| |||||||||||||||
ACySe 2015 : Second International Workshop on Agents and CyberSecurity | |||||||||||||||
Link: https://sites.google.com/site/acyse2015/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
****************************************************************************************
The Second International Workshop on Agents and CyberSecurity ACySe 2015 https://sites.google.com/site/acyse2015/ To be held with AAMAS 2015 (http://www.aamas2015.com/) May 4-8, 2015. Istanbul, Turkey Selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine (JCR 1.92) **************************************************************************************** ------------------------------ DESCRIPTION ------------------------------ Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of *agent-based approaches*. Specific topics for this workshop include but are not limited to: * Game-theoretic approaches to Security and Privacy * Cloud Computing Security and Privacy * Online Social Networks / Social Computing Security and Privacy * Advanced Persistent Threats * Adversarial Modelling * Automated Vulnerability Assessment / Penetration Testing * Critical Infrastructure Protection * CyberCrime and CyberWar * Data Leakage and Exfiltration * Denial of Service / Distributed Denial of Service (DoS/DDoS) * Digital Forensics * Distributed collaboration patterns of malicious software and their discovery * Intelligent Access Control Models * Human Behaviour Modelling and Human Factors * Insider Threat * Intrusion Detection/Prevention Systems * Learning/Recommendation/Negotiation of Security and Privacy Policies * Malware (Virus, Worms, Trojans, Backdoors) * Multi-party/Multi-agent Access Control * Privacy and Personal Information Protection * Resilience and Robustness * Risk Assessment and Management, and Risk Mitigation Strategies --------------------------------- IMPORTANT DATES --------------------------------- *Paper Submission Deadline: FEBRUARY 11, 2015 *Paper Acceptance Notification: MARCH 10, 2015 *Camera-ready copies due: MARCH 19, 2015 *Workshop Date: MAY 4-5, 2015 --------------------------------- ORGANIZING COMMITTEE --------------------------------- *Natalia Criado (Liverpool John Moores University, UK) *Martin Rehak (Cisco Systems, Czech Republic) *Jose M. Such (Lancaster University , UK) *Laurent Vercouter (INSA de Rouen/LITIS lab, France) --------------------------------- SUBMISSION and REVIEW DETAILS --------------------------------- Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics and taking an agent-based approach, coverage of relevant state of the art and the relevance to cyber security problems. Submissions must follow AAMAS format (http://www.aamas2015.com/files/downloads/Paper-Submission/aamas2015.cls) and can be of two types: - Full Papers (maximum of 8 pages) about completed work or work in progress. - Position Papers (2-4 pages) reporting views or ambitions, or describing problems. Papers must be submitted in pdf format via the conference management system, available at: https://easychair.org/conferences/?conf=acyse2015 ---------------------------------- PUBLICATION DETAILS ---------------------------------- Pre-proceedings with all accepted papers are provided electronically on a USB stick as part of the AAMAS workshop registration package. Assuming a sufficient number of high-quality submissions, we will also consider the publication of formal post-proceedings with an international publisher. The proceedings of ACySE 2014 were published by ACM, in its prestigious International Conference Proceedings Series with ISBN. Authors of selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine. -------------------------- CONTACT -------------------------- ACySe Organising Committee (acyse2015@easychair.org) |
|