posted by user: cfp387poster || 631 views || tracked by 2 users: [display]

Cyber Resilience 2017 : Chapters of the Book: Cyber Resilience of Networks and Systems

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline TBD
 

Call For Papers

CALL FOR BOOK CHAPTERS
----------------------------------------
Book Title: Cyber Resilience of Networks and Systems

To be published by Springer


IMPORTANT DATES:
--------------------------
Chapter outline / extended abstract: 15 January 2017
First complete draft: 1 March 2017
Final version: 1 June 2017
Tentative publication date: Late 2017 or early 2018

EDITORS:
--------------
Dr. Alexander Kott, US Army Research Laboratory, USA; email Alexander.Kott1.civ@mail.mil

Dr. Igor Linkov, US Army Engineer Research and Development Center, USA; email Igor.Linkov@usace.army.mil



The intent of the book is to be a pre-designed and carefully edited volume that approximates a book written by a single author. It will present the material in a logical, consistent, continuous discourse, covering all key topics relevant to the field.

Each chapter should be structured approximately as follows:

* The first 40% of the chapter should provide a tutorial overview of the key concepts, ideas, approaches and current results in the chapter's topic
* The next 50% should illustrate and elaborate on some of these concepts by way of presenting a particular research example (likely, but not necessarily your own)
* The remainder should be your thoughts on future developments and promising directions in the chapter's area

=====

Topics of interest:

Cyber Resilience - Key Concepts and Definitions: relations and differentiation from related concepts: security, risk, robustness, reliability, survivability, self-healing, adaptation, agility, cyber maneuver, moving target defense, continuity of operation; fault and disruption tolerance; rapid recovery; cyber insurance; resilience in other fields: organizational theory, biology, psychology, material science

Organizational Processes and Practices: managing and operating towards CR: human (and other intelligent supervisory mechanisms') policies, procedures, organizational techniques; review of NIST, MITRE and other guides; objectives and goals of CR (understand, prepare, prevent, constrain, continue, transform, re-architect); key processes of CR; key best practices and heuristics of CR

Assessing Cyber Resilience: measurements and measures (direct observables); metrics (computed); approaches to experiments and empirical observations; qualitative judgments and indices; methods for measurement, evaluation, or validation of resilience; characterizing capacity for resilience: absorptive capacity, adaptive capacity, restorative capacity

Factors that Affect CR: complexity, resource availability and redundancy; degree of performance optimization, multiplicity of threat types, topology, opportunity for cascading failures, buffering, ability to reject wrong information and make correct inferences; relations of resiliency to other properties: resilience and risk, robustness, reliability, etc.; human factors

Characterizing and Predicting CR via Models and Simulation: conceptual and ontological theories of CR; mathematical models of CR; executable and simulation models; simulation/emulation techniques for network resilience; modeling different types of cyber failures; modeling malicious behavior or attacks on networks; modeling of cascading failures; impact of coupling, interdependencies and topology of influences; self-organized criticality; complex adaptive systems, evolution by selection; modeling of resistance and recovery processes; formal methods for CR; mission impact analysis; impact on QoS

Building and Enhancing Cyber Resilience: design for resilience; cyber resiliency engineering (architectural practices and mechanisms to improve cyber resilience); standardization of network resilience; technical means to key processes and phases of resilient operations (anticipating and avoiding; withstanding and absorbing; recovering and restoring; adapting and reconfiguring); technologies for strengthening resilient operations (monitoring and situational awareness; cyber maneuver during attack, active defense, deceiving and obfuscating; employing redundant resources; finding (forensics) and destroying hostile malware; service and operations continuity; learning and self-learning)

Cyber Resilience of Selected Architectures: Future Internet resilience, P2P and overlay systems, Internet of Things, data centers, wireless-wired communications, wireless sensor networks, emerging communication technologies, vehicle-to-vehicle communications, cloud computing, content-oriented networks architectures and solutions, architectures/solutions, distributed computing, Software-Defined Networks (SDN), cloud architectures, fog architecture

Selected Technical Approaches to Cyber Resilience: control theoretic and game theoretic approaches resilience, artificial intelligence and intelligent systems; biologically inspired approaches such as artificial immune systems;

Case Studies in Cyber Resilience: case studies of actual events in which a complex system has experienced a cyber compromise with subsequent recovery; with lessons learned linked to concepts presented in earlier chapters.

Economics of Resilience: costs, economic tradeoffs, insurance, business aspects

SUBMISSION:
-------------------
Begin by preparing the outline of your intended chapter and discussing it with the editors. Do not write or submit the chapter without consultations with the editors.

Related Resources

BioSTAR 2018   3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience
ISUAVs 2018   Second Call for Book Chapters: IET Imaging and Sensing for Unmanned Aerial Vehicles
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
BDA4CID 2017   2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
eCrime 2018   13th Symposium on Electronic Crime Research
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
BDACCIP 2017   The First International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment