posted by organizer: sprowell || 4869 views || tracked by 13 users: [display]

CISR 2014 : 9th Annual Cyber and Information Security Research Conference


When Apr 8, 2014 - Apr 10, 2014
Where Oak Ridge, Tennessee, USA
Submission Deadline Mar 10, 2014
Notification Due Mar 14, 2014
Final Version Due Mar 28, 2014
Categories    cyber security   information security   cyber-physical systems   network security

Call For Papers

2014 Cyber and Information Security Research (CISR-9) Conference
(The 9th Annual Cyber Security Conference at ORNL, formerly CSIIRW)
Oak Ridge National Laboratory, Oak Ridge, TN, USA, April 8-10, 2014

Important Dates
All deadlines are 23:59:59 EST
Submission Deadline 24 February 2014
Author Notification 10 March 2014
Early Registration Deadline 14 March 2014
Registration Deadline 28 March 2014

Submission and Registration
Submission and registration information can be found at:

Cyberspace is fundamental to our national prosperity, as it has become
critical to commerce, research, education, and government. Realizing
the benefits of this shared environment requires that we are able to
properly balance the risks and rewards, understand and communicate
threats to security and privacy, and rapidly adapt any resulting
approach to a changing adversarial environment.

Recognizing this, we seek original paper submissions in the following
general areas derived from the Federal Cybersecurity R&D agenda [1].

(1) Tailored Trustworthy Spaces - Provides flexible, adaptive,
distributed trust environments that can support functional and
policy requirements arising from a wide spectrum of activities in
the face of an evolving range of threats, recognizing the user's
context and evolves as the context evolves.

(2) Moving Target - Enables us to create, analyze, evaluate, and
deploy mechanisms and strategies that are diverse and that
continually shift and change over time to increase complexity and
cost for attackers, limit the exposure of vulnerabilities and
opportunities for attack, and increase system resiliency.

(3) Designed-In Security - Builds the capability to design, develop,
and evolve high-assurance, software-intensive systems predictably
and reliably while effectively managing risk, cost, schedule,
quality, and complexity.

(4) Cyber Economic Incentives - Develops effective incentives to make
cybersecurity ubiquitous, including incentives affecting
individuals and organizations.

(5) Science of Security [2] - Provides a more fruitful way to ground
research efforts, and to nurture and sustain progress.

Keynote Speakers
* Gregory Neal Akers, Senior Vice President for Advanced Security and
Chief Technology Officer for TRIAD Group, Cisco Systems, Inc.
* Lt. Gen. Michael Basla, Chief Information Dominance and Chief
Information Officer, US Air Force
* Richard Bejtlich, Chief Security Strategist, FireEye, Inc.
* Lt. Gen. Edward Cardon, Commanding General, US Army Cyber Command
* Dr. Mica Endsley, Chief Scientist, US Air Force
* Dr. Carol Hawk, Program Manager for Cyber Security for Energy
Delivery Systems in the Office of Electricity Delivery and Energy
Reliability, US Department of Energy
* Nate Lesser, Deputy Director, National Cybersecurity Center of
Excellence, NIST
* Michael Pozmantier, Program Manager for Transition to Practice,
Cyber Security Division, Science & Technology Directorate, US
Department of Homeland Security

Related Events
* DOE Cybersecurity for Energy Delivery Systems (CEDS) Program for
the Office of Electricity Delivery and Energy Reliability in the
Department of Energy (DOE) - Several CEDS performers will present
and demonstrate results of their R&D efforts. Open to all.
* DHS Transition To Practice Program ? Technologies selected by DHS
from DOE labs will be presented and demonstrated.Open to all.
* DOE Cyber Sciences Lab (CSL) ? CSL is a virtual integrated cyber
defense R&D activity that spans 8 DOE National Labs and 1 DOE Test
Site. Selected technologies proposed for Signature Programs will
be presented and demonstrated. Open to all.
* DOE Cyber Defenders 2nd Annual Symposium. Restricted access.

Specific Topics of Interest
The following more specific topics are of special interest. Many of
these are also taken from the Federal Cybersecurity R&D agenda.

* Security and trustworthiness of information in motion and at rest,
especially in a shared (?cloud?) environment.
* Understanding the risks and tradeoffs in deploying solutions, in
terms that are measurable and quantifiable.
* Fusion of cyber data such as netflows with other data from non-cyber
sources, such as geographic and economic data to discover
connections and highlight activity of interest.
* Discovery of trends, especially in malware design and use.
* Trust negotiation tools and data models to support negotiation of
* Data protection tools, access control management, monitoring and
compliance verification mechanisms to allow for informed trust.
* Hardware mechanisms that support secure bootload and continuous
monitoring of critical software.
* Application and operating system elements that can provide strong
assurance that program semantics cannot be altered during execution.
* Control theory to abstract the complexity of moving target systems
and enable sound, resilient system management.
* Models and techniques to support on-the-fly evidence creation during
a systems engineering process.
* Mathematically sound techniques to support combination of models and
composition of results.
* Analysis techniques (based on model checking, abstract
interpretation, semantics-based testing, and/or verification) to
enable traceable linking among diverse models and code.
* Team and supply chain practices to facilitate composition of
assurance in the supply chain.
* Psychology and human factors for how to build software
specification, implementation, verification, analysis, and testing
tools that are easy to use and provide positive feedback to users.
* Methods to model adversaries; especially co-modeling of attackers
and defenders.
* Control theory for maintaining security in the presence of ongoing
and even partially successful attacks.
* Formal and stochastic modeling techniques in security modeling.
* Comprehensive, open, and anonymized data repositories.

General Co-Chairs:
* Dr. Stacy J. Prowell, Oak Ridge National Laboratory
* Dr. John R. Goodall, Oak Ridge National Laboratory
* Joseph P. Trien, Oak Ridge National Laboratory

Program Co-Chairs:
* Todd R. Andel, Ph.D., University of South Alabama
* Marco Carvalho, Ph.D., Florida Institute of Technology
* Michael Grimaila, Ph.D., Air Force Institute of Technology
* Sun-il Kim, Ph.D., University of Alabama, Huntsville
* Carl Kutsche, Ph.D., Idaho National Laboratory
* Sven Leyffer, Ph.D., Argonne National Laboratory
* David Manz, Ph.D., Pacific Northwest National Laboratory
* Sean Peisert, Ph.D., Lawrence Berkeley National Laboratory

Proceedings Co-Chairs:
* Robert Abercrombie, Ph.D., Oak Ridge National Laboratory
* Todd McDonald, Ph.D., University of South Alabama

Sponsorship and Exhibition
If you are interested in becoming a sponsor contact Kevin Gladstein at
Federal Training Partnership:

Sponsorship Levels:
Platinum: $7500
Gold: $5000
Silver $3000


Related Resources

CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IJPLA 2022   International Journal of Programming Languages and Applications
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
NBIoT 2022   3rd International Conference on Networks, Blockchain and Internet of Things
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
SECRYPT 2022   19th International Conference on Security and Cryptography
SECURWARE 2022   International Conference on Emerging Security Information, Systems and Technologies
ICCNS--EI, Scopus 2022   2022 the 12th International Conference on Communication and Network Security (ICCNS 2022)--EI Compendex, Scopus