SlideShare a Scribd company logo
1 of 3
Download to read offline
2333-942X/16©2016IEEE 	 July 2016 IEEE Systems, Man, & Cybernetics Magazine	 11
©iStockphoto.com/llan1974
background—all-free-download.com
s the new chair of the Technical Committee on
Homeland Security (TCHS) of the IEEE Sys-
tems, Man, and Cybernetics Society (SMCS), I
am called upon to explain my ideas and
future plans.
Since its birth, the IEEE SMC TCHS has aimed to pro-
mote and guide information systems, algorithms, and
database research of relevance to international and
national security by
◆◆ organizing special paper sessions relating to homeland
security research in well reputed conferences
◆◆ conducting annual TCHS meetings during annual
IEEE SMC conferences
◆◆ collaborating with other professional societies to pro-
mote security-related research
◆◆ collaborating with funding agencies to develop home-
land-security-related research programs and engage in
research projects
◆◆ collaborating with government agencies, industrial
partners, and media to sponsor and organize home-
land-security-related meetings, engage in policy
Technical
Committee
Reports
The Future of Homeland Security
Digital Object Identifier 10.1109/MSMC.2016.2563560
Date of publication: 24 August 2016
By Francesco Flammini
A
12	 IEEE Systems, Man, & Cybernetics Magazine July 2016	
discussions, and facilitate training, education, and
outreach programs.
The TCHS activities performed so far include
◆◆ publishing several edited books and a research mono-
graph on intelligence and security informatics with
Springer and Elsevier
◆◆ editing more than five journal special issues on securi-
ty informatics and surveillance
◆◆ organizing more than ten conferences, workshops, and
special sessions on topics related to homeland security.
Currently, the TCHS has nine members, but this number
is going to grow in the near future. It is among the objec-
tives of the current leadership to enroll new members
strongly interested in topics related to homeland security
and critical infrastructure (CI) protection, coming from
both the academic and industrial worlds, who are willing to
actively contribute their ideas and proposals to the TCHS
activities. Since homeland security is a highly cross-­
discipline and cross-country sector, technical and geo-
graphical diversity will be an added value for the TCHS.
We have tried to sketch a reference list of current hot
topics in homeland security and CI research. The list
includes (but it is not limited to)
◆◆ convergence between cybersecurity and physical security
◆◆ integrated, holistic, and cohesive approaches to safety
and security design, evaluation, and testing
◆◆ physical security information management systems
◆◆ cybersecurity of industrial control systems
◆◆ CI resilience models, metrics, and indicators
◆◆ intelligent multimedia surveillance (multimodal
approaches and audio-video analytics)
◆◆ emerging cloud computing and Internet of Things
security issues in CI
◆◆ sensor networks and smart devices for security
◆◆ threat, vulnerability, and risk assessment for CI
◆◆ interdependency analysis of CI as cyberphysical sys-
tems-of-systems
◆◆ socioeconomic, procedural, privacy-related, and
human factors in CI
◆◆ advanced sensing and detecting technologies for CI
◆◆ attack/penetration testing and other simulation tech-
niques for CI security evaluation
◆◆ CI intrusion detection and prevention systems
◆◆ CI business continuity, contingency planning, incident
response, and emergency and crisis management
◆◆ applications, case-studies, and industrial experience
reports in CI domains, including smart-cities and
smart-transportation.
These will be the tentative topics that will be included in a
special issue of IEEE Transactions on Systems, Man,
and Cybernetics, which we are organizing with the sup-
port of the editor-in-chief.
It is clear that, due to the highly heterogeneous sector,
a comprehensive list of topics is very difficult to sketch,
and the current topics are rapidly evolving or being spe-
cialized as new technologies are introduced and new
threats are discovered. The complexity, due to systems
