)
- Javier Lopez (University of Malaga, Spain)
- Jianying Zhou (I2R, Singapore) – Chair
- Cristina Alcaraz (University of Malaga, Spain)
- Basel Alomair (KACST, Saudi Arabia)
- Claudio Ardagna (Università degli Studi di Milano, Italy)
- Ioannis Askoxylakis (FORTH, Greece)
- Alvaro Cardenas (University of Texas at Dallas, USA)
- Lorenzo Cavallaro (RHUL, UK)
- Stephen Chai (Thales, Singapore)
- Aldar Chan (University of Hong Kong, HK)
- Binbin Chen (ADSC, Singapore)
- Xiaofeng Chen (Xidian University, China)
- Frédéric Cuppens (Telecom Bretagne, France)
- Nora Cuppens (Telecom Bretagne, France)
- Sebti Foufou (Qatar University, Qatar)
- Aurelien Francillon (EURECOM, France)
- Dieter Gollmann (Hamburg Uni of Tech, Germany)
- Felix Gomez‐Marmol (NEC Labs, Germany)
- Huaqun Guo (I2R, Singapore)
- Jin Han (Twitter, USA)
- Masaki Hashimoto (Institute of Info Security, Japan)
- Matt Henricksen (I2R, Singapore)
- Thomas Hildebrandt (IT Uni of Copenhagen, Denmark)
- Xinyi Huang (FJNU, China)
- Zbigniew Kalbarczyk (UIUC, USA)
- Sokratis Katsikas (NTNU, Norway)
- Shinsaku Kiyomoto (KDDI R&D Labs, Japan)
- Marina Krotofil (Honeywell, USA)
- Hoon Wei Lim (I2R, Singapore)
- Peter Loh (SIT, Singapore)
- Javier Lopez (University of Malaga, Spain)
- Xiapu Luo (Hong Kong Polytechnic University, HK)
- Michail Maniatakos (NYU-Abu Dhabi, UAE)
- Konstantinos Markantonakis (RHUL, UK)
- Weizhi Meng (DTU, Denmark)
- Chris Mitchell (RHUL, UK)
- Ganesh Narayanan (Ernst & Young, Singapore)
- Surya Nepal (CSIRO, Australia)
- Susan Pancho-Festin (Uni of Philippines, Philippines)
- Michael Papay (Northrop Grumman, USA)
- Axel Poschmann (NXP, Germany)
- Indrakshi Ray (Colorado State University, USA)
- Gritzalis Stefanos (University of the Aegean, Greece)
- Rui Tan (NTU, Singapore)
- William Temple (ADSC, Singapore)
- Nils Ole Tippenhauer (SUTD, Singapore)
- Alberto Trombetta (Università dell'Insubria, Italy)
- Luca Viganò (King’s College London, UK)
- Claire Vishik (Intel, USA)
- Long Wang (IBM Research, USA)
- Yang Xiang (Deakin University, Australia)
- Jia Xu (I2R, Singapore)
- David Yau (SUTD, Singapore)
- Chan Yeob Yeun (KUSTAR, UAE)
- Ye Zhang (Google, USA)
- Peng Zhou (Shanghai University, China)
- Sencun Zhu (Pennsylvania State University, USA)
- Saman Zonouz (Rutgers University, USA)
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions must be in double‐column ACM SIG Proceedings format, and should not exceed 12 pages. Position papers and short papers of 6 pages describing the work in progress are also welcome. Only pdf files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published in the ACM Digital Library. There will also be a best paper award.
Cristina Alcaraz was recently interviewed by the Diario Sur of Malaga so as to know her activities on CAIN and her future perspectives. CAIN is a research project on "Controllability under Adversarial Influence in Critical Information Infrastructures" supported by the Mari Curie COFUND programme "U-Mobility" of the Univerisity of Malaga and the EU 7th Framework Programme grant 246550/COFUND2013-40259.
The NICS Lab at the University of Malaga (UMA) participes in the development of a new cyber-security training simulator together with the COSEC Lab at the University Carlos III (UC3M) and the Indra company. This simulator is aimed to train both professionals and members of the state security forces
LockPic was one of two applications selected in the 1st Android Application Development Contest at the University of Malaga. It has been recently uploaded to the Android Market and there are plans to release an IOS version in the near future.
