ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Post-doc position in the area of “Game-Theory Applications in Digital Privacy, Forensics and Cyber Warfare” - University Putra Malaysia (UPM)

Country/Region : Malaysia

Website : http://fsktm.upm.edu.my/~alid/Available%...

Description

Game-Theory Applications in Digital Privacy, Forensics and Cyber Warfare (Available Funding So Far: 130,825RM)
Research on border of computer security and game-theory attracts a growing number of scholars from various communities (conferences like GameSec is the best place to find them!). The interest in this field results from both intellectual and practical motives. Currently, we are researching on applications of game-theory in privacy, digital forensics, and crime prediction. There are three sub-projects in this research; the first one is employing game-theory to predict potential evidence locations and guide investigators to efficiently investigate heterogeneous cases. Second project uses game-theory to find the equilibrium (balance) between data privacy and investigator data access requests based on a search warrant to guarantee privacy of non-relevant data! And the third project utilizes the game-theory to predict next best criminal movements based on their past strategies and advice best countermoves to the police.
Following are a number of issues which may motive future research in this area:
Need for unified theories. Complexity issues are inherent in game theory and consequently to its application in cyber-security. In addition, the “human” and “learning” ingredients are essential parts of most security games. Unifying these (very different) fields are a deep and fascinating challenge and will be the source for many intriguing problems.
Economics of hacking. Hacking activities are inspired by lots of motivation but as a rule a rational hacker would only attack an environment if and only if it worth it! Providing a very precise and clear modeling of the economics of hacking enlightens our understanding of the hackers decision making process and may assist in predicting their future strategies.
Cyber warfare. Similar to classical wars, cyber wars are actually the battle of strategies but not the tools! Game-theory may have a good potential in modeling and analyzing cyber warfare and assist cyber warriors in choosing the most efficient strategies.
Applicants Requirements
Holding Ph.D or near to completion (you need to have your VIVA results- if applicable).
Strong record of publication.
Application Process
Since post-docs are considered as academic staffs, they need to follow employment application process in addition to specific post-doc employment requirements (the process may take few months, so if you are interested apply ASAP):
Finding an academic staff who is willing to support your application (I call him/her supporter) (easiest step)!
Preparing an initial research proposal! The research proposal should be related to your supporter area and supporter should have enough funds for at least one year in that area (getting difficult)!
Your initial proposal along with application documents (C.V, Publications List, Samples of Publications and Research Statement,…) need to be approved in department and faculty level meetings (your supporter should defend your application on your behalf and it may include some (usually online) interview with you as well, we are receiving lots of post-doc requests and faculty may accommodate the best ones only)! Meanwhile, you have to finalize your research proposal! (This is the most difficult step)
Your final research proposal and other application documents would be brought to the university senate meeting for approval (since you have the faculty approval it is not a big issue, but it could be time consuming since you don’t know which senate meeting will look at your application)!
Upon Senate approval your application would be given to H.R to offer you a contract (in cases that I saw, post-doc monthly salaries are something between 5,000RM to 7,000RM and you will get all benefits of normal academic employees). Your contract would be for one year and can be extended for another year as well (the process takes about 1 month).
If you accept the contract, H.R would pass the case to the immigration office to apply for working visa (if you are not Malaysian) and only God knows how long does it take (I have seen cases that got visa in 10 days and some cases in 3 months)!
Upon receiving the visa, you are considered as an official employee of the university! You will get your office,… soon after that and may focus on research now.
Practicing a Plagiarism-free environment: Unfortunately, plagiarism is becoming a serious issue in academic environment and therefore, I am seriously practicing the development of plagiarism-free environment! As such I actively test whatever you send me (proposal, statement, drafts, papers,…) and should I find any case I will further raise it for legal or academic dishonesty punitive actions!
Contact
Address: Room 16- Level 1- Block C- Department of Computer Science- Faculty of Computer Science and Information Technology- University Putra Malaysia- Serdang- 43400- Selangor- Malaysia!
Email: alid-AT-Ffsktm.upm.edu.my
Phone: +60 3 8947 1655
Fax: +60 3 8946 6576

Last modified: 2013-06-02 20:08:46