| |||||||||
Cyber Resilience 2017 : Chapters of the Book: Cyber Resilience of Networks and Systems | |||||||||
| |||||||||
Call For Papers | |||||||||
CALL FOR BOOK CHAPTERS
---------------------------------------- Book Title: Cyber Resilience of Networks and Systems To be published by Springer IMPORTANT DATES: -------------------------- Chapter outline / extended abstract: 15 January 2017 First complete draft: 1 March 2017 Final version: 1 June 2017 Tentative publication date: Late 2017 or early 2018 EDITORS: -------------- Dr. Alexander Kott, US Army Research Laboratory, USA; email Alexander.Kott1.civ@mail.mil Dr. Igor Linkov, US Army Engineer Research and Development Center, USA; email Igor.Linkov@usace.army.mil The intent of the book is to be a pre-designed and carefully edited volume that approximates a book written by a single author. It will present the material in a logical, consistent, continuous discourse, covering all key topics relevant to the field. Each chapter should be structured approximately as follows: * The first 40% of the chapter should provide a tutorial overview of the key concepts, ideas, approaches and current results in the chapter's topic * The next 50% should illustrate and elaborate on some of these concepts by way of presenting a particular research example (likely, but not necessarily your own) * The remainder should be your thoughts on future developments and promising directions in the chapter's area ===== Topics of interest: Cyber Resilience - Key Concepts and Definitions: relations and differentiation from related concepts: security, risk, robustness, reliability, survivability, self-healing, adaptation, agility, cyber maneuver, moving target defense, continuity of operation; fault and disruption tolerance; rapid recovery; cyber insurance; resilience in other fields: organizational theory, biology, psychology, material science Organizational Processes and Practices: managing and operating towards CR: human (and other intelligent supervisory mechanisms') policies, procedures, organizational techniques; review of NIST, MITRE and other guides; objectives and goals of CR (understand, prepare, prevent, constrain, continue, transform, re-architect); key processes of CR; key best practices and heuristics of CR Assessing Cyber Resilience: measurements and measures (direct observables); metrics (computed); approaches to experiments and empirical observations; qualitative judgments and indices; methods for measurement, evaluation, or validation of resilience; characterizing capacity for resilience: absorptive capacity, adaptive capacity, restorative capacity Factors that Affect CR: complexity, resource availability and redundancy; degree of performance optimization, multiplicity of threat types, topology, opportunity for cascading failures, buffering, ability to reject wrong information and make correct inferences; relations of resiliency to other properties: resilience and risk, robustness, reliability, etc.; human factors Characterizing and Predicting CR via Models and Simulation: conceptual and ontological theories of CR; mathematical models of CR; executable and simulation models; simulation/emulation techniques for network resilience; modeling different types of cyber failures; modeling malicious behavior or attacks on networks; modeling of cascading failures; impact of coupling, interdependencies and topology of influences; self-organized criticality; complex adaptive systems, evolution by selection; modeling of resistance and recovery processes; formal methods for CR; mission impact analysis; impact on QoS Building and Enhancing Cyber Resilience: design for resilience; cyber resiliency engineering (architectural practices and mechanisms to improve cyber resilience); standardization of network resilience; technical means to key processes and phases of resilient operations (anticipating and avoiding; withstanding and absorbing; recovering and restoring; adapting and reconfiguring); technologies for strengthening resilient operations (monitoring and situational awareness; cyber maneuver during attack, active defense, deceiving and obfuscating; employing redundant resources; finding (forensics) and destroying hostile malware; service and operations continuity; learning and self-learning) Cyber Resilience of Selected Architectures: Future Internet resilience, P2P and overlay systems, Internet of Things, data centers, wireless-wired communications, wireless sensor networks, emerging communication technologies, vehicle-to-vehicle communications, cloud computing, content-oriented networks architectures and solutions, architectures/solutions, distributed computing, Software-Defined Networks (SDN), cloud architectures, fog architecture Selected Technical Approaches to Cyber Resilience: control theoretic and game theoretic approaches resilience, artificial intelligence and intelligent systems; biologically inspired approaches such as artificial immune systems; Case Studies in Cyber Resilience: case studies of actual events in which a complex system has experienced a cyber compromise with subsequent recovery; with lessons learned linked to concepts presented in earlier chapters. Economics of Resilience: costs, economic tradeoffs, insurance, business aspects SUBMISSION: ------------------- Begin by preparing the outline of your intended chapter and discussing it with the editors. Do not write or submit the chapter without consultations with the editors. |
|