The Faculty of Computer Science and Media Technology at Gjøvik University College in Gjøvik, Norway, calls for applications to 4 PhD student positions.
Original announcement on HIG site
http://www.nislab.no/jobs
The Norwegian Information Security Laboratory (NISlab) currently consists of fifteen faculty members dedicated to information security and is part of Gjøvik University College, a campus of 2000 students and 230 employees. Faculty members, researchers and graduate students are from a diverse and international background with an excellent faculty to student ratio.
Biometrics
Authentication of individuals based on the biological and behavioural characteristics such as the face, the iris or fingerprints is a promising research domain. Biometric algorithms allow the recognition of individuals in physical or logical access control systems and thus provide an efficient and convenient alternative to knowledge based or token based systems. The Ph.D. candidate will be member of a five staff-member strong Biometrics local group and can participate in an international research project in which he/she can improve research skills and work on interesting research issues. We expect some background in one or more of the following topics:
Digital image processing and enhancements, transformation and filtering, compression and coding Pattern recognition, feature extraction and classification methods, applied statistics and hypothesis tests, data fusion concepts Information security, cryptography and error correcting coding Computational Forensics
Computational Forensics is a primary area of research at the Norwegian Information Security Laboratory. It includes topics such as computer forensics, live incident response, and a broad spectrum of other forensic disciplines that use computer tools for crime prevention, investigation and the enforcement of law. Disciplines of particular interest are questioned document examination, forensic linguistics and forensic psychology.
Intrusion detection
NISlab has recently achieved a major breakthrough in the field of non-indexed search algorithms, applicable in intrusion detection database search. These algorithms are based on constrained edit distance, where the constraints are related to the lengths of series of consecutive deletions and/or insertions of symbols. To further extend research in this field, we need a Ph.D. student that would be engaged in critical phases of both theoretical and practical investigation. The goal is to develop misuse detection database attack signature search algorithms faster than the existing ones. That would enable reliable operation of software-only misuse detection systems even on the fastest networks (like gigabit networks). Today's systems of this kind fail at the speeds of approximately 200 Mbit/s. The Ph.D. student would work on defining the approximate algorithms for constrained edit distance computation based on so-called q-gram distances. Such algorithms would be implemented in both index-based and non-indexed procedures of fault-tolerant search in IDS databases.
Candidates should have background in one or more of the following topics:
Intrusion detection and prevention
Discrete mathematics (graph theory and combinatorics, combinatorial
optimization, search algorithms)
Bioinformatics (edit distance with applications)
Coding theory (synchronization error-correcting codes)
Models for Secure Distributed Computation
Mobile devices are not only resource-constrained but must also typically contend with unreliable and limited bandwidth communication channels. Most current protocols and algorithms for security services as well as the models used in their analysis do not take these conditions into account adequately. The research objective is therefore to develop protocol and computational models as well as efficient algorithms utilizing such models.
Candidates are expected to have a certain mathematical maturity and a background in one or more of the following fields and its applications:
Formal logic, particularly non-standard logic Combinatorics and graph theory In addition, knowledge of network systems, particularly mobile ad-hoc networks and network simulation approaches are beneficial.
Common for all positions
Applicants should hold a Diploma, MSc, or equivalent academic degree, in Electronic Engineering, Computer Science, or related discipline, with previous experience in image processing. Fluency in spoken and written English is also required. We expect some background in one or more of the following topics:
Pattern recognition and computational intelligence (fuzzy logic, artificial neural networks, evolutionary computing, probabilistic reasoning, machine-learning theory), Computer vision (image enhancement, transformations, filtering, wavelet transform, color vision, registration),
Natural language processing.
Successful applicants will be prepared to make novel contributions to the field of and are expected to present and publish in peer-reviewed conferences and journals. Internships at international universities or research institutions can be arranged in the course of the PhD research project.
The position are remunerated according to salary level 43 in the national salary scheme, gross NOK 325 800 per annum, of which 2 % is deducted for the State Pension scheme.
For more information regarding the "Biometrics" position please contact Professor Christoph Busch, christoph.busch@hig.no or +4761135194. For more information regarding the "Computational Forensics" position, please contact Dr. Katrin Franke, email: katrin.franke@hig.no or +4761135254. For more information regarding the position "Intrusion detection" please contact Professor Slobodan Petrovic, slobodan.petrovic@hig.no or +4761135248. For more information regarding the position "Models for Secure Distributed Computation" please contact Professor Stephen D. Wolthusen, stephen.wolthusen@hig.no or +4761135289.
Gjøvik University College use electronic applications processing. We kindly ask our applicants to register the application at: www.hig.no . Then look into our English site, and choose "vacancies".
We also want our applicants to submit a research project description of 2-3 pages, resume, statement of research, copies of transcripts and name and email addresses of three references by post to Gjøvik University College, P. O. Box 191, N-2802 Gjøvik, Norway.