size, distribution, and heterogeneity, is, at the same time,
I would like to thank the former TCHS chair Prof. Daniel
Zeng (University of Arizona, United States) and SMC
VP Prof. Rodney Roberts (Florida State University, United
States) for their great support.Allow me to introduce the
new TCHS leadership:
◆◆ Francesco Flammini, Ansaldo STS (Naples, Italy),
chair
◆◆ Qiudan Li, Chinese Academy of Sciences (Beijing,
China), cochair
◆◆ Justin Zhan, University of Nevada (Las Vegas,
Nevada, United States), cochair
◆◆ Chris Yang, Drexel University (Philadelphia,
Pennsylvania, United States), cochair
As you can see, the TCHS chairs represent three
different continents (Europe, Asia, and North America),
and this is a first sign demonstrating the global
importance of the topics related to homeland security
and the joint efforts that are being carried out all over
the world to protect the citizens and the environment
from large scale threat scenarios.
TCHS Leadership
July 2016 IEEE Systems, Man, & Cybernetics Magazine	 13
an obstacle and a stimulating challenge for future
research and engineering initiatives.
Personally, I believe that, from a methodological view-
point, many areas related to design-for-security and
model-­driven engineering still need to be explored in
their multifaceted possibilities, currently representing
only a re­­search niche. The same holds for formal, stochas-
tic, and multiparadigm modeling used to address complex-
ity and uncertainty by divide et impera, modular,
compositional, multilevel, and hierarchical approaches.
From the technology viewpoint, rapidly evolving arti-
ficial vision and hearing algorithms pave the way to new
scenarios in which they are increasingly integrated, e.g.,
in wireless sensor networks and drone surveillance.
A vision of the future of homeland security cannot
ignore the political strategy to find a balance between
surveillance technologies and social issues, also address-
ing ergonomics, privacy norms, and laws, as well as
appropriate procedures and regulations. The relevance of
those issues is regularly witnessed by the never-ending
discussions on closed circuit television boundaries and,
more recently, body scanners using millimeter waves or
terahertz cameras, not to mention the futuristic and
sometimes visionary evolutions of biometric identifica-
tion, like DNA-based people recognition and tracking.
Whatever the future of homeland security will look like,
computer science and engineering will continue to play a
central role, enabling new paradigms in intelligent moni-
toring through big-data, information fusion, early warning,
and automatic situation assessment. This will be the sub-
ject of an IEEE lecture (e-learning tutorial), “Threat Detec-
tion and Modeling,” which is among the first achievements
planned for my mandate.
Please do not hesitate to contact me at francesco.­
flammini@ieee.org should you have any suggestions, if you
need further clarifications, and particularly if you want to
apply as a new TCHS member (please attach your curricu-
lum vitae and a short letter of ­motivation).
About the Author
Francesco Flammini (francesco.flammini@ieee.org)
earned his Ph.D. degree in computer and control systems
engineering at the University of Naples Federico II, Italy. He is
an IEEE Senior Member and chair of the IEEE Systems, Man,
and Cybernetics Technical Committee on Homeland Security.
References
[1] IEEE SMC TCHS. [Online]. Available: http://www.ieeesmc.org/technical-activities/
systems-science-and-engineering/homeland-security
[2] F. Flammini, R. Setola, and G. Franceschetti, Effective Surveillance for
Homeland Security: Balancing Technology and Social Issues. Boca Raton,
FL: CRC, 2013.
[3] F. Flammini, Critical Infrastructure Security: Assessment, Prevention, Detec-
tion, Response. Southampton, U.K.: Wessex Institute of Technology Press, 2012, 1–326.
[4] European Commission Horizon 2020. Secure societies—Protecting freedom
and security of Europe and its citizens. [Online]. Available: https://ec.europa.eu/
programmes/horizon2020/en/h2020-section/secure-societies-%E2%80%93-protecting-
freedom-and-security-europe-and-its-citizens

