posted by user: jsu1 || 6648 views || tracked by 8 users: [display]

ACySe 2015 : Second International Workshop on Agents and CyberSecurity

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/acyse2015/
 
When May 4, 2015 - May 5, 2015
Where Istanbul, Turkey
Submission Deadline Feb 11, 2015
Notification Due Mar 10, 2015
Final Version Due Mar 19, 2015
Categories    agents   security   privacy   artificial intelligence
 

Call For Papers

****************************************************************************************
The Second International Workshop on Agents and CyberSecurity
ACySe 2015
https://sites.google.com/site/acyse2015/

To be held with AAMAS 2015 (http://www.aamas2015.com/)
May 4-8, 2015. Istanbul, Turkey

Selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine (JCR 1.92)
****************************************************************************************

------------------------------
DESCRIPTION
------------------------------
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community.

The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of *agent-based approaches*. Specific topics for this workshop include but are not limited to:
* Game-theoretic approaches to Security and Privacy
* Cloud Computing Security and Privacy
* Online Social Networks / Social Computing Security and Privacy
* Advanced Persistent Threats
* Adversarial Modelling
* Automated Vulnerability Assessment / Penetration Testing
* Critical Infrastructure Protection
* CyberCrime and CyberWar
* Data Leakage and Exfiltration
* Denial of Service / Distributed Denial of Service (DoS/DDoS)
* Digital Forensics
* Distributed collaboration patterns of malicious software and their discovery
* Intelligent Access Control Models
* Human Behaviour Modelling and Human Factors
* Insider Threat
* Intrusion Detection/Prevention Systems
* Learning/Recommendation/Negotiation of Security and Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control
* Privacy and Personal Information Protection
* Resilience and Robustness
* Risk Assessment and Management, and Risk Mitigation Strategies


---------------------------------
IMPORTANT DATES
---------------------------------
*Paper Submission Deadline: FEBRUARY 11, 2015
*Paper Acceptance Notification: MARCH 10, 2015
*Camera-ready copies due: MARCH 19, 2015
*Workshop Date: MAY 4-5, 2015

---------------------------------
ORGANIZING COMMITTEE
---------------------------------
*Natalia Criado (Liverpool John Moores University, UK)
*Martin Rehak (Cisco Systems, Czech Republic)
*Jose M. Such (Lancaster University , UK)
*Laurent Vercouter (INSA de Rouen/LITIS lab, France)


---------------------------------
SUBMISSION and REVIEW DETAILS
---------------------------------
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics and taking an agent-based approach, coverage of relevant state of the art and the relevance to cyber security problems.

Submissions must follow AAMAS format (http://www.aamas2015.com/files/downloads/Paper-Submission/aamas2015.cls) and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress.

- Position Papers (2-4 pages) reporting views or ambitions, or describing problems.

Papers must be submitted in pdf format via the conference management system, available at: https://easychair.org/conferences/?conf=acyse2015

----------------------------------
PUBLICATION DETAILS
----------------------------------
Pre-proceedings with all accepted papers are provided electronically on a USB stick as part of the AAMAS workshop registration package. Assuming a sufficient number of high-quality submissions, we will also consider the publication of formal post-proceedings with an international publisher. The proceedings of ACySE 2014 were published by ACM, in its prestigious International Conference Proceedings Series with ISBN.


Authors of selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine.


--------------------------
CONTACT
--------------------------
ACySe Organising Committee (acyse2015@easychair.org)

Related Resources

AAMAS - 2025   The 24th International Conference on Autonomous Agents and Multiagent Systems
ICAART 2025   17th International Conference on Agents and Artificial Intelligence
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
FLAIRS 2025   Florida Artificial Intelligence Research Society