posted by user: jsu1 || 5562 views || tracked by 8 users: [display]

ACySe 2014 : International Workshop on Agents and CyberSecurity


When May 5, 2014 - May 6, 2014
Where Paris (France)
Submission Deadline Feb 5, 2014
Categories    security   cyber security   agents   artificial intelligence

Call For Papers

The First International Workshop on Agents and CyberSecurity
ACySe 2014
Web page:

To be held with AAMAS 2014 (
5 - 9 May, 2014, Paris, France

Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets, ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud Computing, Smart Grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. The focus of this workshop is to provide a forum to discuss and advance cyber security by means of agent-based approaches.

Specific topics for this workshop include, but are not limited to:
* Access Control Models
* Adversarial Modelling
* Cloud Computing Security/Privacy
* Collective Decision Making for Access Control
* Contextual Integrity
* Communication Resilience and Robustness
* Critical Infrastructure Protection
* Cyber-dependent and Cyber-enabled Crime
* CyberWar and CyberWeapons
* Denial of Service/ Distributed Denial of Service (DoS/DDoS)
* Digital Forensics Investigation
* Disclosure/Self-disclosure Decision Making
* e-Crime Science
* Game-theoretic approaches to Security and Privacy
* Human Behaviour Modelling
* Human Privacy Attitudes
* Identity Theft
* Information Leakage
* Information-theoretic approaches to Security/Privacy
* Insider Threat
* Institutional and Social Privacy
* Intrusion Detection/Prevention Systems (Agent-based IDS/IPS, Adaptive IDS/IPS, Collaborative IDS/IPS)
* Learning Security/Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control Models
* Negotiation of Security/Privacy Policies
* Penetration Testing
* Privacy and Personal Information Protection
* Recommendation of Security/Privacy Policies
* Relationship-based Access Control Models
* Risk Management
* Risk Mitigation Strategies
* Social Media Security/Privacy
* Spoofing and Countermeasures
* Steganography
* User Profiling and Countermeasures
* Zero-day attacks

* Paper Sumbission Deadline: JANUARY 22, 2014
* Paper Acceptance Notification: FEBRUARY 19, 2014
* Camera-ready copies due: MARCH 10, 2014
* Workshop Date: MAY 5-9, 2014

* Natalia Criado (University of Bolton, UK)
* Martin Rehak (Cisco Systems/CTU, Czech Republic)
* Jose M. Such (Lancaster University, UK)
* Laurent Vercouter (INSA de Rouen/LITIS Laboratory, France)

Javier Bajo (Universidad Politecnica de Madrid, Spain)
Olivier Boissier (Ecole des Mines de St-Etienne, France)
Piero Bonatti (Universita' di Napoli Federico II, Italy)
Gregory Bonnet (GREYC, France)
Vicent Botti (Universitat Politecnica de Valencia, Spain)
Pascal Bouvry (University of Luxemburg, Luxemburg)

Frances Brazier (TU Delft, Netherlands)
Ioana Boureanu (HEIG-VD, Switzerland)
Alvaro A. Cardenas (University of Texas at Dallas, USA)
Javier Carbo (Universidad Carlos III, Spain)
Marco Carvalho (Florida Institute of Technology and IHMC, USA)
Carlos Cid (Royal Holloway University of London, UK)
Natalia Criado (University of Bolton, UK)
Grégoire Dany (University of luxemburg, Luxemburg)
Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)
Andrew Fielder (Imperial College London, UK)
Simone Fischer-Huebner (Karlstad University, Sweden)
Ana Garcia-Fornes (Universitat Politècnica de València, Spain)
Zahia Guessoum (LIP6, France)
Chris Hankin (Imperial College London, UK)
Alvaro Herrero (University of Burgos, Spain)
Dieter Hutter (DFKI, Germany)
Lucas Kello (Harvard University, USA)
Christopher Kiekintveld (University of Texas at El Paso, USA)
Igor Kotenko (SPIIRAS, Russia)
Pavel Laskov (University of Tuebingen, Germany)
Emil Lupu (Imperial College, UK)
Pasquale Malacaria (Queen Mary University of London, UK)
Gregorio Martinez (University of Murcia, Spain)
Peter McBurney (King's College, UK)
Ian M. Molloy (Thomas J. Watson Research Center, USA)
Hala Mostafa (BBN Technologies, USA)
Haralambous Mouratidis (University of East London, UK)
Andrea Omicini (Universita di Bologna, Italy)
Gilbert L. Peterson (Air Force Institue of Technology, USA)
Tomas Pevny (Cisco, Czech Republic)
Guillaume Piolle (Supelec Rennes, France)
David Pym (University College London, UK)
Sarvapali Ramchurn (University of Southampton, UK)
Awais Rashid (Lancaster University, UK)
Omer Rana (Cardiff University, UK)
Martin Rehak (Cisco Systems, Czech Republic)
Michael Rovatsos (University of Edinburgh, UK)
Jordi Sabater-Mir (IIIA-CSIC, Spain)
Carles Sierra (IIIA-CSIC, Spain)
Jose M. Such (Lancaster University, UK)
Wamberto Vasconcelos (University of Aberdeen, UK)
Laurent Vercouter (INSA de Rouen/LITIS lab, France)
Serena Villata (Université Nice Sophia Antipolis, France)
Salvatore Vitabile (University of Palermo, Italy)

Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics, coverage of relevant state of the art and the relevance to cyber security problems.

Submissions must follow ACM format ( and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress.

- Position/Short Papers (2-4 pages) reporting views or ambitions, or describing problems.

Papers must be submitted in pdf format via the conference management system, available at:

Workshop pre-proceedings will be distributed in a USB during the workshop. Moreover, formal workshop proceedings will be published by ACM, in its International Conference Proceedings Series with ISBN.

We are also exploring the possibility of a follow-up special issue in a refereed journal, more details to come shortly.

ACySe Organising Committee (

Related Resources

AAMAS 2018   International Conference on Autonomous Agents and Multiagent Systems (AAMAS-18)
IJCAI 2018   International Joint Conferences on Artificial Intelligence Organization
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ECCV 2018   European Conference on Computer Vision
SCN-CyberIoT 2017   Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
CVPR 2018   Computer Vision and Pattern Recognition
WI 2017   IEEE/WIC/ACM International Conference on Web Intelligence 2017
ACL 2018   56th Annual Meeting of the Association for Computational Linguistics
ICAART 2018   10th International Conference on Agents and Artificial Intelligence
ICPRAI 2018   International Conference on Pattern Recognition and Artificial Intelligence