Our article "On the Features and Challenges of Security and Privacy in Distributed Internet of Things", recently published by Computer Networks journal, has been featured in its "most downloaded articles" list. This list provides the most downloaded articles from ScienceDirect in the last 90 days, which indexes all Computer Networks issues starting from 1999.
The TAFC workshop was held in Malaga on 6-7 June 2013 in conjunction with IFIPTM 2013. The TAFC 2013 workshop brought together international experts from computer science and other disciplines to discuss collectively how public and private sectors as well as the research community can increase the confidence in the use of cloud computing to deploy and use innovative services by citizens and businesses. The TAFC 2013 workshop will not only focus on current on-going research work, but also on future research challenges that need to be addressed by the international research and innovation communities in programmes such as H2020.
The workshop is a continuation of what began as the EU-US summit series of international workshops. The workshop was sponsored by the EU projects SecurIST, INCO-Trust, BIC and A4Cloud, and th United States National Science Foundation grant on International cooperation on Trustworthy Computing, DIMACS.
The article "Businesses Take Cyber Security Seriously" has recently been published by the THE INSTITUTE, the member newspaper of the IEEE, in order to highlight the relevance of protecting information systems against cyber-threats. The vast majority of these systems are integrated inside critical infrastructures to manage their services themselves, such as banks, energy systems, control systems, etc. The article also stresses some interesting cyber-defense solutions which have recently been published in the IEEE Computer Magazine, and among them, our paper "Wide-Area Situational Awareness (WASA) methodological framework for critical infrastructure protection".
Neelie Kroes, Vice president of the European Comission was interviewed by the Huffington Post. During this interview she was asked about the possible threats one might encounter when using computers. She mentioned the EU is working towards a common research agenda for internet security. In particular, she highlighted how NESSoS was contributing to it by considering security for the Future Internet.
DEPHISIT project will deliver a hybrid wireless platform for intelligent transport systems. The platform will be demonstrated trough several use cases for road safety, traffic management, valued added services and road-users.
A delegation from the University of Malaga visited Incheon in order to work together in research proyects. NICS Lab was one of the only 4 research groups selected from the University of Malaga in different disciplines such as Biology, Chemistry and Computer Science.
A4Cloud (Accountability for Cloud and other Future Internet Services) and FACIES (online identification of Failure and Attack on interdependent Critical InfrastructurES), in which NICS participates, have been approved by the EC Commission in the recent Call 8 of the FP7 program.
SINC, is the first information public agency for science, technology and innovation in Spanish. They produce news, articles and interviews and the audience they target are mainly the scientific community. For this issue they included an article based on the NESSoS. The article focuses on how security will have to be included in the Future Internet.
NICS Lab organizes the 3rd International ACM Sigsoft Symposium on Architecting Critical Systems that will be held in Bertinoro (Italy) on June 26-28, 2012. ISARCS is a symposium in the area of architectural design for dependable, safe and secure systems, which constitutes an exclusive forum for exchanging views on the theory and practice of architecting critical systems.
El Network Information and Computer Security Lab (NICS), integrado en el grupo GISUM de la UMA, colabora en un proyecto europeo destinado a sentar las bases de la red del futuro en materia de seguridad.
As part of the week of Science the University of Málaga organized round tables where researchers explained their activities to secondary school students. Carmen Fernandez-Gago participated explaining NICS activities.
The 9th International Conference on Applied Cryptography and Network Security (ACNS '11)was held on June 7-10, 2011 in Nerja (Malaga), Spain. It was organized by the "Network, Information and Computer Securty Lab"(NICS)from the Computer Science Department of University of Malaga.
The 7th International Workshop on Security and Trust Management, supported by ERCIM, was held in Copenhage (Denmark) on the 27th-28th of June 2011, in conjunction with IFIPTM'11. Almost 40 papers were submitted and 12 were accepted for submission. The event also included a panel where the new paradigms of trust were discussed. The proceedings will shortly be available in Springer, LNCS series.
The FP7 funded project SPIKE had its final review in April 2011. The review was very successful since all the objectives were achieved as expected. SPIKE provided a collaborative platform for the rapid and easy set-up of enterprises alliance, giving special focus to security.