posted by organizer: sgandurra || 3385 views || tracked by 3 users: [display]

CYSARM 2019 : Workshop on Cyber-Security Arms Race

FacebookTwitterLinkedInGoogle

Link: https://www.cysarm.org/
 
When Nov 15, 2019 - Nov 15, 2019
Where London, UK
Submission Deadline Jul 14, 2019
Notification Due Aug 7, 2019
Final Version Due Aug 30, 2019
Categories    security   trusworthiness   cryptography   systems
 

Call For Papers

Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. The goal of CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-offs of cybersecurity and how new security technologies and algorithms might impact the security of existing or future security models.

Topics of interest include but are not limited to:

-Arms races and trade-offs in cyber-security (e.g., attackers vs defenders, security vs privacy, security vs trust, security vs usability, etc.)
-Double-edged sword techniques in cyber-security (e.g., artificial intelligence)
-Impact of quantum computing on cyber-security (not limited to cryptography)
-Intrusion detection and evasion, and counter-evasion (also applied to malware analysis)
-Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
-Novel attacks and protection solutions in mobile, IoT and Cloud
-Security analysis of protocols, including use of formal techniques
-Standardization of cyber security and trust techniques
-Validation of cyber-security technologies
-Post-quantum cryptography and advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)

For more information, please see: https://www.cysarm.org/

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
DMMLACS 2022   3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
BIOM 2022   2nd International Conference on Big Data, IoT and Machine Learning
BDACCIP 2022   The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
ICCSAITCS 2022   International Conference on Cyber Security, Artificial Intelligence and Theoretical Computer Science
SECURWARE 2022   International Conference on Emerging Security Information, Systems and Technologies
MODELS 2022   MODELS 2022 : ACM/IEEE 25th International Conference on Model Driven Engineering Languages and Systems