More Related Content

What's hot

Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDPacificResearchPlatform
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-ispictseserv
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Pluribus One
 
InfraRisk Brochure
InfraRisk BrochureInfraRisk Brochure
InfraRisk BrochureInfra Risk
 
Internet Security for Beginners
Internet Security for Beginners Internet Security for Beginners
Internet Security for Beginners chee wai wong
 
ICMLDA_poster.doc
ICMLDA_poster.docICMLDA_poster.doc
ICMLDA_poster.docbutest
 
Knowledge mining and Semantic Models: from Cloud to Smart City
Knowledge mining and Semantic Models: from Cloud to Smart CityKnowledge mining and Semantic Models: from Cloud to Smart City
Knowledge mining and Semantic Models: from Cloud to Smart CityPaolo Nesi
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIJNSA Journal
 

What's hot (17)

Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhD
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp0 110211-cluster-panel-inter-isp
0 110211-cluster-panel-inter-isp
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
InfraRisk Brochure
InfraRisk BrochureInfraRisk Brochure
InfraRisk Brochure
 
Internet Security for Beginners
Internet Security for Beginners Internet Security for Beginners
Internet Security for Beginners
 
ICMLDA_poster.doc
ICMLDA_poster.docICMLDA_poster.doc
ICMLDA_poster.doc
 
Alloy Cybersecurity
Alloy CybersecurityAlloy Cybersecurity
Alloy Cybersecurity
 
Istanbul issep2014
Istanbul issep2014Istanbul issep2014
Istanbul issep2014
 
Tdowling
TdowlingTdowling
Tdowling
 
Knowledge mining and Semantic Models: from Cloud to Smart City
Knowledge mining and Semantic Models: from Cloud to Smart CityKnowledge mining and Semantic Models: from Cloud to Smart City
Knowledge mining and Semantic Models: from Cloud to Smart City
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDYIOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
IOT AND SECURITY-PRIVACY CONCERNS: A SYSTEMATIC MAPPING STUDY
 

Viewers also liked

Viewers also liked (13)

ONLINE ASSIGNMENT
ONLINE ASSIGNMENTONLINE ASSIGNMENT
ONLINE ASSIGNMENT
 
Issam el hadri natural disaster
Issam el hadri natural disasterIssam el hadri natural disaster
Issam el hadri natural disaster
 
PrimoSoccorso
PrimoSoccorsoPrimoSoccorso
PrimoSoccorso
 
pSHIELD_ASTS_FINAL
pSHIELD_ASTS_FINALpSHIELD_ASTS_FINAL
pSHIELD_ASTS_FINAL
 
EWSN2015
EWSN2015EWSN2015
EWSN2015
 
Ed Sanford LinkedIn Resume
Ed Sanford LinkedIn ResumeEd Sanford LinkedIn Resume
Ed Sanford LinkedIn Resume
 
LESSON PLAN
LESSON PLANLESSON PLAN
LESSON PLAN
 
pSHIELD AnsaldoSTS
pSHIELD AnsaldoSTSpSHIELD AnsaldoSTS
pSHIELD AnsaldoSTS
 
Festival se chok
Festival se chokFestival se chok
Festival se chok
 
ಪ್ರವಾದಿ [ಸ] ವಚನ ಸದ್ವರ್ತನೆ ತೋರುವವರು
ಪ್ರವಾದಿ [ಸ] ವಚನ   ಸದ್ವರ್ತನೆ ತೋರುವವರುಪ್ರವಾದಿ [ಸ] ವಚನ   ಸದ್ವರ್ತನೆ ತೋರುವವರು
ಪ್ರವಾದಿ [ಸ] ವಚನ ಸದ್ವರ್ತನೆ ತೋರುವವರು
 
fabrizio1998
fabrizio1998fabrizio1998
fabrizio1998
 
ESREL 2008
ESREL 2008ESREL 2008
ESREL 2008
 
SEO Impact Analysis Presentation
SEO Impact Analysis PresentationSEO Impact Analysis Presentation
SEO Impact Analysis Presentation
 

Similar to IEEE-SMC-TCHS 2016

Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxcockekeshia
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Fred Kautz
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureJerome Glenn
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdfMahdi_Fahmideh
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub OverviewIoTUK
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Lilminow
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu
 

Similar to IEEE-SMC-TCHS 2016 (20)

Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
NISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
NISO — Cutting Edges with Company: Emerging Technologies as a Collective EffortNISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
NISO — Cutting Edges with Company: Emerging Technologies as a Collective Effort
 
