BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SECURITY &amp; APPLIED LOGIC - ECPv6.15.9//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:SECURITY &amp; APPLIED LOGIC
X-ORIGINAL-URL:https://sal.cs.unibuc.ro
X-WR-CALDESC:Events for SECURITY &amp; APPLIED LOGIC
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Bucharest
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20231029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20240331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20241027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0200
TZOFFSETTO:+0300
TZNAME:EEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0300
TZOFFSETTO:+0200
TZNAME:EET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20210325T100000
DTEND;TZID=Europe/Bucharest:20210325T120000
DTSTAMP:20260404T221100
CREATED:20210322T160836Z
LAST-MODIFIED:20210323T090618Z
UID:697-1616666400-1616673600@sal.cs.unibuc.ro
SUMMARY:Regular matching problems for infinite trees
DESCRIPTION:Title: Regular matching problems for infinite trees \nSpeaker: Mircea Marin (West University of Timișoara) \n\nAbstract:  \nWe study the matching problem “∃σ:σ(L)⊆R?” where L and R are regular tree languages over finite ranked alphabets X and Σ respectively\, and σ is a substitution such that σ(x) is a set of trees in T(Σ∪H)∖H for all x∈X. Here\, H denotes a set of holes which are used to define a concatenation of trees. Conway studied this problem in the special case for languages of finite words in his classical textbook Regular algebra and finite machines and showed that if L and R are regular\, then the problem “∃σ:∀x∈X:σ(x)≠∅∧σ(L)⊆R?” is decidable. Moreover\, there are only finitely many maximal solutions\, which are regular and effectively computable. We extend Conway’s results when L and R are regular languages of finite and infinite trees\, and language substitution is applied inside-out. We show that if L⊆T(X) and R⊆T(Σ) are regular tree languages then the problem “∃σ∀x∈X:σ(x)≠∅∧σio(L)⊆R?” is decidable. Moreover\, there are only finitely many maximal solutions\, which are regular and effectively computable. The corresponding question for the outside-in extension σoi remains open\, even in the restricted setting of finite trees. Our main result is the decidability of “∃σ:σio(L)⊆R?” if R is regular and L belongs to a class of tree languages closed under intersection with regular sets. Such a special case pops up if L is context-free.\nThis is joint work with Carlos Camino\, Volker Diekert\, Besik Dundua and Géraud Sénizergues. \n\nReferences: \n[1] C. Camino\, V. Diekert\, B. Dundua\, M. Marin\, G. Sénizergues\, Regular matching problems for infinite trees. arXiv:2004.09926 [cs.FL]\, 2021.
URL:https://sal.cs.unibuc.ro/event/regular-matching-problems-for-infinite-trees/
CATEGORIES:Logic Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20210401T100000
DTEND;TZID=Europe/Bucharest:20210401T120000
DTSTAMP:20260404T221100
CREATED:20210329T200608Z
LAST-MODIFIED:20210329T200608Z
UID:701-1617271200-1617278400@sal.cs.unibuc.ro
SUMMARY:An Introduction to Protocols in Dynamic Epistemic Logic
DESCRIPTION:Title: An Introduction to Protocols in Dynamic Epistemic Logic \nSpeaker: Alexandru Dragomir (University of Bucharest) \n\nAbstract:  \nDynamic epistemic logics are useful in reasoning about knowledge and acts of learning\, seen as epistemic actions. However\, not all epistemic actions are allowed to be executed in an initial epistemic model\, and this is where the concept of a protocol comes in: a protocol stipulates what epistemic actions are allowed to be performed in a model. The aim of my presentation is to introduce the audience to two accounts of protocols in DEL: Hoshi’s [1]\, and Wang’s [2]. \n\nReferences: \n[1] T. Hoshi\, Epistemic dynamics and protocol information. PhD thesis\, Stanford\, CA\, USA\, 2009.\n[2] Y. Wang\, Epistemic Modelling and Protocol Dynamics. PhD thesis\, University of Amsterdam\, 2010.
URL:https://sal.cs.unibuc.ro/event/an-introduction-to-protocols-in-dynamic-epistemic-logic/
CATEGORIES:Logic Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20210422T100000
DTEND;TZID=Europe/Bucharest:20210422T120000
DTSTAMP:20260404T221100
CREATED:20210421T165207Z
LAST-MODIFIED:20210421T165207Z
UID:706-1619085600-1619092800@sal.cs.unibuc.ro
SUMMARY:Kernelization\, Proof Complexity and Social Choice
DESCRIPTION:Title: Kernelization\, Proof Complexity and Social Choice \nSpeaker: Gabriel Istrate (West University of Timișoara) \n\nAbstract:  \n\nWe display an application of the notions of kernelization and data reduction from parameterized complexity to proof complexity: Specifically\, we show that the existence of data reduction rules for a parameterized problem having (a) a small-length reduction chain\, and (b) small-size (extended) Frege proofs certifying the soundness of reduction steps implies the existence of subexponential size (extended) Frege proofs for propositional formalizations of the given problem. We apply our result to infer the existence of subexponential Frege and extended Frege proofs for a variety of problems. Improving earlier results of Aisenberg et al. (ICALP 2015)\, we show that propositional formulas expressing (a stronger form of) the Kneser-Lovasz Theorem have polynomial size Frege proofs for each constant value of the parameter k. Previously only quasipolynomial bounds were known (and only for the ordinary Kneser-Lovasz Theorem). Another notable application of our framework is to impossibility results in computational social choice: we show that\, for any fixed number of agents\, propositional translations of the Arrow and Gibbard-Satterthwaite impossibility theorems have subexponential size Frege proofs. \nThis is joint work with Cosmin Bonchiș and Adrian Crăciun.
