posted by organizer: bjasiul || 720 views || tracked by 3 users: [display]

CYBERSEC 2018 : Cyber Security Workshop (CYBERSEC 2018) at the 4th IEEE International Conference on Data Science and Systems (DSS-2018)

FacebookTwitterLinkedInGoogle

Link: https://www.wil.waw.pl/konferencje/CFP_CyberSec2018_v.1.0.pdf
 
When Jun 28, 2018 - Jun 30, 2018
Where Exeter, UK
Submission Deadline Mar 19, 2018
Notification Due Apr 23, 2018
Final Version Due May 15, 2018
Categories    cyber security   security   computer science
 

Call For Papers

Cyber Security Workshop (CYBERSEC 2018) at the 4th IEEE International Conference on Data Science and Systems (DSS-2018)

Exeter, United Kingdom, June 28-30 2018

Conference website: http://cse.stfx.ca/~dss2018/

Workshop website: https://www.wil.waw.pl/konferencje/CFP_CyberSec2018_v.1.0.pdf

(1) Workshop Organizers:

Joanna Śliwa, Ph.D., Head of Department
C4I Systems’ Department
Military Communication Institute, Poland
Tel: +48-26-188-55-11
Email: j.sliwa@wil.waw.pl

Bartosz Jasiul, Ph.D., Head of Laboratory
Cyber Security Laboratory
Military Communication Institute, Poland
Tel: +48-26-188-55-92
Email: b.jasiul@wil.waw.pl

(2) General description

Although awareness about necessary security appliances seems to be common and the tools used for that purpose are getting more and more advanced, the number of successful attacks targeted on computer systems is growing. The evolution towards cloud computing, increasing use of social networks, Internet of Things, mobile and peer-to-peer networking technologies that are intrinsic part of our life today, carrying many conveniences within our personal life, business and government, create many challenges and potential path of malware propagation. The optimal balance between usability and security of the infrastructure is difficult to be defined. Computer systems are usually prone to cyber attacks even though a number of security controls are already deployed. It is getting increasingly difficult to protect the infrastructure and assess its security on the basis of e.g. security audit. Risks derive not only from the technical domain, but very often human factor plays a critical role. The attacker can act from the perimeter of the network but very often finds the weakest element in the infrastructure and uses it to get access to the network. The Advanced Persistent Threats (APTs) and targeted attacks make every infrastructure potentially vulnerable. What is more the metadata related to the data exchange itself and the behaviour of the users registered by the sensors usually becomes big in terms of volume, velocity and variety. To analyse big data researchers use machine learning algorithms, however it is envisioned that the attackers will also use these mechanisms to overcome security controls and more successfully hide in the user traffic. It is therefore important to verify the efficiency of the security controls during cyber exercises that address both technical and human factor in the face of controlled, but real, targeted attack campaign towards a model infrastructure.
The CyberSec Workshop focuses on the diversity of the systems security developments and deployments in order to highlight the most recent challenges and report the latest research results. It is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum for sharing experiences and new ideas concerning emerging aspects of the systems security in different application domains.
Conference as well as the Workshop are sponsored by IEEE, IEEE Computer Society, and IEEE Technical Committee of Scalable Computing (TCSC).

(3) Topics of Interests

This Workshop calls for original papers describing the latest developments, trends, and solutions related to the issues of cyber security. Topics of interests include, but are not limited to:

• Decision support systems for information security
• Risk assessment and risk management in different application domains
• Tools supporting security management and development
• Computer network security
• Cyber-attack detection
• Attack mitigation
• Cyber breaches scientific reports
• Cryptographic solutions
• Network security
• Anomaly detection
• Threat analysis
• IT security monitoring
• Web/mobile application security
• Computer forensics
• Cyber Exercises' organisation and execution - experiences and best practices

(4) Important Dates

• Paper Submission: 19 March 2018
• Authors Notification: 23 April 2018
• Camera-Ready Paper: 15 May 2018
• Early Registration: 15 May 2018
• Conference Date: 28-30 June 2018

(5) Program Committee

• Roberto Di Pietro, HBKU-CSE, Qatar,
• Gerard Frankowski, Poznan Supercomputing and Networking Center, Poland
• Sebastian Garcia, Czech Technical University in Prague, Czech Republic
• Hector Marco Gisbert, University of the West of Scotland, United Kingdom
• Vasileios Gkioulos, Norwegian University of Science and Technology, Norway
• Damas P. Gruska, Comenius University in Bratislava, Slovakia
• Bartosz Jasiul, Military Communication Institute, Poland
• Wojciech Mazurczyk, Warsaw University of Technology, Poland
• Ana Serrano Mamolar, University of the West of Scotland, United Kingdom
• Joanna Sliwa, Military Communication Institute, Poland
• Jerzy Surma, SGH Warsaw School of Economics, Poland
• Marcin Szpyrka, AGH University of Science and Technology, Poland
• Konrad Wrona, NATO Communication and Information Agency, Netherlands

(6) Submission and Publication

Authors are invited to submit original previously unpublished research papers written in English, of up to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). Please find the manuscript templates and submission related information at the DSS-2018 conference webpage. All accepted papers must be presented by one of the authors who must register for the conference and pay the fee.
The papers should be submitted using the EasyChair conference tool:
https://easychair.org/conferences/?conf=cybersec2018.
Presented papers will appear in the conference proceedings, available on IEEE Xplore and submitted to be indexed in CPCi (ISI conferences and part of Web of Science) and Engineering Index (EI).

Related Resources

IEEE Big Data 2018   2018 IEEE International Conference on Big Data
ACII 2018   Advanced Computational Intelligence: An International Journal
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
BDCAT 2018   5th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
SciSec 2018   The 1st International Conference on Science of Cyber Security
UCC 2018   11th IEEE/ACM International Conference on Utility and Cloud Computing
SECITC 2018   11th International Conference on Security for Information Technology and Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy