| |||||||||||||||
AutonomousCyber 2024 : 1st International Workshop on Autonomous Cybersecurity | |||||||||||||||
Link: https://cybersciencelab.com/workshop-on-autonomous-cybersecurityautocyber/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
=================================================================
The 1st International Workshop on Autonomous Cybersecurity In conjunction with the 31st ACM Conference on Computer and Communications Security (ACM CCS 2024) https://www.sigsac.org/ccs/CCS2024/ 18th Oct 2024, Salt Lake City, U.S.A ================================================================= OVERVIEW ----------- The integration of advanced Machine Learning (ML) technologies such as Reinforcement Learning (RL) and Quantum Machine Learning (QML) with cybersecurity automation techniques is rapidly transforming the field of cybersecurity. These technologies are being harnessed to develop autonomous systems capable of safeguarding enterprise networks more efficiently. By utilizing such sophisticated ML systems, cybersecurity efforts are becoming more self-sufficient, capable of detecting and responding to threats and adapting to new and evolving challenges without human intervention. This shift is indicative of a broader move towards systems that can autonomously improve and learn from each interaction, thereby enhancing their effectiveness and reliability in real-time threat environments. In the domain of autonomous cybersecurity, the characteristics of self-improvement, continuous learning, predictive capabilities, and automatic customization stand out as transformative. These systems are designed to evolve continually, learning from new data to enhance their predictive accuracy and tailor their responses to specific network environments and threat scenarios. Such capabilities enable them to anticipate potential threats and adapt their strategies proactively, marking a significant evolution from traditional, reactive cybersecurity measures to proactive, predictive, and adaptive strategies. This development is crucial for addressing cyber threats' sophisticated and rapidly changing nature, thereby minimizing reliance on human intervention and reducing the likelihood of human error in critical security operations. TOPICS OF INTEREST -------------------- Workshop-suggested topics include, not exhaustively, empirical and theoretical studies of the following: • Development of autonomous threat detection and mitigation algorithms. • Intelligent agents and Human-machine-Teaming (HMT) for proactive cyber defense. • Development of simulators and environments for testing and validating autonomous cybersecurity systems. • Architectural innovations in autonomous cyber defense. • Empirical studies and emerging applications of autonomous systems in cybersecurity. • Theoretical and practical insights into cognitive models for enhancing threat intelligence. • Advanced strategies and technologies in autonomous cyber incident response. • Recent developments on Risk-based Moving Target Defense. • Breakthroughs in autonomous digital forensics. • Ethical, technical, and operational aspects of deploying autonomous offensive cybersecurity operations. • Innovations in continuous compliance monitoring. • Exploration of autonomous defensive strategies. • Autonomous conformance checking based on intelligence-based regulatory technology (RegTech). • Self-learning security systems for IoT devices • Ethical considerations in autonomous cybersecurity operations • Evaluating the reliability of autonomous cybersecurity tools • The role of blockchain in enhancing autonomous cyber defenses • Integration of blockchain in autonomous security protocols • Autonomous cybersecurity in critical infrastructure protection • Development of self-healing systems in cybersecurity • Privacy concerns with autonomous cybersecurity solutions • Adaptive cybersecurity frameworks for dynamic environments • Secure autonomous decision-making under uncertainty • The impact of quantum computing on autonomous cybersecurity • Interoperability of autonomous systems across different platforms • Case studies of successful autonomous cybersecurity implementations SUBMISSION GUIDELINES ---------------------- We invite the following types of papers: . Full research papers on any topic in autonomous cybersecurity . Position, new ideas, and emerging problems papers discussing emerging and upcoming issues in the broader area of autonomous cybersecurity . SoK papers, systematization-of-knowledge papers, evaluate, systematize, and contextualize existing knowledge in areas related to autonomous cybersecurity. Accepted papers will be published by the ACM Press and/or the ACM Digital Library. SUBMISSION LINK: https://autocyber24.hotcrp.com/ COMMITTEE ---------- Workshop Chairs . Ali Dehghantanha, University of Guelph, ON, Canada . Reza M. Parizi, Kennesaw State University, USA . Gregory Epiphaniou, University of Warwick, UK Publication Chair . Abbas Yazdinejad, University of Guelph, ON, Canada Publicity Chair . Tooska Dargahi, Manchester Metropolitan University, UK |
|