URL:https://sal.cs.unibuc.ro/event/kernelization-proof-complexity-and-social-choice/
CATEGORIES:Logic Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20210526T160000
DTEND;TZID=Europe/Bucharest:20210526T200000
DTSTAMP:20260404T221100
CREATED:20210524T095358Z
LAST-MODIFIED:20260330T131625Z
UID:709-1622044800-1622059200@sal.cs.unibuc.ro
SUMMARY:Active Defense in Cybersecurity
DESCRIPTION:Title: Active Defense in Cybersecurity \nSpeaker: Sergiu Bogdan Meseșan & Andreea Drugă\, Cybersecurity Specialists at ENEA \n\nAgenda: \n\nActive Defense Mechanisms – Notions\, principles and Active Defense mechanisms (ca.1h)\n\n\nPractical Application for Honeypot Analytics and Attacks Data Collection – Presentation of a platform implemented by ENEA specially for this lecture\, a practical demo of Active Defense (ca.1h)\n\n\nActive Defense DIY – Workshop installation\, running\, Internet access for a Honeypot type VM using an open source platform (Telekom Tpot CE) (ca.1h-1.5h)\n\nFor the students interested to attend the meeting: please contact Ruxandra Olimid (ruxandra.olimid@fmi.unibuc.ro)
URL:https://sal.cs.unibuc.ro/event/active-defense-in-cybersecurity/
LOCATION:online (via Teams)
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20260306T090000
DTEND;TZID=Europe/Bucharest:20260306T100000
DTSTAMP:20260404T221100
CREATED:20260301T192338Z
LAST-MODIFIED:20260301T192830Z
UID:831-1772787600-1772791200@sal.cs.unibuc.ro
SUMMARY:Introduction in Quantum Computing
DESCRIPTION:Title: Introduction in Quantum Computing \nSpeaker: Mihai Prunescu (UB) \n\nAbstract: Basing QC notions are presented: superposition\, wave-function and probability\, qubit\, independence\, entanglement.
URL:https://sal.cs.unibuc.ro/event/introduction-in-quantum-computing/
LOCATION:Facultatea de Matematica si Informatica\, sala S.211
CATEGORIES:Cryptography Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20260327T090000
DTEND;TZID=Europe/Bucharest:20260327T100000
DTSTAMP:20260404T221100
CREATED:20260319T004531Z
LAST-MODIFIED:20260319T004531Z
UID:835-1774602000-1774605600@sal.cs.unibuc.ro
SUMMARY:Introduction in Quantum Computing (II)
DESCRIPTION:Title: Introduction in Quantum Computing (II) \nSpeaker: Mihai Prunescu (UB) \n\nAbstract: We continue the discussion on QC.
URL:https://sal.cs.unibuc.ro/event/introduction-in-quantum-computing-ii/
LOCATION:Facultatea de Matematica si Informatica\, sala S.213
CATEGORIES:Cryptography Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20260402T140000
DTEND;TZID=Europe/Bucharest:20260402T160000
DTSTAMP:20260404T221100
CREATED:20260319T005106Z
LAST-MODIFIED:20260319T010415Z
UID:839-1775138400-1775145600@sal.cs.unibuc.ro
SUMMARY:Cybersecurity of Industrial Control Systems
DESCRIPTION:Title: Cybersecurity of Industrial Control Systems \nSpeaker: Stéphane Mocanu (INRIA) \n\nAbstract: In this talk\, we discuss the state of the art of industrial control systems cybersecurity. Based on classical events\, we analyse the typical threats and the vulnerabilities that they exploit. In the second part of the talk\, we present the security architectures and security practices as recommended by international standards (ISO 27000\, IEC 62443) and NIST Cybersecurity Framework).
URL:https://sal.cs.unibuc.ro/event/cybersecurity-of-industrial-control-systems/
LOCATION:503 PBT
CATEGORIES:Cryptography Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Bucharest:20260403T090000
DTEND;TZID=Europe/Bucharest:20260403T100000
DTSTAMP:20260404T221100
CREATED:20260402T101227Z
LAST-MODIFIED:20260402T101350Z
UID:852-1775206800-1775210400@sal.cs.unibuc.ro
SUMMARY:Introduction in Quantum Computing (III)
DESCRIPTION:Title: Introduction in Quantum Computing (III) \nSpeaker: Mihai Prunescu (UB) \n\nAbstract: We continue the discussion on QC.
URL:https://sal.cs.unibuc.ro/event/852/
LOCATION:Facultatea de Matematica si Informatica\, sala S.213
CATEGORIES:Cryptography Seminar
END:VEVENT
END:VCALENDAR