请输入您要查询的百科知识:

 

词条 Georgios Magklaras
释义

  1. Education

  2. Research and Career

      References  

  3. External links

{{Orphan|date=March 2017}}

Georgios (George) V. Magklaras (born in Agrinio, Greece) (Greek: {{lang|grc|Γεώργιος Μαγκλάρας}}) is a computer scientist working as a Senior Computer Systems Engineer at the University of Oslo, in Norway. He also co-founded Steelcyber Scientific, an information security based consultancy specializing in digital forensics. He is an information security researcher and developed methods in the field of insider IT misuse detection and prediction and digital forensics. He is also an active systems administrator information security consultant and Information Technology practitioner working with High Performance Computing, especially in the fields of Life Sciences and Bioinformatics applications. He has been a strong advocate of Linux, Open Source tools and the Perl programming language and has given a series of lectures internationally in the fields of Intrusion Detection Systems, Digital Forensics, Bioinformatics, Computer Programming and Systems Administration.

Education

Magklaras gained his BSc (Hons) in Computer Systems and Networks from the University of Plymouth, UK, where he graduated in 2000. He was then awarded an EPSRC scholarship to start the study of an MPhil (2005) degree in the area of Information Security, under the Faculty of Technology at the University of Plymouth, UK. Under the supervision of Prof. Steven M. Furnell at the School of Computing, University of Plymouth, UK], he completed his PhD study in the same area (Information Security) in 2012.

Research and Career

His research was initially concerned with ways to classify computer security incident management responses.[1][2] However, his attention was drawn to the problem of misuse detection. Magklaras developed one of the first methods to systematize the misuse detection and misuse prediction techniques.[3] He captured the problem of insider IT misuse [4] and set the theoretical and practical foundations for a generic architecture that facilitates misuse detection and misuse prediction.[5][6][7] As part of this work, he wrote the LUARM tool [8] which is a live/volatile digital forensics engine that targets misuse detection. The LUARM research prototype has already been used with success on a number of notable cases detecting insiders and external computer intrusion attempts, however its main usefulness as a research prototype is to create data sets for researchers to further understand the nature of insider threats. A latter commercial version of the tool has been developed under his supervision by Steelcyber Scientific,[9] an IT consulting firm that focuses on information security and scientific computing. This version contains performance, security and forensic data accuracy improvements over the originally developed LUARM prototype and is suitable for auditing various IT infrastructure components. Further details of the redeveloped LUARM engine are not publicly available.

Magklaras also pioneered the use of Domain Specific Languages in the field of misuse detection and prediction, in order to strengthen the data mining capabilities of information security researchers. His work on the Insider Threat Prediction and Specification Language (ITPSL) forms the only known XML based DSL language that attempts to produce semantics capable of combining techniques that mine and interpret misuse data with tags that provide the likelihood of a misuse threat occurring.[10][11][12]

Magklaras has also been involved in the construction of deep packet inspection infrastructures for several hardware/software vendors, although this work has not been presented on the public domain. However, he has expressed critical views on how the mass media are covering the issue of electronic surveillance and has consulted for the Free Software Foundation on that matter. He has been an infrequent contributor of Black Hat Briefings and has participated (as part of a team) in various computer hacking challenges, including that of the GCHQ challenge in 2011.

In the field of bioinformatics, Magklaras has contributed to the study of biological sequence databases and protein-to-protein interactions by mainly engineering software (algorithms, programming) [13][14][15] to address these tasks. His is also known for his technical work in architectures that address the data storage volume and processing requirements of Next Generation Sequencing machines.[16][17][18]

Prior working at the University of Oslo, Magklaras has worked in various technical and scientific positions for a number of companies and organizations, including those of Sequent Computer Systems, IBM UK and Tiscali. He has held a number of professional affiliations, including those of an IEEE affiliate member, USENIX, SAGE/LOPSA and Red Hat Certified Engineer. He has held the position of Secretary (since 2005) and Chair (2010-2015) of the Technical Management Project Committee of the EMBnet organization.

