posted by organizer: Clive || 4752 views || tracked by 11 users: [display]

Cyberpatterns 2013 : Cyberpatterns 2013: The Second International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns

FacebookTwitterLinkedInGoogle

Link: http://tech.brookes.ac.uk/CyberPatterns2013
 
When Jul 8, 2013 - Jul 9, 2013
Where Abingdon, near Oxford UK
Submission Deadline Jun 16, 2013
Notification Due Jun 23, 2013
Categories    cybersecurity   formal methods   software engineering   digital forensics
 

Call For Papers

Cyberpatterns 2013 Call for Abstracts deadlime 16 June 2013
The Second International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns

8-9 July 2013, Abingdon, Oxfordshire. UK.

16 June 2013: 2 page abstract deadline

SUMBISSION WEBSITE: https://www.easychair.org/conferences/?conf=cyberpatterns2013
WORKSHOP WEBSITE http://tech.brookes.ac.uk/CyberPatterns2013

Contact Clive Blackwell, Oxford Brookes University, UK, Email: cblackwell@brookes.ac.uk

SUBMISSIONS
Further contributions for presentation at the workshop and inclusion in the workshop proceedings are requested for two page abstracts (circa 750 words). All submission should be in PDF format and follow the Springer LNCS style and formatting guidelines at:
http://www.springer.de/comp/lncs
Submissions should be made by 16 June 2013 through the workshop’s EasyChair submission web site at:
https://www.easychair.org/conferences/?conf=cyberpatterns2013

All submissions must be original work, not published or submitted elsewhere. All abstracts will be refereed by at least three reviewers. Abstracts will be selected based on their originality, timeliness, significance, relevance and clarity. The notification decision will be made by 23 June 2013. At least one author of each accepted abstract will be required to present at the workshop.

This is the 2nd Cyberpatterns Workshop to be held in the Grade II listed Cosener’s House. Details and proceedings of the first workshop can be found at http://tech.brookes.ac.uk/CyberPatterns2012. The workshop is inspired by existing work on the study of software design patterns and a vision of applying them to cybersecurity. There is widespread research in design patterns as representations of solutions to recurring design problems, including a growing body of knowledge of security patterns in designing and implementing robust defensive controls. Patterns also help us analyse security incidents, with possible adversarial behaviour modelled by attack patterns. There is significant interest on classifying incidents with attack patterns, as with the substantial catalogue in the CAPEC taxonomy. The emergence of patterns in modelling organisations and digital forensics could also be significant. Patterns are also important in pattern-matching algorithms widely used for detecting and responding to malicious activities.

The aim of the workshop is to explore commonalities and differences between the notions and uses of patterns in these various fields and to conceptualise them in a unified framework, in order to help put cybersecurity on a firmer theoretical foundation and provide aid in engineering secure systems. It will bring together interested parties from academia, industry and government to discuss issues of common interest to help bridge the gap between theory and practice.

TOPICS
Authors are invited to submit short abstracts that contribute to the workshop aims. Submissions may reflect, in the context of cybersecurity, on questions such as:
• What are the benefits and achievements of patterns in particular domains?
• What are the barriers to pattern uptake and how might these be overcome?
• How might the insights gained through using patterns in one domain generalise to others?
• What are the similarities and differences between prescriptive design patterns and descriptive patterns such as attack patterns?
• What is the relationship between design patterns and pattern matching?
• How do patterns help to underpin a ‘science of security’?
• How do patterns contribute to knowledge reuse and engineering practice?
• What are the key issues facing practitioners that can be aided by patterns?
• Where are good cases studies showing the benefits and potential of the pattern abstraction?

ORGANISED AND SPONSORED BY
• Oxford Brookes University
SUPPORTED BY
• BCS Information Security Specialist Group
• BCS Formal Aspects of Computing Science Specialist Group
• BCS Cybercrime Forensics Specialist Group

IMPORTANT DATES
• 16 June 2013: Abstract submission deadline
• 30 May 2013: Paper submission deadline
• 23 June 2013: Notification of selection of abstracts for presentation and inclusion in the proceedings
• 14 June 2013: Notification of selection of papers for presentation and inclusion in the proceedings
• 17 June 2013: Registration deadline
• 8-9 July 2013: Workshop

PC CO-CHAIRS:
• Ian Bayley, Oxford Brookes University, UK Email: ibayley@brookes.ac.uk
• Clive Blackwell, Oxford Brookes University, UK, Email: cblackwell@brookes.ac.uk

PROGRAM COMMITTEE (more to be added)
• Stefan Axelsson, Blekinge Institute of Technology,
Sweden
• Benjamin Aziz, Portsmouth University, UK
• Sean Barnum, MITRE Corporation, USA
• Jonathan Bowen, London South Bank University
and Museophile Limited, UK
• Bill Buchanan, Edinburgh Napier Univ., UK
• Ian Bryant, De Montfort University, UK
• Nathan Clarke, University of Plymouth, UK
• David Duce, Oxford Brookes University, UK
• Denis Edgar-Nevill, Canterbury Christ Church
University, UK
• Barbara Endicott-Popovsky, Washington Univ.,
USA
• Shamal Faily, Oxford University, UK
• Steven Furnell, University of Plymouth, UK
• Michael Goldsmith, Oxford University, UK
• James Heather, University of Surrey, UK
• Les Hatton, Kingston University, UK
• Nigel Jones, Cranfield University, UK.
• Paul Kearney, BT, UK
• Kevin Lano, King's College London, UK
• Shaoying Liu, Hosei University, Japan
• Carsten Maple, University of Bedfordshire, UK
• Madjid Merabti, Liverpool John Moores
University, UK
• Faye Mitchell, Oxford Brookes University, UK
• Gareth Niblett, BCS Information Security
Specialist Group, UK
• Richard Overill, King’s College London, UK
• Luca Pino, City University, UK
• Alberto E. Schaeffer-Filho, Lancaster Univ., UK
• Nicolas Sklavos, TEI of Patras, Greece
• George Spanoudakis, City University, UK
• Tim Storer, Glasgow University, UK
• Dianxiang Xu, Dakota State University, USA
• Hong Zhu, Oxford Brookes University, UK

Related Resources

CSW 2024   2024 3rd International Conference on Cyber Security
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
ISDEA 2024   2024 3rd International Conference on Intelligent Systems Design and Engineering Applications (ISDEA 2024)
ACM ICMLT 2024   ACM--2024 9th International Conference on Machine Learning Technologies (ICMLT 2024)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
SESBC 2024   5th International Conference on Software Engineering, Security and Blockchain
DDECS 2024   27th International Symposium on Design and Diagnostics of Electronic Circuits and Systems
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)