{"id":849,"date":"2015-01-15T15:32:24","date_gmt":"2015-01-15T12:32:24","guid":{"rendered":"https:\/\/kaf44.mephi.ru\/?p=849"},"modified":"2015-01-16T11:24:13","modified_gmt":"2015-01-16T08:24:13","slug":"%d0%bb%d0%b5%d1%82%d0%bd%d1%8f%d1%8f-%d1%88%d0%ba%d0%be%d0%bb%d0%b0-ipics-2015","status":"publish","type":"post","link":"https:\/\/kaf44.mephi.ru\/?p=849","title":{"rendered":"\u041b\u0435\u0442\u043d\u044f\u044f \u0448\u043a\u043e\u043b\u0430 IPICS 2015"},"content":{"rendered":"<p>\u0421\u0440\u0435\u0434\u0438 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 4-\u0433\u043e \u043a\u0443\u0440\u0441\u0430 \u043e\u0431\u044a\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u043e\u043d\u043a\u0443\u0440\u0441 \u043d\u0430 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u043b\u0435\u0442\u043d\u0435\u0439 \u0448\u043a\u043e\u043b\u0435 \u0434\u043b\u044f \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u0415\u0421 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c &#8220;\u0415\u0432\u0440\u043e\u043f\u0435\u0439\u0441\u043a\u0430\u044f \u0438\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u0430\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 &#8220;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0438 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439&#8221; (European Intensive Programme on Information and Communication Technologies Security) IPICS2015, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u0441\u0442\u043e\u0438\u0442\u0441\u044f \u0441 6 \u043f\u043e 17 \u0438\u044e\u043b\u044f 2015 \u0433. \u043d\u0430 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 \u043a\u0440\u0430\u0441\u0438\u0432\u0435\u0439\u0448\u0438\u0445 \u043e\u0441\u0442\u0440\u043e\u0432\u043e\u0432 \u0413\u0440\u0435\u0446\u0438\u0438 \u2013 \u041b\u0435\u0441\u0431\u043e\u0441\u0435.<\/p>\n<p>\u041b\u0435\u0442\u043d\u0438\u0435 \u0448\u043a\u043e\u043b\u044b IPICS \u043d\u0430\u0447\u0430\u043b\u0438 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u0441\u044f \u0441 1998 \u0433. \u0421\u0442\u0443\u0434\u0435\u043d\u0442\u044b \u041d\u0418\u042f\u0423 \u041c\u0418\u0424\u0418 \u0443\u0447\u0430\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0432 \u0448\u043a\u043e\u043b\u0430\u0445 \u0432 2002 (\u0413\u0440\u0435\u0446\u0438\u044f), 2003 (\u0418\u0441\u043f\u0430\u043d\u0438\u044f), 2005 (\u0413\u0440\u0435\u0446\u0438\u044f), 2009 (\u0410\u0432\u0441\u0442\u0440\u0438\u044f) \u0438 2010 (\u0413\u0440\u0435\u0446\u0438\u044f) \u0433\u043e\u0434\u0430\u0445.<\/p>\n<p>\u041e\u0431\u0449\u0438\u0439 \u043e\u0431\u044a\u0435\u043c \u0437\u0430\u043d\u044f\u0442\u0438\u0439 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2 \u043d\u0435\u0434\u0435\u043b\u0438 &#8211; 80 \u0447\u0430\u0441\u043e\u0432 (8 \u0447\u0430\u0441\u043e\u0432 \u0432 \u0434\u0435\u043d\u044c). \u041b\u0435\u043a\u0446\u0438\u0438 \u0447\u0438\u0442\u0430\u044e\u0442 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u043f\u0440\u043e\u0444\u0435\u0441\u0441\u043e\u0440\u0430 \u0438\u0437 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u043e\u0432 \u0415\u0432\u0440\u043e\u043f\u044b, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0438\u0437 \u0410\u0432\u0441\u0442\u0440\u0438\u0438, \u0411\u0435\u043b\u044c\u0433\u0438\u0438, \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438, \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438, \u0413\u0440\u0435\u0446\u0438\u0438, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0442.\u0434.