posted by organizer: sprowell || 5356 views || tracked by 15 users: [display]

CISR 2014 : 9th Annual Cyber and Information Security Research Conference

FacebookTwitterLinkedInGoogle

Link: http://www.cisr.ornl.gov/cisrc14/index.html
 
When Apr 8, 2014 - Apr 10, 2014
Where Oak Ridge, Tennessee, USA
Submission Deadline Mar 10, 2014
Notification Due Mar 14, 2014
Final Version Due Mar 28, 2014
Categories    cyber security   information security   cyber-physical systems   network security
 

Call For Papers

=====================================================================
CALL FOR PAPERS
2014 Cyber and Information Security Research (CISR-9) Conference
(The 9th Annual Cyber Security Conference at ORNL, formerly CSIIRW)
Oak Ridge National Laboratory, Oak Ridge, TN, USA, April 8-10, 2014
http://www.cisr.ornl.gov/cisrc14
=====================================================================


Important Dates
---------------------------------------------------------------------
All deadlines are 23:59:59 EST
Submission Deadline 24 February 2014
Author Notification 10 March 2014
Early Registration Deadline 14 March 2014
Registration Deadline 28 March 2014


Submission and Registration
---------------------------------------------------------------------
Submission and registration information can be found at:
http://www.cisr.ornl.gov/cisrc14/index.html


About
---------------------------------------------------------------------
Cyberspace is fundamental to our national prosperity, as it has become
critical to commerce, research, education, and government. Realizing
the benefits of this shared environment requires that we are able to
properly balance the risks and rewards, understand and communicate
threats to security and privacy, and rapidly adapt any resulting
approach to a changing adversarial environment.

Recognizing this, we seek original paper submissions in the following
general areas derived from the Federal Cybersecurity R&D agenda [1].

(1) Tailored Trustworthy Spaces - Provides flexible, adaptive,
distributed trust environments that can support functional and
policy requirements arising from a wide spectrum of activities in
the face of an evolving range of threats, recognizing the user's
context and evolves as the context evolves.

(2) Moving Target - Enables us to create, analyze, evaluate, and
deploy mechanisms and strategies that are diverse and that
continually shift and change over time to increase complexity and
cost for attackers, limit the exposure of vulnerabilities and
opportunities for attack, and increase system resiliency.

(3) Designed-In Security - Builds the capability to design, develop,
and evolve high-assurance, software-intensive systems predictably
and reliably while effectively managing risk, cost, schedule,
quality, and complexity.

(4) Cyber Economic Incentives - Develops effective incentives to make
cybersecurity ubiquitous, including incentives affecting
individuals and organizations.

(5) Science of Security [2] - Provides a more fruitful way to ground
research efforts, and to nurture and sustain progress.


Keynote Speakers
---------------------------------------------------------------------
* Gregory Neal Akers, Senior Vice President for Advanced Security and
Chief Technology Officer for TRIAD Group, Cisco Systems, Inc.
* Lt. Gen. Michael Basla, Chief Information Dominance and Chief
Information Officer, US Air Force
* Richard Bejtlich, Chief Security Strategist, FireEye, Inc.
* Lt. Gen. Edward Cardon, Commanding General, US Army Cyber Command
* Dr. Mica Endsley, Chief Scientist, US Air Force
* Dr. Carol Hawk, Program Manager for Cyber Security for Energy
Delivery Systems in the Office of Electricity Delivery and Energy
Reliability, US Department of Energy
* Nate Lesser, Deputy Director, National Cybersecurity Center of
Excellence, NIST
* Michael Pozmantier, Program Manager for Transition to Practice,
Cyber Security Division, Science & Technology Directorate, US
Department of Homeland Security


Related Events
---------------------------------------------------------------------
* DOE Cybersecurity for Energy Delivery Systems (CEDS) Program for
the Office of Electricity Delivery and Energy Reliability in the
Department of Energy (DOE) - Several CEDS performers will present
and demonstrate results of their R&D efforts. Open to all.
* DHS Transition To Practice Program ? Technologies selected by DHS
from DOE labs will be presented and demonstrated.Open to all.
* DOE Cyber Sciences Lab (CSL) ? CSL is a virtual integrated cyber
defense R&D activity that spans 8 DOE National Labs and 1 DOE Test
Site. Selected technologies proposed for Signature Programs will
be presented and demonstrated. Open to all.
* DOE Cyber Defenders 2nd Annual Symposium. Restricted access.


