posted by organizer: cacoe || 1493 views || tracked by 3 users: [display]

CACOE 2019 : International Workshop on Cyber Range Technologies and Applications

FacebookTwitterLinkedInGoogle

Link: https://cacoe.ait.ac.at/
 
When Jun 20, 2019 - Jun 20, 2019
Where Stockholm, Sweden
Submission Deadline Mar 1, 2019
Notification Due Apr 2, 2019
Final Version Due Apr 16, 2019
Categories    security   situational awareness   infrastructures   cyber security
 

Call For Papers

======================================================================
CACOE 2019 – CALL FOR PAPERS
Workshop on Cyber Range Technologies and Applications (CACOE)
June 20, 2019

In conjunction with the 4th IEEE European Symposium on Security and Privacy
June 17-19, 2019, Stockholm, Sweden

WWW: https://cacoe.ait.ac.at/
======================================================================

The Cyber Range Technologies and Applications (CACOE) workshop aims to bring together researchers advancing, developing and maintaining cyber ranges (e.g., cyber-physical labs, clouds and other virtual platforms) supporting cyber security training, tests and exercises. The CACOE19 workshop will be held on June 20, 2019 in Stockholm, Sweden.

Cyber ranges have emerged as a response to the need of high-fidelity environments for testing, training, exercising capabilities related to cyber security. They are typically based on virtualization technology and are used to set up complex computer networks, simulate events, and observe phenomena in a controlled environment. However, to set up realistic tests, training or exercises in a cyber range is often difficult, expensive and error prone. It can be seen as system administration on steroids, where a few range engineers are to rapidly build and manage networks of the size that it typically takes a whole IT department to manage. There are many issues related to technical support tools (e.g. deployment of virtual machines) that are yet to be solved and many management issues (e.g. of event data management) that are to be solved. Furthermore, the application of cyber ranges to tests, training, and exercises is relatively new. Methodologies for constructing large events, standards for experiments, and the utility of cyber ranges to different applications is largely unknown.

AIM & SCOPE
============
The aim of the workshop is to exchange and discuss technologies and infrastructures required to simulate real systems with cyber incidents (e.g., simulation of benign or malicious users, evaluation frameworks, capability measurement). This includes experiences from using such technologies, e.g. for exercises and tests. The workshop will not focus on product presentations, feature presentations or marketing of various technical infrastructures for cyber security training and exercises.

We invite papers from researchers and practitioners working in security, systems engineering, situational awareness and related areas to submit their original papers to this workshop. Case studies (successful or not) related to cyber ranges are also encouraged.

Topics of interest include, but are not limited to:
-Design of large-scale exercises
-Design of experiments
-Analysis/reviews/tests of tools and components for building large technical infrastructures
-Automated machine configuration and deployment
-Event and scenario management
-Simulation of benign or malicious users
-Event monitoring and evaluation
-Data management
-Event operating environments and scenarios modelling
-Metrics and maturity levels
-Measurements of training effects and capabilities
-Applications to test cyber security properties
-Human factors in training and exercises
-Software as a Service (SaaS) solutions
-Security and privacy challenges
-Simulation of tools and components from various systems (e.g., industrial control systems, cyber-physical systems, legacy systems, etc.)

IMPORTANT DATES
================
Papers submission deadline: -- extended to March 1, 2019
Notification date: April 2, 2019
Camera-ready submission: April 16, 2019
Workshop: June 20, 2019

For further details, please see the workshop website https://cacoe.ait.ac.at/

SUBMISSON INSTRUCTIONS
=======================
Papers must not exceed 8 pages total (including the references and appendices). Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. Papers must be typeset in LaTeX in A4 format (not “US Letter”) using the IEEE conference proceeding template with the appropriate options. For further details and submission instructions, please see the workshop website https://cacoe.ait.ac.at/

WORKSHOP CO-CHAIRS
====================
Maria Leitner, Austrian Institute of Technology, Center for Digital Safety & Security
Teodor Sommestad, Swedish Defence Research Agency FOI

Related Resources

SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ACMSIBlock 2019   SI ACM TOIT: Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems
SP 2020   IEEE Symposium on Security and Privacy
eCrime 2019   eCrime - Symposium on Electronic Crime Research
ICEMAT--Ei and Scopus 2020   2020 2nd International Conference on Energy Management and Applications Technologies (ICEMAT 2020)--Ei Compendex & Scopus
ICEMAT--Ei Compendex and Scopus 2020   2020 2nd International Conference on Energy Management and Applications Technologies (ICEMAT 2020)--Ei Compendex & Scopus
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
VISAPP 2020   15th International Conference on Computer Vision Theory and Applications
IWUAS 2020   2020 International Workshop on Unmanned Aircraft Systems (IWUAS 2020)
CODASPY 2020   10th ACM Conference on Data and Application Security and Privacy