<\/p>\n<p>\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e, \u0420\u043e\u0441\u0441\u0438\u044f \u043d\u0435 \u0443\u0447\u0430\u0441\u0442\u0432\u0443\u0435\u0442 \u043f\u043e\u043b\u043d\u043e\u043f\u0440\u0430\u0432\u043d\u043e \u0432 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043d\u0435 \u0432\u0445\u043e\u0434\u0438\u0442 \u0432 \u0415\u0421. \u041d\u043e \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043c\u043d\u043e\u0433\u043e\u043b\u0435\u0442\u043d\u0438\u043c \u0441\u0432\u044f\u0437\u044f\u043c \u0438 \u0441\u043e\u043f\u0440\u0435\u0434\u0441\u0435\u0434\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0432 \u0440\u0430\u0431\u043e\u0447\u0435\u0439 \u0433\u0440\u0443\u043f\u043f\u0435 \u043f\u043e \u043e\u0431\u0443\u0447\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u041c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u0439 \u0444\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u043e \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (IFIP TC11 WG 11.8) \u0438 \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u043f\u044f\u0442\u044c-\u0448\u0435\u0441\u0442\u044c \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u0447\u0430\u0441\u0442\u0438\u044f \u0432 \u0448\u043a\u043e\u043b\u0435.<\/p>\n<p>\u0423\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 IPICS 2015 \u0434\u043b\u044f \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u041d\u0418\u042f\u0423 \u041c\u0418\u0424\u0418, \u043a\u0430\u043a \u0438 \u0434\u043b\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u0415\u0432\u0440\u043e\u043f\u044b, \u043f\u043b\u0430\u0442\u043d\u043e\u0435:<\/p>\n<ul>\n<li>\u0420\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0439 \u0432\u0437\u043d\u043e\u0441 300 \u0435\u0432\u0440\u043e, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0439 \u043e\u043f\u043b\u0430\u0442\u0443 \u0443\u0447\u0435\u0431\u043d\u044b\u0445 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u043e\u0432, \u043e\u0431\u0435\u0434\u044b \u0438 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u043a\u0443\u043b\u044c\u0442\u0443\u0440\u043d\u043e\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435;<\/li>\n<li>\u041e\u043f\u043b\u0430\u0442\u0430 \u0433\u043e\u0441\u0442\u0438\u043d\u0438\u0446\u044b \u0441 \u0437\u0430\u0432\u0442\u0440\u0430\u043a\u043e\u043c \u043f\u0440\u0438 \u0434\u0432\u0443\u0445\u043c\u0435\u0441\u0442\u043d\u043e\u043c \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u0438 \u2013 25 \u0435\u0432\u0440\u043e \u0432 \u0441\u0443\u0442\u043a\u0438;<\/li>\n<li>\u041f\u0435\u0440\u0435\u043b\u0435\u0442; \u0423\u0436\u0438\u043d\u044b; \u0412\u0438\u0437\u0430; \u041c\u0435\u0434\u0441\u0442\u0440\u0430\u0445\u043e\u0432\u043a\u0430; \u041b\u0438\u0447\u043d\u044b\u0435 \u0440\u0430\u0441\u0445\u043e\u0434\u044b.<\/li>\n<\/ul>\n<p>\u041f\u0440\u0438 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0438 \u043a\u043e\u043d\u043a\u0443\u0440\u0441\u0430 \u0432\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0431\u0443\u0434\u0443\u0442 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0442\u044c\u0441\u044f \u043e\u0431\u0449\u0430\u044f \u0443\u0441\u043f\u0435\u0432\u0430\u0435\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0435\u0442\u0435\u043d\u0434\u0435\u043d\u0442\u043e\u0432, \u043e\u0446\u0435\u043d\u043a\u0438 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u0441\u0435\u0441\u0441\u0438\u044e, \u0432\u043b\u0430\u0434\u0435\u043d\u0438\u0435 \u0430\u043d\u0433\u043b\u0438\u0439\u0441\u043a\u0438\u043c, \u0432\u0435\u0441\u043e\u043c\u0430\u044f \u043c\u043e\u0442\u0438\u0432\u0430\u0446\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0443\u0447\u0430\u0441\u0442\u0438\u044f, \u043e\u0431\u0449\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435.<\/p>\n<p>\u0421\u0440\u043e\u043a \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u043a\u0443\u0440\u0441\u0430 \u2013 \u0441 15 \u044f\u043d\u0432\u0430\u0440\u044f \u043f\u043e 30 \u044f\u043d\u0432\u0430\u0440\u044f 2015 \u0433.<\/p>\n<p>\u0417\u0430\u044f\u0432\u043a\u0438 \u043f\u043e\u0434\u0430\u0432\u0430\u0442\u044c \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u2013 NGMiloslavskaya@mephi.ru.