posted by user: jsu1 || 3773 views || tracked by 8 users: [display]

ACySe 2015 : Second International Workshop on Agents and CyberSecurity

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/acyse2015/
 
When May 4, 2015 - May 5, 2015
Where Istanbul, Turkey
Submission Deadline Feb 11, 2015
Notification Due Mar 10, 2015
Final Version Due Mar 19, 2015
Categories    agents   security   privacy   artificial intelligence
 

Call For Papers

****************************************************************************************
The Second International Workshop on Agents and CyberSecurity
ACySe 2015
https://sites.google.com/site/acyse2015/

To be held with AAMAS 2015 (http://www.aamas2015.com/)
May 4-8, 2015. Istanbul, Turkey

Selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine (JCR 1.92)
****************************************************************************************

------------------------------
DESCRIPTION
------------------------------
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community.

The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of *agent-based approaches*. Specific topics for this workshop include but are not limited to:
* Game-theoretic approaches to Security and Privacy
* Cloud Computing Security and Privacy
* Online Social Networks / Social Computing Security and Privacy
* Advanced Persistent Threats
* Adversarial Modelling
* Automated Vulnerability Assessment / Penetration Testing
* Critical Infrastructure Protection
* CyberCrime and CyberWar
* Data Leakage and Exfiltration
* Denial of Service / Distributed Denial of Service (DoS/DDoS)
* Digital Forensics
* Distributed collaboration patterns of malicious software and their discovery
* Intelligent Access Control Models
* Human Behaviour Modelling and Human Factors
* Insider Threat
* Intrusion Detection/Prevention Systems
* Learning/Recommendation/Negotiation of Security and Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control
* Privacy and Personal Information Protection
* Resilience and Robustness
* Risk Assessment and Management, and Risk Mitigation Strategies


---------------------------------
IMPORTANT DATES
---------------------------------
*Paper Submission Deadline: FEBRUARY 11, 2015
*Paper Acceptance Notification: MARCH 10, 2015
*Camera-ready copies due: MARCH 19, 2015
*Workshop Date: MAY 4-5, 2015

---------------------------------
ORGANIZING COMMITTEE
---------------------------------
*Natalia Criado (Liverpool John Moores University, UK)
*Martin Rehak (Cisco Systems, Czech Republic)
*Jose M. Such (Lancaster University , UK)
*Laurent Vercouter (INSA de Rouen/LITIS lab, France)


---------------------------------
SUBMISSION and REVIEW DETAILS
---------------------------------
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics and taking an agent-based approach, coverage of relevant state of the art and the relevance to cyber security problems.

Submissions must follow AAMAS format (http://www.aamas2015.com/files/downloads/Paper-Submission/aamas2015.cls) and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress.

- Position Papers (2-4 pages) reporting views or ambitions, or describing problems.

Papers must be submitted in pdf format via the conference management system, available at: https://easychair.org/conferences/?conf=acyse2015

----------------------------------
PUBLICATION DETAILS
----------------------------------
Pre-proceedings with all accepted papers are provided electronically on a USB stick as part of the AAMAS workshop registration package. Assuming a sufficient number of high-quality submissions, we will also consider the publication of formal post-proceedings with an international publisher. The proceedings of ACySE 2014 were published by ACM, in its prestigious International Conference Proceedings Series with ISBN.


Authors of selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine.


--------------------------
CONTACT
--------------------------
ACySe Organising Committee (acyse2015@easychair.org)

Related Resources

ICAART 2017   International Conference on Agents and Artificial Intelligence
NIPS 2017   The Thirty-first Annual Conference on Neural Information Processing Systems
WI 2017   IEEE/WIC/ACM International Conference on Web Intelligence 2017
ICONIP 2017   International Conference on Neural Information Processing
AAMAS 2017   International Conference on Autonomous Agents and Multiagent Systems
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
MAICS 2017   The 28th Modern Artificial Intelligence and Cognitive Science Conference
IUI 2017   Intelligent User Interfaces
PAAMS 2017   15th International Conference on Practical Applications of Agents and Multi-Agent Systems
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations