SCADA Statistics Monitoring Using the Elastic Stack (Elasticsearch, Logstash, Kibana)
The Industrial Controls and Safety systems group at CERN, in collaboration with other groups, has developed and currently maintains around 200 controls applications that include domains such as LHC magnet protection, cryogenics and electrical network supervision systems. Millions of value changes and alarms from many devices are archived to a centralised Oracle database but it is not easy to obtain high-level statistics from such an archive.
Dependence Communities in Source Code
The concept of community structure arises from the analysis of social networks in sociology. Community structure can be found in many real world graphs other than social networks. Recently, efficient community detection algorithms have been developed which can cope with very large graphs with millions of nodes and potentially billions of edges. So, for the first time, there is the potential for investigating communities in real industrial-strength software at the statement level.
World Congress on Internet Security 2011
I attended the IEEE World Congress on Internet Security in London this week which is "an international forum dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks." The conference was held near Heathrow Airport, London. The conference was overall very interesting with some interesting people & good talks relating to my area of research, as well as other security topics. Disappointingly there was a low attendance and the conference could have been much better if more people had attended.
My San Francisco Trip
This time last week I arrived back from San Francisco. I had attended the International Conference on Computer Science and Applications which was part of the World Congress on Engineering and Computer Science.
International Conference on Software Engineering 2010
I attended the 32nd International Conference on Software Engineering 2010 from 3rd - 8th May. The conference is a gathering of the world's top software engineers and provides an opportunity to meet and hear talks from many different people. I was able to do some sightseeing around Cape Town before attending the 3 day conference.
An Evaluation of Static Java Bytecode Watermarks
The rise in the use of the Internet and bytecode languages such as Java bytecode and Microsoft's Common Intermediate Language have made copying, decompiling and disassembling software easier. The global revenue loss due to software piracy was estimated to be more than $50 billion in 2008. Watermarking is a technique which attempts to protect software by inserting copyright notices or unique indentifiers into software to prove ownership.
SCAM2009 Presentation - Decompiling Java
Decompilation of Java bytecode is the act of transforming Java bytecode to Java source code. Although easier than that of decompilation of machine code, problems still arise in Java bytecode decompilation.