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 IPICS 2015:<\/em><\/strong><\/p>\n<table style=\"height: 1068px;\" width=\"690\">\n<tbody>\n<tr>\n<td width=\"57\">\n<h6><strong>\u00a0<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>SUN<\/strong><\/h6>\n<h6><strong>5\/7\/14<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>MON<\/strong><\/h6>\n<h6><strong>6\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>TUE<\/strong><\/h6>\n<h6><strong>7\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>WED<\/strong><\/h6>\n<h6><strong>8\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>THU<\/strong><\/h6>\n<h6><strong>9\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>FRI<\/strong><\/h6>\n<h6><strong>10\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>SAT<\/strong><\/h6>\n<h6><strong>11\/7\/15<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>9.00 <\/strong><\/h6>\n<h6><strong>&#8211; 10.30<\/strong><\/h6>\n<\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\">\n<h6><strong>Security Culture<\/strong><\/h6>\n<h6><em>Steven Furnell<\/em><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>Risk Management<\/strong><\/h6>\n<h6><em>Spyros Kokolakis\/<\/em><\/h6>\n<h6><em>Maria Karyda<\/em><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Privacy through Cryptology I<\/strong><\/h6>\n<h6><em>Bart Preneel<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Privacy by Design<\/strong><\/h6>\n<h6><em>Lilian Mitrou<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Digital<\/strong><\/h6>\n<h6><strong>forensics and<\/strong><\/h6>\n<h6><strong>Incident<\/strong><\/h6>\n<h6><strong>Response I<\/strong><\/h6>\n<h6><em>Vasilis Katos<\/em><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>Social Event<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>11.00 &#8211; 12.30<\/strong><\/h6>\n<\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\">\n<h6><strong>Privacy\/Security balance and global surveillance<\/strong><\/h6>\n<h6><em>Wills Chris<\/em><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>Business Continuity Planning <\/strong><\/h6>\n<h6><em>Sokratis Katsikas<\/em><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Privacy through Cryptology II<\/strong><\/h6>\n<h6><em>Bart Preneel<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Privacy Enhancing Technologies in Internet: Solutions and Tools<\/strong><\/h6>\n<h6><em>Lilian Mitrou<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Digital<\/strong><\/h6>\n<h6><strong>forensics and<\/strong><\/h6>\n<h6><strong>Incident<\/strong><\/h6>\n<h6><strong>Response II<\/strong><\/h6>\n<h6><em>Vasilis Katos<\/em><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>Social Event<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>14.00 \u2013 15.30<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>\u00a0<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Introduction to Cloud Security and Forensics<\/strong><\/h6>\n<h6><em>Nathan Clarke<\/em><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>Security Economics<\/strong><\/h6>\n<h6><em>Sokratis Katsikas<\/em><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Data Protection in the Cloud<\/strong><\/h6>\n<h6><em>Pierangela Samarati<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Modelling Security and Privacy Requirements<\/strong><\/h6>\n<h6><em>Haralambos Mouratidis<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Case Study of a Cyber Attack in the Banking Sector<\/strong><\/h6>\n<h6><em>Panagiotis Droukas<\/em><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>Social Event<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>16.00 \u2013 17.30<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>\u00a0<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Introduction to Network Security <\/strong><\/h6>\n<h6><em>Natalia Miloslavskaya<\/em><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>Research Ethics<\/strong><\/h6>\n<h6><em>Edgar Weippl<\/em><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Data Protection in the Cloud<\/strong><\/h6>\n<h6><em>Pierangela Samarati<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Privacy Enhancing Technologies<\/strong><\/h6>\n<h6><em>Hans Hedbom<\/em><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Enhancing