References

1. ^A Generic Taxonomy for Intrusion Specification and Response, Furnell S., Magklaras G., Papadaki M., Dowland P., Proceedings of Euromedia 2001, Valencia, Spain, 18–20 April 2001.
2. ^Security Vulnerabilities and System Intrusions - The need for Automatic Response Frameworks, Papadaki M., Magklaras G., Furnell S., Alayed A., Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Pages: 87 - 98, Year of Publication: 2001
3. ^{{Cite journal|last=Magklaras|first=George|last2=Furnell|first2=Steven|date=2002-01-01|title=Insider Threat Prediction Tool: Evaluating the probability of IT misuse|url=https://www.researchgate.net/publication/220614801_Insider_Threat_Prediction_Tool_Evaluating_the_probability_of_IT_misuse|journal=Computers & Security|volume=21|pages=62–73|doi=10.1016/S0167-4048(02)00109-8}}
4. ^The Insider Misuse Threat Survey: Investigating IT misuse from legitimate users, Magklaras G., Furnell S, 2004 International Information Warfare Conference, Perth, Australia, 2004.
5. ^An architecture for Insider Misuse Threat Prediction in IT systems, Magklaras G., Master of Philosophy thesis (MPhil), School of Computing, Communications and Electronics, University of Plymouth, UK, January 2005.
6. ^{{Cite journal|last=Magklaras|first=George|last2=Furnell|first2=Steven|date=2005-08-01|title=A preliminary model of end user sophistication for insider threat prediction in IT systems|url=https://www.researchgate.net/publication/220615206_A_preliminary_model_of_end_user_sophistication_for_insider_threat_prediction_in_IT_systems|journal=Computers & Security|volume=24|pages=371–380|doi=10.1016/j.cose.2004.10.003}}
7. ^Book Chapter: Insider Threat Specification as a Threat Mitigation Technique, Advances in Information Security, Vol 49: Title: Insider Threats in Cyber Security, Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.) 2010, XII, 244 p. 40 illus., 20 in color., {{ISBN|978-1-4419-7132-6}}, Hardcover, Springer 2010.
8. ^{{Cite journal|last=Magklaras|first=George|last2=Furnell|first2=Steven|last3=Papadaki|first3=Maria|date=2011-01-01|title=LUARM: An Audit Engine for Insider Misuse Detection.|url=https://www.researchgate.net/publication/220295286_LUARM_An_Audit_Engine_for_Insider_Misuse_Detection|journal=IJDCF|volume=3|pages=37–49}}
9. ^{{Cite web|url=http://www.steelcyber.com/luarm.html|title=Steelcyber Scientific - LUARM|last=Scientific|first=Steelcyber|website=www.steelcyber.com|access-date=2018-05-24}}
10. ^Towards an Insider Threat Prediction Specification Language, Magklaras G., Furnell S., Brooke P. (2006), Information Management & Computer Security, vol. 14, no. 4, pp361-381.
11. ^{{Cite journal|last=Magklaras|first=George|last2=Furnell|first2=Steven|date=2012-07-12|title=The Insider Threat Prediction and Specification Language|url=https://www.researchgate.net/publication/232274826_The_Insider_Threat_Prediction_and_Specification_Language|journal=Proceedings of the 9th International Network Conference, INC 2012}}
12. ^An Insider Misuse Threat Detection and Prediction Language, Magklaras G., PhD Thesis, School of Computing and Mathematics, Faculty of Science and Technology, University of Plymouth, UK, July 2011.
13. ^iRefIndex: A consolidated protein interaction database with provenance, Razick S., Magklaras G., Donaldson I.(2008),BMC Bioinformatics 2008, 9:405 (30 September 2008)
14. ^Superclusteroid: a Web tool dedicated to data processing of protein-protein interaction networks, Ropodi a., Sakkos N., Moschopoulos C., Magklaras G., Kossida S., Research Paper, EMBnet.journal, Vol. 17 No. 2, pages 10 to 15, December 2011.
15. ^Book Chapter:"Physiological Substrates of PKA and PKG", Ruppelt A., Oberprieler N.G., Magklaras G., and Tasken K., Handbook of Cellular Signalling (Eds Ralph Bradshaw and Edward Dennis), Academic Press/Elsevier (2009), {{ISBN|0-12-374145-9}}
16. ^High Throughput Sequencing and the IT architecture Part 1:Volume Dimensioning and Filesystems, Technical Note, Magklaras G., EMBnet news periodical, Volume 15 (Issue 5, pages 51 to 55), March 2010.
17. ^Data storage considerations for HTS platforms, Invited talk given at the EMBRACE next generation sequencing workshop in Rome, November 2009.
18. ^The NGS IT notes, invited talk given at the International Workshops on Bioinformatics - 2012, Center of Genomic Sciences, National Autonomous University of Mexico (UNAM).

External links

  • http://folk.uio.no/georgios
  • https://www.researchgate.net/profile/George_Magklaras
{{authority control}}{{DEFAULTSORT:Magklaras, Georgios}}

4 : Greek computer scientists|Alumni of the University of Plymouth|Living people|Year of birth missing (living people)

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/21 17:59:17