Specific Topics of Interest
---------------------------------------------------------------------
The following more specific topics are of special interest. Many of
these are also taken from the Federal Cybersecurity R&D agenda.

* Security and trustworthiness of information in motion and at rest,
especially in a shared (?cloud?) environment.
* Understanding the risks and tradeoffs in deploying solutions, in
terms that are measurable and quantifiable.
* Fusion of cyber data such as netflows with other data from non-cyber
sources, such as geographic and economic data to discover
connections and highlight activity of interest.
* Discovery of trends, especially in malware design and use.
* Trust negotiation tools and data models to support negotiation of
policy.
* Data protection tools, access control management, monitoring and
compliance verification mechanisms to allow for informed trust.
* Hardware mechanisms that support secure bootload and continuous
monitoring of critical software.
* Application and operating system elements that can provide strong
assurance that program semantics cannot be altered during execution.
* Control theory to abstract the complexity of moving target systems
and enable sound, resilient system management.
* Models and techniques to support on-the-fly evidence creation during
a systems engineering process.
* Mathematically sound techniques to support combination of models and
composition of results.
* Analysis techniques (based on model checking, abstract
interpretation, semantics-based testing, and/or verification) to
enable traceable linking among diverse models and code.
* Team and supply chain practices to facilitate composition of
assurance in the supply chain.
* Psychology and human factors for how to build software
specification, implementation, verification, analysis, and testing
tools that are easy to use and provide positive feedback to users.
* Methods to model adversaries; especially co-modeling of attackers
and defenders.
* Control theory for maintaining security in the presence of ongoing
and even partially successful attacks.
* Formal and stochastic modeling techniques in security modeling.
* Comprehensive, open, and anonymized data repositories.


Organization
---------------------------------------------------------------------
General Co-Chairs:
* Dr. Stacy J. Prowell, Oak Ridge National Laboratory
* Dr. John R. Goodall, Oak Ridge National Laboratory
* Joseph P. Trien, Oak Ridge National Laboratory

Program Co-Chairs:
* Todd R. Andel, Ph.D., University of South Alabama
* Marco Carvalho, Ph.D., Florida Institute of Technology
* Michael Grimaila, Ph.D., Air Force Institute of Technology
* Sun-il Kim, Ph.D., University of Alabama, Huntsville
* Carl Kutsche, Ph.D., Idaho National Laboratory
* Sven Leyffer, Ph.D., Argonne National Laboratory
* David Manz, Ph.D., Pacific Northwest National Laboratory
* Sean Peisert, Ph.D., Lawrence Berkeley National Laboratory

Proceedings Co-Chairs:
* Robert Abercrombie, Ph.D., Oak Ridge National Laboratory
* Todd McDonald, Ph.D., University of South Alabama


Sponsorship and Exhibition
---------------------------------------------------------------------
If you are interested in becoming a sponsor contact Kevin Gladstein at
Federal Training Partnership:

info@federaltrainingpartnerships.com
1-844-325-0341

Sponsorship Levels:
Platinum: $7500
Gold: $5000
Silver $3000


Notes
---------------------------------------------------------------------
1 http://www.whitehouse.gov/blog/2011/12/06/federal-cybersecurity-rd-strategic-plan-released
2 http://cps-vo.org/group/SoS

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
CSW 2024   2024 3rd International Conference on Cyber Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
COMIT 2024   8th International Conference on Computer Science and Information Technology
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SPTM 2024   12th International Conference of Security, Privacy and Trust Management
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
ENS 2024   7th International Workshop on Emerging Network Security
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
CSEIT 2024   11th International Conference on Computer Science, Engineering and Information Technology