posted by user: wmazurczyk || 3255 views || tracked by 3 users: [display]

BIOSEC 2015 : IEEE Communication Magazine Feature Topic on Bio-inspired Cyber Security for Communications and Networking

FacebookTwitterLinkedInGoogle

Link: http://www.comsoc.org/commag/cfp/bio-inspired-cyber-security-communications-and-networking
 
When N/A
Where N/A
Submission Deadline Nov 1, 2015
Notification Due Feb 1, 2015
Final Version Due Apr 1, 2015
Categories    cybersecurity   bio-inspired security   bio-inspired networking
 

Call For Papers

IEEE Communication Magazine:
Feature Topic on Bio-inspired Cyber Security for Communications and Networking

Nature is Earth's most amazing invention machine for solving problems and adapting to significant environmental changes. Its ability to address complex, large-scale problems with robust, adaptable, and efficient solutions results from many years of selection, genetic drift and mutations. Thus, it is not surprising that inventors and researchers often look to natural systems for inspiration and methods for solving problems in human-created artificial environments. This has resulted in the development of evolutionary algorithms including genetic algorithms and swarm algorithms, and of classifier and pattern-detection algorithms, such as neural networks, for solving hard computational problems.

A natural evolutionary driver is to survive long enough to create a next-generation of descendants and ensure their survival. One factor in survival is an organism's ability to defend against attackers, both predators and parasites, and against rapid changes in environmental conditions. Analogously, networks and communications systems use cyber security to defend their assets against cyber criminals, hostile organizations, hackers, activists, and sudden changes in the network environment (e.g., DDoS attacks). Many of the defense methods used by natural organisms may be mapped to cyber space to implement effective cyber security. Some examples include immune systems, invader detection, friend vs. foe, camouflage, mimicry, evasion, etc. Many cyber security technologies and systems in common use today have their roots in bio-inspired methods, including anti-virus, intrusion detection, threat behavior analysis, attribution, honeypots, counterattack, and the like. As the threats evolve to evade current cyber security technologies, similarly the bio-inspired security and defense technologies evolve to counter the threat.

The goal of this feature topic is twofold: (1) to survey the current academic and industry research in bio-inspired cyber security for communications and networking, so that the ComSoc community can understand the current evolutionary state of cyber threats, defenses, and intelligence, and can plan for future transitions of the research into practical implementations; and (2) to survey current academic and industry system projects, prototypes, and deployed products and services (including threat intelligence services) that implement the next generation of bio-inspired methods. Please note that we recognize that in some cases, details may be limited or obscured for security reasons.

Topics of interests include, but are not limited to:
• Bio-inspired anomaly & intrusion detection
• Adaptation algorithms for cyber security & networking
• Biometrics related to cyber security & networking
• Bio-inspired security and networking algorithms & technologies
• Biomimetics related to cyber security & networking
• Bio-inspired cyber threat intelligence methods and systems
• Moving-target techniques
• Network Artificial Immune Systems
• Adaptive and Evolvable Systems
• Neural networks, evolutionary algorithms, and genetic algorithms for cyber security & networking
• Prediction techniques for cyber security & networking
• Information hiding solutions (steganography, watermarking) and detection for network traffic
• Cooperative defense systems
• Bio-inspired algorithms for dependable networks

IMPORTANT DATES:
- Manuscript submission date: November 1, 2015
- Decision notification date: February 1, 2016
- Final manuscript due date: April 1, 2016
- Publication date: June 2016

SUBMISSION GUIDELINES
Articles should be tutorial in nature and written in a style comprehensible and accessible to readers outside the specialty of the article. Authors must follow the IEEE Communications Magazine's guidelines for preparation of the manuscript. Complete guidelines for prospective authors can be found at http://www.comsoc.org/commag/paper-submission-guidelines.
It is important to note that the IEEE Communications Magazine strongly limits mathematical content, and the number of figures and tables. Paper length should not exceed 4,500 words. All articles to be considered for publication must be submitted through the IEEE Manuscript Central site (http://mc.manuscriptcentral.com/commag-ieee) by the deadline. Submit articles to the "June 2016 / Bio-inspired cyber security for communication and networking" category.

GUEST EDITORS
Wojciech Mazurczyk
Warsaw University of Technology
Poland
wmazurczyk@tele.pw.edu.pl

Sean Moore
Centripetal Networks
USA
smoorephd@gmail.com

Errin W. Fulp
Wake Forest University
USA
fulp@wfu.edu

Hiroshi Wada
Unitrends
Australia
hiroshi.wada@nicta.com.au

Kenji Leibnitz
National Institute of Information and Communications Technology
Japan
leibnitz@nict.go.jp

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
FLAIRS 2025   Florida Artificial Intelligence Research Society
IEEE RO-MAN 2025   34th IEEE International Conference on Robot and Human Interactive Communication
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
SIGCOMM 2025   ACM Special Interest Group on Data Communication
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)