posted by user: cacoe || 2962 views || tracked by 2 users: [display]

CACOE 2021 : Workshop on Cyber Range Technologies and Applications

FacebookTwitterLinkedInGoogle

Link: https://cacoe.ait.ac.at/
 
When Sep 7, 2021 - Sep 7, 2021
Where Virtual
Submission Deadline May 14, 2021
Notification Due Jun 25, 2021
Final Version Due Jul 16, 2021
Categories    cyber range   security   cyber exercises   infrastructures
 

Call For Papers

======================================================================
CACOE 2021 – CALL FOR PAPERS
Workshop on Cyber Range Technologies and Applications (CACOE)
September 7, 2021

In conjunction with the 6th IEEE European Symposium on Security and Privacy 2021.

WWW: https://cacoe.ait.ac.at/
======================================================================

The Cyber Range Technologies and Applications (CACOE) workshop aims to bring together researchers advancing, developing and maintaining cyber ranges (e.g., cyber-physical labs, clouds and other virtual platforms) supporting cyber security training, tests and exercises. Cyber ranges have emerged as a response to the need of high-fidelity environments for testing, training, exercising capabilities related to cyber security. They are typically based on virtualization technology and are used to set up complex computer networks, simulate events, and observe phenomena in a controlled environment. However, to set up realistic tests, training or exercises in a cyber range is often difficult, expensive and error prone. It can be seen as system administration on steroids, where a few range engineers are to rapidly build and manage networks of the size that it typically takes a whole IT department to manage. There are many issues related to technical support tools (e.g. deployment of virtual machines) that are yet to be solved and many management issues (e.g. of event data management) that are to be solved. Furthermore, the application of cyber ranges to tests, training, and exercises is relatively new. Methodologies for constructing large events, standards for experiments, and the utility of cyber ranges to different applications is largely unknown.

AIM & SCOPE
============
The aim of the workshop is to exchange and discuss technologies and infrastructures required to simulate real systems with cyber incidents (e.g., simulation of benign or malicious users, evaluation frameworks, capability measurement). This includes experiences from using such technologies, e.g. for exercises and tests. The workshop will not focus on product presentations, feature presentations nor marketing of various technical infrastructures for cyber security training and exercises.

We invite papers from researchers and practitioners working in security, systems engineering, situational awareness and related areas to submit their original papers to this workshop. Case studies (successful or not) related to cyber ranges are also encouraged.

Topics of interest include, but are not limited to:

Design of large-scale exercises
Design of experiments
Analysis/reviews/tests of tools and components for building large technical infrastructures
Automated machine configuration and deployment
Event and scenario management
Simulation of benign or malicious users
Event monitoring and evaluation
Data management
Event operating environments and scenarios modelling
Metrics and maturity levels
Measurements of training effects and capabilities
Applications to test cyber security properties
Human factors in training and exercises
Software as a Service (SaaS) solutions
Security and privacy challenges
Simulation of tools and components from various systems (e.g., industrial control systems, cyber-physical systems, legacy systems, etc.)

IMPORTANT DATES
================
For further details, please see the workshop website https://cacoe.ait.ac.at/

SUBMISSON INSTRUCTIONS
=======================
Papers must not exceed 10 pages total (including the references and appendices). Papers must be typeset in LaTeX in A4 format (not “US Letter”) using the IEEE conference proceeding template we supply eurosp-2020-template.zip. We suggest you first compile the supplied LaTeX source as is, checking that you obtain the same PDF as the one supplied, and then write your paper into the LaTeX template, replacing the boilerplate text. Please do not use other IEEE templates. Failure to adhere to the page limit and formatting requirements can be grounds for rejection. For further details and submission instructions, please see the workshop website https://cacoe.ait.ac.at/

WORKSHOP CO-CHAIRS
====================
Maria Leitner, AIT Austrian Institute of Technology & Security & University of Vienna
Teodor Sommestad, Swedish Defence Research Agency FOI

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
CETA 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
AMBIENT 2025   The Fifteenth International Conference on Ambient Computing, Applications, Services and Technologies
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE/ION PLANS: AI-Enhanced Navigation 2025   IEEE/ION PLANS: TRACK D - Applications of Localization Technologies - AI-Enhanced Navigation
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2