posted by organizer: TD || 497 views || tracked by 1 users: [display]

AutonomousCyber 2024 : 1st International Workshop on Autonomous Cybersecurity

FacebookTwitterLinkedInGoogle

Link: https://cybersciencelab.com/workshop-on-autonomous-cybersecurityautocyber/
 
When Oct 18, 2024 - Oct 18, 2024
Where Salt Lake City, U.S.A
Submission Deadline Jul 8, 2024
Notification Due Aug 12, 2024
Final Version Due Aug 30, 2024
Categories    cybersecurity   autonomous cybersecurity   advanced machine learning   autonomous systems
 

Call For Papers

=================================================================
The 1st International Workshop on Autonomous Cybersecurity

In conjunction with the 31st ACM Conference on Computer and Communications Security (ACM CCS 2024)
https://www.sigsac.org/ccs/CCS2024/
18th Oct 2024, Salt Lake City, U.S.A

=================================================================

OVERVIEW
-----------
The integration of advanced Machine Learning (ML) technologies such as Reinforcement Learning (RL) and Quantum Machine Learning (QML) with cybersecurity automation techniques is rapidly transforming the field of cybersecurity. These technologies are being harnessed to develop autonomous systems capable of safeguarding enterprise networks more efficiently. By utilizing such sophisticated ML systems, cybersecurity efforts are becoming more self-sufficient, capable of detecting and responding to threats and adapting to new and evolving challenges without human intervention. This shift is indicative of a broader move towards systems that can autonomously improve and learn from each interaction, thereby enhancing their effectiveness and reliability in real-time threat environments.

In the domain of autonomous cybersecurity, the characteristics of self-improvement, continuous learning, predictive capabilities, and automatic customization stand out as transformative. These systems are designed to evolve continually, learning from new data to enhance their predictive accuracy and tailor their responses to specific network environments and threat scenarios. Such capabilities enable them to anticipate potential threats and adapt their strategies proactively, marking a significant evolution from traditional, reactive cybersecurity measures to proactive, predictive, and adaptive strategies. This development is crucial for addressing cyber threats' sophisticated and rapidly changing nature, thereby minimizing reliance on human intervention and reducing the likelihood of human error in critical security operations.

TOPICS OF INTEREST
--------------------

Workshop-suggested topics include, not exhaustively, empirical and theoretical studies of the following:

• Development of autonomous threat detection and mitigation algorithms.
• Intelligent agents and Human-machine-Teaming (HMT) for proactive cyber defense.
• Development of simulators and environments for testing and validating autonomous cybersecurity systems.
• Architectural innovations in autonomous cyber defense.
• Empirical studies and emerging applications of autonomous systems in cybersecurity.
• Theoretical and practical insights into cognitive models for enhancing threat intelligence.
• Advanced strategies and technologies in autonomous cyber incident response.
• Recent developments on Risk-based Moving Target Defense.
• Breakthroughs in autonomous digital forensics.
• Ethical, technical, and operational aspects of deploying autonomous offensive cybersecurity operations.
• Innovations in continuous compliance monitoring.
• Exploration of autonomous defensive strategies.
• Autonomous conformance checking based on intelligence-based regulatory technology (RegTech).
• Self-learning security systems for IoT devices
• Ethical considerations in autonomous cybersecurity operations
• Evaluating the reliability of autonomous cybersecurity tools
• The role of blockchain in enhancing autonomous cyber defenses
• Integration of blockchain in autonomous security protocols
• Autonomous cybersecurity in critical infrastructure protection
• Development of self-healing systems in cybersecurity
• Privacy concerns with autonomous cybersecurity solutions
• Adaptive cybersecurity frameworks for dynamic environments
• Secure autonomous decision-making under uncertainty
• The impact of quantum computing on autonomous cybersecurity
• Interoperability of autonomous systems across different platforms
• Case studies of successful autonomous cybersecurity implementations

SUBMISSION GUIDELINES
----------------------
We invite the following types of papers:

. Full research papers on any topic in autonomous cybersecurity
. Position, new ideas, and emerging problems papers discussing emerging and upcoming issues in the broader area of autonomous cybersecurity
. SoK papers, systematization-of-knowledge papers, evaluate, systematize, and contextualize existing knowledge in areas related to autonomous cybersecurity.

Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

SUBMISSION LINK:
https://autocyber24.hotcrp.com/


COMMITTEE
----------

Workshop Chairs
. Ali Dehghantanha, University of Guelph, ON, Canada
. Reza M. Parizi, Kennesaw State University, USA
. Gregory Epiphaniou, University of Warwick, UK

Publication Chair
. Abbas Yazdinejad, University of Guelph, ON, Canada

Publicity Chair
. Tooska Dargahi, Manchester Metropolitan University, UK

Related Resources

ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
FLAIRS 2025   Florida Artificial Intelligence Research Society
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
AAMAS - 2025   The 24th International Conference on Autonomous Agents and Multiagent Systems
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICITA 2025   19th International Conference on Information Technology and Applications
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3