posted by organizer: wmazurczyk || 2068 views || tracked by 3 users: [display]

BioSTAR 2018 : 3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience


When May 24, 2018 - May 24, 2018
Where San Francisco, CA, US
Submission Deadline Jan 25, 2018
Notification Due Feb 15, 2018
Final Version Due Mar 5, 2018
Categories    bio-inspired security   cyber security   information security   network security

Call For Papers

3rd International Workshop on Bio-inspired Security, Trust, Assurance
and Resilience (BioSTAR 2018) co-located with 39th IEEE Symposium on
Security and Privacy (IEEE S&P 2018)

May 24, 2018,
The Hyatt Regency, San Francisco, CA, USA

Workshop website:

January 25 (EXTENDED), 2018: Regular Paper Submission
February 15, 2018: Notification Date
March 5, 2018: Camera-Ready Paper Deadline

The extended versions of all accepted papers will be considered for
publication in a special issue of the Journal of Cyber Security and
Mobility (confirmed!).

As computing and communication systems continue to expand and offer new
services, these advancements require more dynamic, diverse, and
interconnected computing infrastructures. Unfortunately, defending and
maintaining resilient and trustworthy operation of these complex systems
are increasingly difficult challenges. Conventional approaches to
Security, Trust, Assurance and Resilience (STAR for short) are often too
narrowly focused and cannot easily scale to manage large, coordinated
and persistent attacks in these environments. Designs found in nature
are increasingly used as a source of inspiration for STAR and related
networking and intelligence solutions for complex computing and
communication environments.

Nature's footprint is present in the world of Information Technology,
where there are an astounding number of computational bio-inspired
techniques. These well-regarded approaches include genetic algorithms,
neural networks, ant algorithms, immune systems just to name a few. For
example several networking management and security technologies have
successfully adopted some of nature's approaches, such as swarm
intelligence, artificial immune systems, sensor networks, moving target
defense, diversity-based software design, etc.

Nature has also developed an outstanding ability to recognize
individuals or foreign objects and adapt/evolve to protect a group or a
single organism. Solutions that incorporate these nature-inspired
characteristics often have improved performance and/or provided new
capabilities beyond more traditional methods.

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of nature-inspired STAR aspects in computing and communications.
Topics of interests include, but are not limited to:
- Nature-inspired anomaly and intrusion detection
- Adaptation algorithms
- Biometrics
- Nature-inspired algorithms and technologies for STAR
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for STAR
- Nature-inspired analytics and prediction
- Cognitive systems
- Sensor and actuator networks and systems
- Information hiding solutions (steganography, watermarking) for
network traffic
- Cooperative defense systems
- Cloud-supported nature-inspired STAR
- Theoretical development in heuristics
- Management of decentralized networks
- Nature-inspired algorithms for dependable networks
- Platforms for STAR services
- Diversity in computing and communications
- Survivable and sustainable systems
- STAR management systems
- Autonomic cyber defenses

The workshop is an interesting supplement for the IEEE Security and
Privacy 2018 in area of security & communication networks.


Papers will be accepted based on peer review (3 per paper) and should
contain original, high quality work. All papers must be written in English.

Authors are invited to submit Regular Papers (maximum 6 pages) via
EasyChair ( Papers
accepted by the workshop will be published in the Conference Proceedings
published by IEEE Computer Society Press.

Papers must be formatted for US letter (not A4) size paper with margins
of at least 3/4 inch on all sides. The text must be formatted in a
two-column layout, with columns no more than 9 in. high and 3.375 in.
wide. The text must be in Times font, 10-point or larger, with 12-point
or larger line spacing. Authors are encouraged to use the IEEE
conference proceedings templates. Failure to adhere to the page limit
and formatting requirements will be grounds for rejection.

The extended versions of all accepted papers will be considered for
publication in a special issue of the Journal of Cyber Security and
Mobility (confirmed!).

Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, NC, USA
Mohamed Eltoweissy, Virginia Military Institute, USA
Kenji Leibnitz, National Institute of Information and Communications
Technology, Japan
Nina Fefferman, University of Tennessee, Knoxville, USA

For any enquiries please contact us at:

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
COIT 2022   2nd International Conference on Computing and Information Technology
Bio-inspired Deep Learning 2021   Bio-inspired Deep Learning Image and Signal Processing Pipelines in Medical Oncology - PeerJ
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
EAI BICT 2021   13th EAI International Conference on Bio-inspired Information and Communications Technologies (Springer, Scopus, ISI, Ei, more)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
BIOSIGNALS 2022   15th International Conference on Bio-inspired Systems and Signal Processing
EvoStar 2022   EvoStar 2022: The Leading European Event on Bio-Inspired Computation.
IEEE-CISNS 2021   2021 2nd International Conference on Information System and Network Security (CISNS 2021)