mobile device security: a management perspective<\/strong><\/h6>\n<h6><em>Panagiotis Droukas<\/em><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>Social Event<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>18.00 \u2013 19.00<\/strong><\/h6>\n<\/td>\n<td width=\"85\"><\/td>\n<td width=\"85\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"95\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"113\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"57\">\n<h6><strong>Social Event<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"57\">\n<h6><strong>19.00 \u2013 21.00<\/strong><\/h6>\n<\/td>\n<td width=\"85\">\n<h6><strong>R<\/strong><strong>egistration<\/strong><strong>&#8211;<\/strong><\/h6>\n<h6><strong>S<\/strong><strong>tudent<\/strong><\/h6>\n<h6><strong>W<\/strong><strong>elcome<\/strong><\/h6>\n<\/td>\n<td width=\"85\"><\/td>\n<td width=\"95\"><\/td>\n<td width=\"85\"><\/td>\n<td width=\"113\"><\/td>\n<td width=\"113\"><\/td>\n<td width=\"57\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"662\">\n<tbody>\n<tr>\n<td width=\"54\">\n<h6><strong>\u00a0<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>SUN<\/strong><\/h6>\n<h6><strong>12\/7\/14<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>MON<\/strong><\/h6>\n<h6><strong>13\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>TUE<\/strong><\/h6>\n<h6><strong>14\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>WED<\/strong><\/h6>\n<h6><strong>15\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>THU<\/strong><\/h6>\n<h6><strong>16\/7\/15<\/strong><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>FRI<\/strong><\/h6>\n<h6><strong>17\/7\/15<\/strong><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">\n<h6><strong>9.00 <\/strong><\/h6>\n<h6><strong>&#8211; 10.30<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>Spare Time<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Identity and Access Management<\/strong><\/h6>\n<h6><em>Kostas Lambrinoudakis<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>WSN Security &amp; Privacy<\/strong><\/h6>\n<h6><em>Javier Lopez<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Mobile authentication mechanisms and attacks \u0399<\/strong><\/h6>\n<h6><em>Theodore Tryfonas\/ Andriotis Petros<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Mobile Networks Security: From 2G to 4G<\/strong><\/h6>\n<h6><em>George Kambourakis<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Offensive Security Lab I<\/strong><\/h6>\n<h6><em>Papageorgiou G.<\/em><\/h6>\n<h6><em>Papamartzivanos D. <\/em><\/h6>\n<h6><em>\u200bTsiatsikas Z.<\/em><\/h6>\n<h6><em>Fakis A.<\/em><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">\n<h6><strong>11.00 &#8211; 12.30<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>Spare Time<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Identity and Access Management<\/strong><\/h6>\n<h6><em>Pernul G\u00fcnther<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>WSN Security &amp; Privacy<\/strong><\/h6>\n<h6><\/h6>\n<h6><em>Javier Lopez<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Mobile authentication mechanisms and attacks \u0399\u0399<\/strong><\/h6>\n<h6><em>Theodore Tryfonas\/ Andriotis Petros<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Forensics analysis of the volatile memory of devices<\/strong><\/h6>\n<h6><em>Christos Xenakis<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong> Offensive Security Lab I<\/strong><\/h6>\n<h6><em>Papageorgiou G.<\/em><\/h6>\n<h6><em>Papamartzivanos D. <\/em><\/h6>\n<h6><em>\u200bTsiatsikas Z.<\/em><\/h6>\n<h6><em>Fakis A.