| |||||||||||||||
BCSN 2015 : Workshop on Bio-inspired Cyber Security & Networking | |||||||||||||||
Link: http://stegano.net/BCSN2015/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Extended submission deadline - May 25, 2015 !
Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015) co-located with 27th International Teletraffic Congress (ITC 2015) Het Pand Ghent, Belgium September 11th, 2015 Workshop website: http://stegano.net/BCSN2015 Submission link: http://edas.info/N20091 IMPORTANT DATES May 25, 2015: Regular Paper Submission June 15, 2015: Notification Date July 1, 2015: Camera-Ready Paper Deadline OVERVIEW Nature is probably the most amazing and recognized invention machine on Earth. Its ability to address complex and large-scale problems has been developed after many years of selection, genetic drift and mutations. As a result, it is not surprising that natural systems continue to inspire inventors and researchers. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, which take form of swarm intelligence, artificial immune systems, sensor networks, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects to protect a group or a single organism. Those abilities have great possibility to improve the area of security and network. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of bio-inspired security and networking. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to: - Bio-inspired security and networking algorithms & technologies - Moving-target techniques - Bio-inspired anomaly & intrusion detection - Adaptation algorithms - Biometrics - Biomimetics - Artificial Immune Systems - Adaptive and Evolvable Systems - Machine Learning, neural networks, genetic algorithms for cyber security & networking - Prediction techniques - Expert systems - Cognitive systems - Sensor networks - Information hiding solutions (steganography, watermarking) for network traffic - Cooperative defense systems - Theoretical development in heuristics - Management of decentralized networks - Bio-inspired algorithms for dependable networks SUBMISSIONS AND REGISTRATION Submissions are limited to 6 pages 2-column IEEE conference style with minimal font size of 10 pt. Papers will appear in the conference proceedings and will be available on IEEE Xplore. Submissions are handled through the EDAS system. Upon final camera-ready paper submission, authors will need to sign an IEEE copyright form for each accepted paper to comply with IEEE regulations. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. The extended versions of selected papers will be published in a special issue of the Security and Communication Networks, Wiley (confirmed!) or EURASIP Journal on Information Security (confirmed!). WORKSHOP CHAIRS Wojciech Mazurczyk, Warsaw University of Technology, Poland Errin W. Fulp, Wake Forest University, USA Hiroshi Wada, Unitrends, Australia Krzysztof Szczypiorski, Warsaw University of Technology, Poland Contact BCSN 2015 chairs using this email address: contact@cybersecurity.bio. |
|