posted by organizer: wmazurczyk || 9444 views || tracked by 1 users: [display]

BioSTAR 2017 : Workshop on Bio-inspired Security, Trust, Assurance and Resilience

FacebookTwitterLinkedInGoogle

Link: http://biostar.cybersecurity.bio/
 
When May 25, 2017 - May 25, 2017
Where San Jose, CA, USA
Submission Deadline Jan 31, 2017
Notification Due Feb 22, 2017
Final Version Due Mar 15, 2017
Categories    bio-inspired security   nature-inspired security   cybersecurity   network security
 

Call For Papers

International Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2017) co-located with 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017)

May 25, 2017
Fairmont, San Jose, CA, USA

Workshop website: http://biostar.cybersecurity.bio/
Submission link: https://easychair.org/conferences/?conf=biostar2017

OVERVIEW
As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments. Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments.

Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc.

Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications. Topics of interests include, but are not limited to:
• Nature-inspired anomaly and intrusion detection
• Adaptation algorithms
• Biometrics
• Nature-inspired algorithms and technologies for STAR
• Biomimetics
• Artificial Immune Systems
• Adaptive and Evolvable Systems
• Machine Learning, neural networks, genetic algorithms for STAR
• Nature-inspired analytics and prediction
• Cognitive systems
• Sensor and actuator networks and systems
• Information hiding solutions (steganography, watermarking) for network traffic
• Cooperative defense systems
• Cloud-supported matire-inspired STAR
• Theoretical development in heuristics
• Management of decentralized networks
• Nature-inspired algorithms for dependable networks
• Platforms for STAR services
• Diversity in computing and communications
• Survivable and sustainable systems
• STAR management systems
• Autonomic cyber defenses

The workshop is an interesting supplement for the IEEE Security and Privacy 2017 in area of security & communication networks.

SUBMISSION AND REGISTRATION
Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English.

Authors are invited to submit Regular Papers (maximum 6 pages) via EasyChair (https://easychair.org/conferences/?conf=biostar2017). Papers accepted by the workshop will be published in the Conference Proceedings published by IEEE Computer Society Press.

Papers must be formatted for US letter (not A4) size paper with margins of at least 3/4 inch on all sides. The text must be formatted in a two-column layout, with columns no more than 9 in. high and 3.375 in. wide. The text must be in Times font, 10-point or larger, with 12-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates found here. Failure to adhere to the page limit and formatting requirements will be grounds for rejection.

The extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility (confirmed!) or EURASIP Journal on Information Security (confirmed!).

IMPORTANT DATES
• January 22 (EXTENDED!), 2017: Regular Paper Submission (EXTENDED DEADLINE!)
• February 15, 2017: Notification Date
• March 15, 2017: Camera-Ready Paper Deadline

ORGANIZING COMMITTEE
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, NC, USA
Mohamed Eltoweissy, Virginia Military Institute, USA
Kenji Leibnitz, National Institute of Information and Communications Technology, Japan

CONTACT
For any enquires please contact us at: contact@cybersecurity.bio.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
FLAIRS 2025   Florida Artificial Intelligence Research Society
ICANN 2024   33rd International Conference on Artificial Neural Networks
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
BIOSIGNALS 2025   18th International Conference on Bio-inspired Systems and Signal Processing
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MARESEC 2025   European Workshop on Maritime Systems Resilience and Security
NTIJ 2024   Nanoscience and Technology: An International Journal
EAI BICT 2024   15th EAI International Conference on Bio-inspired Information and Communications Technologies
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)