<\/em><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">\n<h6><strong>14.00 \u2013 15.30<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>Spare Time<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Secure Identity and Access Management &#8211; Practical Aspects<\/strong><\/h6>\n<h6><em>Ludwig Fuchs<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Cyber Security and Internet of Things<\/strong><\/h6>\n<h6><em>Konstantinos Markantonakis<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Practical Mobile in Security<\/strong><\/h6>\n<h6><em>Evangelos Reklitis<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Side Channels Attacks and Countermeasure for Mobile Devices &#8211; Part I<\/strong><\/h6>\n<h6><em>Thomas Korak<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Offensive Security Lab I\u0399<\/strong><\/h6>\n<h6><em>Papageorgiou G.<\/em><\/h6>\n<h6><em>Papamartzivanos D. <\/em><\/h6>\n<h6><em>\u200bTsiatsikas Z.<\/em><\/h6>\n<h6><em>Fakis A.<\/em><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">\n<h6><strong>16.00 \u2013 17.30<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>Spare Time<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Privacy and Identity Management<\/strong><\/h6>\n<h6><em>Jaap-Henk Hoepman<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Cyber Security and Internet of Things<\/strong><\/h6>\n<h6><em>Konstantinos Markantonakis<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Smartphone&#8217;s Anatomy: Mobile Device Forensics<\/strong><\/h6>\n<h6><em>Evangelos Reklitis<\/em><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Side Channels Attacks and Countermeasure for Mobile Devices &#8211; Part II<\/strong><\/h6>\n<h6><em>Thomas Korak<\/em><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Offensive Security Lab I\u0399<\/strong><\/h6>\n<h6><em>Papageorgiou G.<\/em><\/h6>\n<h6><em>Papamartzivanos D. <\/em><\/h6>\n<h6><em>\u200bTsiatsikas Z.<\/em><\/h6>\n<h6><em>Fakis A.<\/em><\/h6>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"54\">\n<h6><strong>18.00 \u2013 19.00<\/strong><\/h6>\n<\/td>\n<td width=\"50\">\n<h6><strong>Spare Time<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"104\">\n<h6><strong>Round Table<\/strong><\/h6>\n<\/td>\n<td width=\"123\">\n<h6><strong>IPICS closing<\/strong><\/h6>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0421\u0440\u0435\u0434\u0438 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 4-\u0433\u043e \u043a\u0443\u0440\u0441\u0430 \u043e\u0431\u044a\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u043e\u043d\u043a\u0443\u0440\u0441 \u043d\u0430 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u043b\u0435\u0442\u043d\u0435\u0439 \u0448\u043a\u043e\u043b\u0435 \u0434\u043b\u044f \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u043e\u0432 \u0415\u0421 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c &#8220;\u0415\u0432\u0440\u043e\u043f\u0435\u0439\u0441\u043a\u0430\u044f \u0438\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u0430\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 &#8220;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0438 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439&#8221; (European Intensive Programme on Information and Communication Technologies Security) IPICS2015, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u0441\u0442\u043e\u0438\u0442\u0441\u044f \u0441 6 \u043f\u043e 17 \u0438\u044e\u043b\u044f 2015 \u0433. \u043d\u0430 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 \u043a\u0440\u0430\u0441\u0438\u0432\u0435\u0439\u0448\u0438\u0445 \u043e\u0441\u0442\u0440\u043e\u0432\u043e\u0432 \u0413\u0440\u0435\u0446\u0438\u0438 \u2013 \u041b\u0435\u0441\u0431\u043e\u0441\u0435. \u041b\u0435\u0442\u043d\u0438\u0435 \u0448\u043a\u043e\u043b\u044b IPICS \u043d\u0430\u0447\u0430\u043b\u0438 &#8230; <a title=\"\u041b\u0435\u0442\u043d\u044f\u044f \u0448\u043a\u043e\u043b\u0430 IPICS 2015\" class=\"read-more\" href=\"https:\/\/kaf44.mephi.ru\/?p=849\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/849"}],"collection":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=849"}],"version-history":[{"count":7,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/849\/revisions"}],"predecessor-version":[{"id":856,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/849\/revisions\/856"}],"wp:attachment":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}