posted by organizer: bjasiul || 3844 views || tracked by 5 users: [display]

CYBERSEC 2018 : Cyber Security Workshop (CYBERSEC 2018) at the 4th IEEE International Conference on Data Science and Systems (DSS-2018)

FacebookTwitterLinkedInGoogle

Link: https://www.wil.waw.pl/konferencje/CFP_CyberSec2018_v.1.0.pdf
 
When Jun 28, 2018 - Jun 30, 2018
Where Exeter, UK
Submission Deadline Mar 19, 2018
Notification Due Apr 23, 2018
Final Version Due May 15, 2018
Categories    cyber security   security   computer science
 

Call For Papers

Cyber Security Workshop (CYBERSEC 2018) at the 4th IEEE International Conference on Data Science and Systems (DSS-2018)

Exeter, United Kingdom, June 28-30 2018

Conference website: http://cse.stfx.ca/~dss2018/

Workshop website: https://www.wil.waw.pl/konferencje/CFP_CyberSec2018_v.1.0.pdf

(1) Workshop Organizers:

Joanna Śliwa, Ph.D., Head of Department
C4I Systems’ Department
Military Communication Institute, Poland
Tel: +48-26-188-55-11
Email: j.sliwa@wil.waw.pl

Bartosz Jasiul, Ph.D., Head of Laboratory
Cyber Security Laboratory
Military Communication Institute, Poland
Tel: +48-26-188-55-92
Email: b.jasiul@wil.waw.pl

(2) General description

Although awareness about necessary security appliances seems to be common and the tools used for that purpose are getting more and more advanced, the number of successful attacks targeted on computer systems is growing. The evolution towards cloud computing, increasing use of social networks, Internet of Things, mobile and peer-to-peer networking technologies that are intrinsic part of our life today, carrying many conveniences within our personal life, business and government, create many challenges and potential path of malware propagation. The optimal balance between usability and security of the infrastructure is difficult to be defined. Computer systems are usually prone to cyber attacks even though a number of security controls are already deployed. It is getting increasingly difficult to protect the infrastructure and assess its security on the basis of e.g. security audit. Risks derive not only from the technical domain, but very often human factor plays a critical role. The attacker can act from the perimeter of the network but very often finds the weakest element in the infrastructure and uses it to get access to the network. The Advanced Persistent Threats (APTs) and targeted attacks make every infrastructure potentially vulnerable. What is more the metadata related to the data exchange itself and the behaviour of the users registered by the sensors usually becomes big in terms of volume, velocity and variety. To analyse big data researchers use machine learning algorithms, however it is envisioned that the attackers will also use these mechanisms to overcome security controls and more successfully hide in the user traffic. It is therefore important to verify the efficiency of the security controls during cyber exercises that address both technical and human factor in the face of controlled, but real, targeted attack campaign towards a model infrastructure.
The CyberSec Workshop focuses on the diversity of the systems security developments and deployments in order to highlight the most recent challenges and report the latest research results. It is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum for sharing experiences and new ideas concerning emerging aspects of the systems security in different application domains.
Conference as well as the Workshop are sponsored by IEEE, IEEE Computer Society, and IEEE Technical Committee of Scalable Computing (TCSC).

(3) Topics of Interests

This Workshop calls for original papers describing the latest developments, trends, and solutions related to the issues of cyber security. Topics of interests include, but are not limited to:

• Decision support systems for information security
• Risk assessment and risk management in different application domains
• Tools supporting security management and development
• Computer network security
• Cyber-attack detection
• Attack mitigation
• Cyber breaches scientific reports
• Cryptographic solutions
• Network security
• Anomaly detection
• Threat analysis
• IT security monitoring
• Web/mobile application security
• Computer forensics
• Cyber Exercises' organisation and execution - experiences and best practices

(4) Important Dates

• Paper Submission: 19 March 2018
• Authors Notification: 23 April 2018
• Camera-Ready Paper: 15 May 2018
• Early Registration: 15 May 2018
• Conference Date: 28-30 June 2018

(5) Program Committee

• Roberto Di Pietro, HBKU-CSE, Qatar,
• Gerard Frankowski, Poznan Supercomputing and Networking Center, Poland
• Sebastian Garcia, Czech Technical University in Prague, Czech Republic
• Hector Marco Gisbert, University of the West of Scotland, United Kingdom
• Vasileios Gkioulos, Norwegian University of Science and Technology, Norway
• Damas P. Gruska, Comenius University in Bratislava, Slovakia
• Bartosz Jasiul, Military Communication Institute, Poland
• Wojciech Mazurczyk, Warsaw University of Technology, Poland
• Ana Serrano Mamolar, University of the West of Scotland, United Kingdom
• Joanna Sliwa, Military Communication Institute, Poland
• Jerzy Surma, SGH Warsaw School of Economics, Poland
• Marcin Szpyrka, AGH University of Science and Technology, Poland
• Konrad Wrona, NATO Communication and Information Agency, Netherlands

(6) Submission and Publication

Authors are invited to submit original previously unpublished research papers written in English, of up to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). Please find the manuscript templates and submission related information at the DSS-2018 conference webpage. All accepted papers must be presented by one of the authors who must register for the conference and pay the fee.
The papers should be submitted using the EasyChair conference tool:
https://easychair.org/conferences/?conf=cybersec2018.
Presented papers will appear in the conference proceedings, available on IEEE Xplore and submitted to be indexed in CPCi (ISI conferences and part of Web of Science) and Engineering Index (EI).

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
IEEE BigData 2024   2024 IEEE International Conference on Big Data
CSW 2024   2024 3rd International Conference on Cyber Security
BDCAT 2024   IEEE/ACM Int’l Conf. on Big Data Computing, Applications, and Technologies
IEEE ICA 2022   The 6th IEEE International Conference on Agents
S&P 2025   The 45th IEEE Symposium on Security and Privacy
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology