posted by user: jsu1 || 6246 views || tracked by 8 users: [display]

ACySe 2015 : Second International Workshop on Agents and CyberSecurity

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/acyse2015/
 
When May 4, 2015 - May 5, 2015
Where Istanbul, Turkey
Submission Deadline Feb 11, 2015
Notification Due Mar 10, 2015
Final Version Due Mar 19, 2015
Categories    agents   security   privacy   artificial intelligence
 

Call For Papers

****************************************************************************************
The Second International Workshop on Agents and CyberSecurity
ACySe 2015
https://sites.google.com/site/acyse2015/

To be held with AAMAS 2015 (http://www.aamas2015.com/)
May 4-8, 2015. Istanbul, Turkey

Selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine (JCR 1.92)
****************************************************************************************

------------------------------
DESCRIPTION
------------------------------
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community.

The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of *agent-based approaches*. Specific topics for this workshop include but are not limited to:
* Game-theoretic approaches to Security and Privacy
* Cloud Computing Security and Privacy
* Online Social Networks / Social Computing Security and Privacy
* Advanced Persistent Threats
* Adversarial Modelling
* Automated Vulnerability Assessment / Penetration Testing
* Critical Infrastructure Protection
* CyberCrime and CyberWar
* Data Leakage and Exfiltration
* Denial of Service / Distributed Denial of Service (DoS/DDoS)
* Digital Forensics
* Distributed collaboration patterns of malicious software and their discovery
* Intelligent Access Control Models
* Human Behaviour Modelling and Human Factors
* Insider Threat
* Intrusion Detection/Prevention Systems
* Learning/Recommendation/Negotiation of Security and Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control
* Privacy and Personal Information Protection
* Resilience and Robustness
* Risk Assessment and Management, and Risk Mitigation Strategies


---------------------------------
IMPORTANT DATES
---------------------------------
*Paper Submission Deadline: FEBRUARY 11, 2015
*Paper Acceptance Notification: MARCH 10, 2015
*Camera-ready copies due: MARCH 19, 2015
*Workshop Date: MAY 4-5, 2015

---------------------------------
ORGANIZING COMMITTEE
---------------------------------
*Natalia Criado (Liverpool John Moores University, UK)
*Martin Rehak (Cisco Systems, Czech Republic)
*Jose M. Such (Lancaster University , UK)
*Laurent Vercouter (INSA de Rouen/LITIS lab, France)


---------------------------------
SUBMISSION and REVIEW DETAILS
---------------------------------
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics and taking an agent-based approach, coverage of relevant state of the art and the relevance to cyber security problems.

Submissions must follow AAMAS format (http://www.aamas2015.com/files/downloads/Paper-Submission/aamas2015.cls) and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress.

- Position Papers (2-4 pages) reporting views or ambitions, or describing problems.

Papers must be submitted in pdf format via the conference management system, available at: https://easychair.org/conferences/?conf=acyse2015

----------------------------------
PUBLICATION DETAILS
----------------------------------
Pre-proceedings with all accepted papers are provided electronically on a USB stick as part of the AAMAS workshop registration package. Assuming a sufficient number of high-quality submissions, we will also consider the publication of formal post-proceedings with an international publisher. The proceedings of ACySE 2014 were published by ACM, in its prestigious International Conference Proceedings Series with ISBN.


Authors of selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine.


--------------------------
CONTACT
--------------------------
ACySe Organising Committee (acyse2015@easychair.org)

Related Resources

AAMAS 2024   International Conference on Autonomous Agents and Multiagent Systems
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
FLAIRS 2024   37th International FLAIRS Conference
ECAI 2024   27th European Conference on Artificial Intelligence
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
JCICE 2024   2024 International Joint Conference on Information and Communication Engineering(JCICE 2024)
C3AI 2024   The International Conference on Computing, Communication, Cybersecurity & AI
IEEE ICA 2022   The 6th IEEE International Conference on Agents
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
WI-IAT 2024   23rd IEEE/WIC International Conference on Web Intelligence and Intelligent Agent Technology