Final Anderson Cutting Edges with Company
Final Anderson Cutting Edges with CompanyFinal Anderson Cutting Edges with Company
Final Anderson Cutting Edges with Company
 
Andrei Patrascu support letter
Andrei Patrascu support letterAndrei Patrascu support letter
Andrei Patrascu support letter
 

More from Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfFrancesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfFrancesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfFrancesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateFrancesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyFrancesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingFrancesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiFrancesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNUFrancesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual couplingFrancesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietyFrancesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560Francesco Flammini
 
Master ETICAS Francesco Flammini
Master ETICAS Francesco FlamminiMaster ETICAS Francesco Flammini
Master ETICAS Francesco FlamminiFrancesco Flammini
 

More from Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 
Master ETICAS Francesco Flammini
Master ETICAS Francesco FlamminiMaster ETICAS Francesco Flammini
Master ETICAS Francesco Flammini
 

IEEE-SMC-TCHS 2016

  • 1. 2333-942X/16©2016IEEE July 2016 IEEE Systems, Man, & Cybernetics Magazine 11 ©iStockphoto.com/llan1974 background—all-free-download.com s the new chair of the Technical Committee on Homeland Security (TCHS) of the IEEE Sys- tems, Man, and Cybernetics Society (SMCS), I am called upon to explain my ideas and future plans. Since its birth, the IEEE SMC TCHS has aimed to pro- mote and guide information systems, algorithms, and database research of relevance to international and national security by ◆◆ organizing special paper sessions relating to homeland security research in well reputed conferences ◆◆ conducting annual TCHS meetings during annual IEEE SMC conferences ◆◆ collaborating with other professional societies to pro- mote security-related research ◆◆ collaborating with funding agencies to develop home- land-security-related research programs and engage in research projects ◆◆ collaborating with government agencies, industrial partners, and media to sponsor and organize home- land-security-related meetings, engage in policy Technical Committee Reports The Future of Homeland Security Digital Object Identifier 10.1109/MSMC.2016.2563560 Date of publication: 24 August 2016 By Francesco Flammini A
  • 2. 12 IEEE Systems, Man, & Cybernetics Magazine July 2016 discussions, and facilitate training, education, and outreach programs. The TCHS activities performed so far include ◆◆ publishing several edited books and a research mono- graph on intelligence and security informatics with Springer and Elsevier ◆◆ editing more than five journal special issues on securi- ty informatics and surveillance ◆◆ organizing more than ten conferences, workshops, and special sessions on topics related to homeland security. Currently, the TCHS has nine members, but this number is going to grow in the near future. It is among the objec- tives of the current leadership to enroll new members strongly interested in topics related to homeland security and critical infrastructure (CI) protection, coming from both the academic and industrial worlds, who are willing to actively contribute their ideas and proposals to the TCHS activities. Since homeland security is a highly cross-­ discipline and cross-country sector, technical and geo- graphical diversity will be an added value for the TCHS. We have tried to sketch a reference list of current hot topics in homeland security and CI research. The list includes (but it is not limited to) ◆◆ convergence between cybersecurity and physical security ◆◆ integrated, holistic, and cohesive approaches to safety and security design, evaluation, and testing ◆◆ physical security information management systems ◆◆ cybersecurity of industrial control systems ◆◆ CI resilience models, metrics, and indicators ◆◆ intelligent multimedia surveillance (multimodal approaches and audio-video analytics) ◆◆ emerging cloud computing and Internet of Things security issues in CI ◆◆ sensor networks and smart devices for security ◆◆ threat, vulnerability, and risk assessment for CI ◆◆ interdependency analysis of CI as cyberphysical sys- tems-of-systems ◆◆ socioeconomic, procedural, privacy-related, and human factors in CI ◆◆ advanced sensing and detecting technologies for CI ◆◆ attack/penetration testing and other simulation tech- niques for CI security evaluation ◆◆ CI intrusion detection and prevention systems ◆◆ CI business continuity, contingency planning, incident