posted by organizer: marco_rasori || 1977 views || tracked by 3 users: [display]

SecSoft 2023 : The 5th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures

FacebookTwitterLinkedInGoogle

Link: https://secsoft-workshop.org
 
When Jun 23, 2023 - Jun 23, 2023
Where Madrid, Spain
Submission Deadline Apr 2, 2023
Notification Due Apr 21, 2023
Final Version Due Apr 28, 2023
Categories    cyber security   computer science   privacy   engineering
 

Call For Papers

------------------------------
SecSoft 2023 - The 5th International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures
co-located with IEEE NetSoft 2023
23 June 2023 - Madrid, Spain

https://www.secsoft-workshop.org/
------------------------------

*Call for Papers*
The 5th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures (SecSoft) is a joint initiative from the H2020 EU Projects FLUIDOS, PALANTIR, SIFIS-Home, ELECTRON, RIGOUROUS, and CATRIN to create a dialogue about emerging cyber-security paradigms for virtualized environments and critical infrastructures.

Link to PDF version of this CfP:
https://www.secsoft-workshop.org/SecSoft2023-CfP.pdf


*Scope*
Evolving business models are progressively reshaping ICT services and infrastructures, with a growing softwarization trend, the massive introduction of virtualization paradigms, and the tight integration with the physical environment. Unfortunately, the evolution of cyber-security paradigms has not followed at the same pace, leading to a substantial gap in solutions capable of protecting the new forms of distributed and heterogeneous systems against an evolving landscape of cyber-threats.

Traditional security tools that organizations have long relied on to protect their networks (i.e., antivirus, intrusion prevention systems, firewalls) are no longer capable of providing sufficient security guarantees against the rapid escalation of advanced persistent threats and multi-vector attacks. The growing complexity of cyber-attacks are urgently demanding more correlation in space and time of (apparently) independent events and logs, and a higher degree of coordination among different security mechanisms.


*Topics of interest*
This Workshop aims to gather together novel approaches for providing organizations the appropriate situational awareness in relation to cyber security threats allowing them to quickly detect and effectively respond to sophisticated cyber-attacks.

Topics of interest includes but are not limited to:
* Cyber-security platforms and architectures for digital services;
* Security, trust and privacy for industrial systems and the IoT (including smart grids);
* Monitoring and advanced data collection and analytics;
* Virtual and software-based cyber-security functions;
* Orchestration and Automatic Configuration of security functions;
* Novel algorithms and models for attack detection and threat identification;
* Authentication, Authorization and Access control;
* Intelligent attack mitigation and remediation;
* Machine learning, big data, network analytics;
* Secure runtime environments, including trustworthy systems and user devices;
* Formal methods and policies for security and trust;
* Trusted computing;
* Information flow control;
* Risk analysis and management, Audit and Accountability;
* Honeypots, forensics and legal investigation tools;
* Threat intelligence and information sharing;
* Security techniques and new AAA mechanisms for a multi-tenant infrastructure and services;
* ORAN security and threats;
* Programmable data planes security, vulnerabilities and threats;
* Secure storage.

Multi-disciplinary and collaborative research projects are encouraged to submit joint papers describing their integrated architectures and cyber-security platforms, with special emphasis on how they address the challenging cyber-security requirements of softwarized environments and critical infrastructures.


------------------------------
SUBMISSION GUIDELINES
------------------------------

*Paper submissions*
Interested authors are invited to submit papers according to the following guidelines:
* papers must be up to 6 pages long, including tables, figures and references;
* the style to be used is IEEE 2-column US-letter style using IEEE Conference template, and papers must be submitted in pdf format.

Accepted and presented workshop papers will be published in the conference proceedings and will be submitted to IEEE Xplore.
Only PDF files will be accepted for the review process and all manuscripts must be electronically submitted through EDAS: https://edas.info/N30702.

Important: Please check NetSoft 2023 publication and no-show policy on the conference website at https://netsoft2023.ieee-netsoft.org/authors/publication-and-no-show-policy/.


For more information, please visit the Workshop website:
https://www.secsoft-workshop.org/


------------------------------
CHAIRS
------------------------------

*TPC Co-Chairs*
Antonio Lioy, Politecnico di Torino, Italy
Marco Rasori, IIT-CNR, Italy
Paola Grosso, University of Amsterdam, Netherlands

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISCSO 2024   Multi-Objective Optimization Competition
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ISSSR 2025   The 11th IEEE International Symposium on System Security, Safety, and Reliability
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
AISCA 2025   International Conference on Artificial Intelligence, Soft Computing And Applications