posted by user: cfp387poster || 1230 views || tracked by 2 users: [display]

Cyber Resilience 2017 : Chapters of the Book: Cyber Resilience of Networks and Systems


When N/A
Where N/A
Submission Deadline TBD

Call For Papers

Book Title: Cyber Resilience of Networks and Systems

To be published by Springer

Chapter outline / extended abstract: 15 January 2017
First complete draft: 1 March 2017
Final version: 1 June 2017
Tentative publication date: Late 2017 or early 2018

Dr. Alexander Kott, US Army Research Laboratory, USA; email

Dr. Igor Linkov, US Army Engineer Research and Development Center, USA; email

The intent of the book is to be a pre-designed and carefully edited volume that approximates a book written by a single author. It will present the material in a logical, consistent, continuous discourse, covering all key topics relevant to the field.

Each chapter should be structured approximately as follows:

* The first 40% of the chapter should provide a tutorial overview of the key concepts, ideas, approaches and current results in the chapter's topic
* The next 50% should illustrate and elaborate on some of these concepts by way of presenting a particular research example (likely, but not necessarily your own)
* The remainder should be your thoughts on future developments and promising directions in the chapter's area


Topics of interest:

Cyber Resilience - Key Concepts and Definitions: relations and differentiation from related concepts: security, risk, robustness, reliability, survivability, self-healing, adaptation, agility, cyber maneuver, moving target defense, continuity of operation; fault and disruption tolerance; rapid recovery; cyber insurance; resilience in other fields: organizational theory, biology, psychology, material science

Organizational Processes and Practices: managing and operating towards CR: human (and other intelligent supervisory mechanisms') policies, procedures, organizational techniques; review of NIST, MITRE and other guides; objectives and goals of CR (understand, prepare, prevent, constrain, continue, transform, re-architect); key processes of CR; key best practices and heuristics of CR

Assessing Cyber Resilience: measurements and measures (direct observables); metrics (computed); approaches to experiments and empirical observations; qualitative judgments and indices; methods for measurement, evaluation, or validation of resilience; characterizing capacity for resilience: absorptive capacity, adaptive capacity, restorative capacity

Factors that Affect CR: complexity, resource availability and redundancy; degree of performance optimization, multiplicity of threat types, topology, opportunity for cascading failures, buffering, ability to reject wrong information and make correct inferences; relations of resiliency to other properties: resilience and risk, robustness, reliability, etc.; human factors

Characterizing and Predicting CR via Models and Simulation: conceptual and ontological theories of CR; mathematical models of CR; executable and simulation models; simulation/emulation techniques for network resilience; modeling different types of cyber failures; modeling malicious behavior or attacks on networks; modeling of cascading failures; impact of coupling, interdependencies and topology of influences; self-organized criticality; complex adaptive systems, evolution by selection; modeling of resistance and recovery processes; formal methods for CR; mission impact analysis; impact on QoS

Building and Enhancing Cyber Resilience: design for resilience; cyber resiliency engineering (architectural practices and mechanisms to improve cyber resilience); standardization of network resilience; technical means to key processes and phases of resilient operations (anticipating and avoiding; withstanding and absorbing; recovering and restoring; adapting and reconfiguring); technologies for strengthening resilient operations (monitoring and situational awareness; cyber maneuver during attack, active defense, deceiving and obfuscating; employing redundant resources; finding (forensics) and destroying hostile malware; service and operations continuity; learning and self-learning)

Cyber Resilience of Selected Architectures: Future Internet resilience, P2P and overlay systems, Internet of Things, data centers, wireless-wired communications, wireless sensor networks, emerging communication technologies, vehicle-to-vehicle communications, cloud computing, content-oriented networks architectures and solutions, architectures/solutions, distributed computing, Software-Defined Networks (SDN), cloud architectures, fog architecture

Selected Technical Approaches to Cyber Resilience: control theoretic and game theoretic approaches resilience, artificial intelligence and intelligent systems; biologically inspired approaches such as artificial immune systems;

Case Studies in Cyber Resilience: case studies of actual events in which a complex system has experienced a cyber compromise with subsequent recovery; with lessons learned linked to concepts presented in earlier chapters.

Economics of Resilience: costs, economic tradeoffs, insurance, business aspects

Begin by preparing the outline of your intended chapter and discussing it with the editors. Do not write or submit the chapter without consultations with the editors.

Related Resources

CRE 2020   IEEE International Workshop on Cyber Resiliency: Technologies, Economics and Strategy (CRE 2020)
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
ICDIS 2020   The 3rd International Conference on Data Intelligence and Security
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
CYBER 2020   The Fifth International Conference on Cyber-Technologies and Cyber-Systems
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
ICPS 2020   IEEE International Conference on Industrial Cyber-Physical Systems
CPSIOT 2020   2020 International Conference on Cyber Physical Systems and IoT(CPSIOT 2020)
SCIS 2020   4th IEEE Conference on Smart Cities and Innovative Systems
IWCC 2020   9th International Workshop on Cyber Crime