response, and emergency and crisis management ◆◆ applications, case-studies, and industrial experience reports in CI domains, including smart-cities and smart-transportation. These will be the tentative topics that will be included in a special issue of IEEE Transactions on Systems, Man, and Cybernetics, which we are organizing with the sup- port of the editor-in-chief. It is clear that, due to the highly heterogeneous sector, a comprehensive list of topics is very difficult to sketch, and the current topics are rapidly evolving or being spe- cialized as new technologies are introduced and new threats are discovered. The complexity, due to systems size, distribution, and heterogeneity, is, at the same time, I would like to thank the former TCHS chair Prof. Daniel Zeng (University of Arizona, United States) and SMC VP Prof. Rodney Roberts (Florida State University, United States) for their great support.Allow me to introduce the new TCHS leadership: ◆◆ Francesco Flammini, Ansaldo STS (Naples, Italy), chair ◆◆ Qiudan Li, Chinese Academy of Sciences (Beijing, China), cochair ◆◆ Justin Zhan, University of Nevada (Las Vegas, Nevada, United States), cochair ◆◆ Chris Yang, Drexel University (Philadelphia, Pennsylvania, United States), cochair As you can see, the TCHS chairs represent three different continents (Europe, Asia, and North America), and this is a first sign demonstrating the global importance of the topics related to homeland security and the joint efforts that are being carried out all over the world to protect the citizens and the environment from large scale threat scenarios. TCHS Leadership
  • 3. July 2016 IEEE Systems, Man, & Cybernetics Magazine 13 an obstacle and a stimulating challenge for future research and engineering initiatives. Personally, I believe that, from a methodological view- point, many areas related to design-for-security and model-­driven engineering still need to be explored in their multifaceted possibilities, currently representing only a re­­search niche. The same holds for formal, stochas- tic, and multiparadigm modeling used to address complex- ity and uncertainty by divide et impera, modular, compositional, multilevel, and hierarchical approaches. From the technology viewpoint, rapidly evolving arti- ficial vision and hearing algorithms pave the way to new scenarios in which they are increasingly integrated, e.g., in wireless sensor networks and drone surveillance. A vision of the future of homeland security cannot ignore the political strategy to find a balance between surveillance technologies and social issues, also address- ing ergonomics, privacy norms, and laws, as well as appropriate procedures and regulations. The relevance of those issues is regularly witnessed by the never-ending discussions on closed circuit television boundaries and, more recently, body scanners using millimeter waves or terahertz cameras, not to mention the futuristic and sometimes visionary evolutions of biometric identifica- tion, like DNA-based people recognition and tracking. Whatever the future of homeland security will look like, computer science and engineering will continue to play a central role, enabling new paradigms in intelligent moni- toring through big-data, information fusion, early warning, and automatic situation assessment. This will be the sub- ject of an IEEE lecture (e-learning tutorial), “Threat Detec- tion and Modeling,” which is among the first achievements planned for my mandate. Please do not hesitate to contact me at francesco.­ flammini@ieee.org should you have any suggestions, if you need further clarifications, and particularly if you want to apply as a new TCHS member (please attach your curricu- lum vitae and a short letter of ­motivation). About the Author Francesco Flammini (francesco.flammini@ieee.org) earned his Ph.D. degree in computer and control systems engineering at the University of Naples Federico II, Italy. He is an IEEE Senior Member and chair of the IEEE Systems, Man, and Cybernetics Technical Committee on Homeland Security. References [1] IEEE SMC TCHS. [Online]. Available: http://www.ieeesmc.org/technical-activities/ systems-science-and-engineering/homeland-security [2] F. Flammini, R. Setola, and G. Franceschetti, Effective Surveillance for Homeland Security: Balancing Technology and Social Issues. Boca Raton, FL: CRC, 2013. [3] F. Flammini, Critical Infrastructure Security: Assessment, Prevention, Detec- tion, Response. Southampton, U.K.: Wessex Institute of Technology Press, 2012, 1–326. [4] European Commission Horizon 2020. Secure societies—Protecting freedom and security of Europe and its citizens. [Online]. Available: https://ec.europa.eu/ programmes/horizon2020/en/h2020-section/secure-societies-%E2%80%93-protecting- freedom-and-security-europe-and-its-citizens