Deadline for applications: 18. April 2008
Send Your application: Click here to send Your application
https://secure.recruiter.no/lists/apply.aspx?
jobID=92077&clientId=1526&lang=EN
03/26/2008
Original announcement on HIG site
http://www.nislab.no/jobs
The Norwegian Information Security Laboratory (NISlab) currently consists of fifteen faculty members dedicated to information security and is part of Gjøvik University College, a campus of 2000 students and 230 employees. Faculty members, researchers and graduate students are from a diverse and international background with an excellent faculty to student ratio.
Biometrics
Authentication of individuals based on the biological and behavioural characteristics such as the face, the iris or fingerprints is a promising research domain. Biometric algorithms allow the recognition of individuals in physical or logical access control systems and thus provide an efficient and convenient alternative to knowledge based or token based systems. The Ph.D. candidate will be member of a five staff-member strong Biometrics local group and can participate in an international research project in which he/she can improve research skills and work on interesting research issues. We expect some background in one or more of the following topics:
Digital image processing and enhancements, transformation and filtering, compression and coding Pattern recognition, feature extraction and classification methods, applied statistics and hypothesis tests, data fusion concepts Information security, cryptography and error correcting coding Computational Forensics
Computational Forensics is a primary area of research at the Norwegian Information Security Laboratory. It includes topics such as computer forensics, live incident response, and a broad spectrum of other forensic disciplines that use computer tools for crime prevention, investigation and the enforcement of law. Disciplines of particular interest are questioned document examination, forensic linguistics and forensic psychology.
Intrusion detection
NISlab has recently achieved a major breakthrough in the field of non-indexed search algorithms, applicable in intrusion detection database search. These algorithms are based on constrained edit distance, where the constraints are related to the lengths of series of consecutive deletions and/or insertions of symbols. To further extend research in this field, we need a Ph.D. student that would be engaged in critical phases of both theoretical and practical investigation. The goal is to develop misuse detection database attack signature search algorithms faster than the existing ones. That would enable reliable operation of software-only misuse detection systems even on the fastest networks (like gigabit networks). Today's systems of this kind fail at the speeds of approximately 200 Mbit/s. The Ph.D. student would work on defining the approximate algorithms for constrained edit distance computation based on so-called q-gram distances. Such algorithms would be implemented in both index-based and non-indexed procedures of fault-tolerant search in IDS databases.
Candidates should have background in one or more of the following topics:
Intrusion detection and prevention
Discrete mathematics (graph theory and combinatorics, combinatorial
optimization, search algorithms)
Bioinformatics (edit distance with applications)
Coding theory (synchronization error-correcting codes)
Models for Secure Distributed Computation
Mobile devices are not only resource-constrained but must also typically contend with unreliable and limited bandwidth communication channels. Most current protocols and algorithms for security services as well as the models used in their analysis do not take these conditions into account adequately. The research objective is therefore to develop protocol and computational models as well as efficient algorithms utilizing such models.
Candidates are expected to have a certain mathematical maturity and a background in one or more of the following fields and its applications:
Formal logic, particularly non-standard logic Combinatorics and graph theory In addition, knowledge of network systems, particularly mobile ad-hoc networks and network simulation approaches are beneficial.
Common for all positions
Applicants should hold a Diploma, MSc, or equivalent academic degree, in Electronic Engineering, Computer Science, or related discipline, with previous experience in image processing. Fluency in spoken and written English is also required. We expect some background in one or more of the following topics:
Pattern recognition and computational intelligence (fuzzy logic, artificial neural networks, evolutionary computing, probabilistic reasoning, machine-learning theory), Computer vision (image enhancement, transformations, filtering, wavelet transform, color vision, registration),
Natural language processing.
Successful applicants will be prepared to make novel contributions to the field of and are expected to present and publish in peer-reviewed conferences and journals. Internships at international universities or research institutions can be arranged in the course of the PhD research project.
The position are remunerated according to salary level 43 in the national salary scheme, gross NOK 325 800 per annum, of which 2 % is deducted for the State Pension scheme.
For more information regarding the "Biometrics" position please contact Professor Christoph Busch, christoph.busch@hig.no or +4761135194. For more information regarding the "Computational Forensics" position, please contact Dr. Katrin Franke, email: katrin.franke@hig.no or +4761135254. For more information regarding the position "Intrusion detection" please contact Professor Slobodan Petrovic, slobodan.petrovic@hig.no or +4761135248. For more information regarding the position "Models for Secure Distributed Computation" please contact Professor Stephen D. Wolthusen, stephen.wolthusen@hig.no or +4761135289.
Gjøvik University College use electronic applications processing. We kindly ask our applicants to register the application at: www.hig.no . Then look into our English site, and choose "vacancies".
We also want our applicants to submit a research project description of 2-3 pages, resume, statement of research, copies of transcripts and name and email addresses of three references by post to Gjøvik University College, P. O. Box 191, N-2802 Gjøvik, Norway.
Deadline for applications: 18. April 2008
Send Your application: Click here to send Your application
https://secure.recruiter.no/lists/apply.aspx?
jobID=92077&clientId=1526&lang=EN
03/26/2008