posted by user: jsu1 || 7897 views || tracked by 9 users: [display]

ACySe 2014 : International Workshop on Agents and CyberSecurity

FacebookTwitterLinkedInGoogle

Link: http://sites.google.com/site/acyseaamas2014/
 
When May 5, 2014 - May 6, 2014
Where Paris (France)
Submission Deadline Feb 5, 2014
Categories    security   cyber security   agents   artificial intelligence
 

Call For Papers

****************************************************************************************
The First International Workshop on Agents and CyberSecurity
ACySe 2014
Web page: http://sites.google.com/site/acyseaamas2014/

To be held with AAMAS 2014 (http://aamas2014.lip6.fr)
5 - 9 May, 2014, Paris, France
****************************************************************************************

------------------------------
DESCRIPTION
------------------------------
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets, ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud Computing, Smart Grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. The focus of this workshop is to provide a forum to discuss and advance cyber security by means of agent-based approaches.

Specific topics for this workshop include, but are not limited to:
* Access Control Models
* Adversarial Modelling
* Cloud Computing Security/Privacy
* Collective Decision Making for Access Control
* Contextual Integrity
* Communication Resilience and Robustness
* Critical Infrastructure Protection
* Cyber-dependent and Cyber-enabled Crime
* CyberWar and CyberWeapons
* Denial of Service/ Distributed Denial of Service (DoS/DDoS)
* Digital Forensics Investigation
* Disclosure/Self-disclosure Decision Making
* e-Crime Science
* Game-theoretic approaches to Security and Privacy
* Human Behaviour Modelling
* Human Privacy Attitudes
* Identity Theft
* Information Leakage
* Information-theoretic approaches to Security/Privacy
* Insider Threat
* Institutional and Social Privacy
* Intrusion Detection/Prevention Systems (Agent-based IDS/IPS, Adaptive IDS/IPS, Collaborative IDS/IPS)
* Learning Security/Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control Models
* Negotiation of Security/Privacy Policies
* Penetration Testing
* Privacy and Personal Information Protection
* Recommendation of Security/Privacy Policies
* Relationship-based Access Control Models
* Risk Management
* Risk Mitigation Strategies
* Social Media Security/Privacy
* Spoofing and Countermeasures
* Steganography
* User Profiling and Countermeasures
* Zero-day attacks

---------------------------------
IMPORTANT DATES
---------------------------------
* Paper Sumbission Deadline: JANUARY 22, 2014
* Paper Acceptance Notification: FEBRUARY 19, 2014
* Camera-ready copies due: MARCH 10, 2014
* Workshop Date: MAY 5-9, 2014

---------------------------------
ORGANIZING COMMITTEE
---------------------------------
* Natalia Criado (University of Bolton, UK)
* Martin Rehak (Cisco Systems/CTU, Czech Republic)
* Jose M. Such (Lancaster University, UK)
* Laurent Vercouter (INSA de Rouen/LITIS Laboratory, France)

---------------------------------
PROGRAM COMMITTEE
---------------------------------
Javier Bajo (Universidad Politecnica de Madrid, Spain)
Olivier Boissier (Ecole des Mines de St-Etienne, France)
Piero Bonatti (Universita' di Napoli Federico II, Italy)
Gregory Bonnet (GREYC, France)
Vicent Botti (Universitat Politecnica de Valencia, Spain)
Pascal Bouvry (University of Luxemburg, Luxemburg)

Frances Brazier (TU Delft, Netherlands)
Ioana Boureanu (HEIG-VD, Switzerland)
Alvaro A. Cardenas (University of Texas at Dallas, USA)
Javier Carbo (Universidad Carlos III, Spain)
Marco Carvalho (Florida Institute of Technology and IHMC, USA)
Carlos Cid (Royal Holloway University of London, UK)
Natalia Criado (University of Bolton, UK)
Grégoire Dany (University of luxemburg, Luxemburg)
Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)
Andrew Fielder (Imperial College London, UK)
Simone Fischer-Huebner (Karlstad University, Sweden)
Ana Garcia-Fornes (Universitat Politècnica de València, Spain)
Zahia Guessoum (LIP6, France)
Chris Hankin (Imperial College London, UK)
Alvaro Herrero (University of Burgos, Spain)
Dieter Hutter (DFKI, Germany)
Lucas Kello (Harvard University, USA)
Christopher Kiekintveld (University of Texas at El Paso, USA)
Igor Kotenko (SPIIRAS, Russia)
Pavel Laskov (University of Tuebingen, Germany)
Emil Lupu (Imperial College, UK)
Pasquale Malacaria (Queen Mary University of London, UK)
Gregorio Martinez (University of Murcia, Spain)
Peter McBurney (King's College, UK)
Ian M. Molloy (Thomas J. Watson Research Center, USA)
Hala Mostafa (BBN Technologies, USA)
Haralambous Mouratidis (University of East London, UK)
Andrea Omicini (Universita di Bologna, Italy)
Gilbert L. Peterson (Air Force Institue of Technology, USA)
Tomas Pevny (Cisco, Czech Republic)
Guillaume Piolle (Supelec Rennes, France)
David Pym (University College London, UK)
Sarvapali Ramchurn (University of Southampton, UK)
Awais Rashid (Lancaster University, UK)
Omer Rana (Cardiff University, UK)
Martin Rehak (Cisco Systems, Czech Republic)
Michael Rovatsos (University of Edinburgh, UK)
Jordi Sabater-Mir (IIIA-CSIC, Spain)
Carles Sierra (IIIA-CSIC, Spain)
Jose M. Such (Lancaster University, UK)
Wamberto Vasconcelos (University of Aberdeen, UK)
Laurent Vercouter (INSA de Rouen/LITIS lab, France)
Serena Villata (Université Nice Sophia Antipolis, France)
Salvatore Vitabile (University of Palermo, Italy)

---------------------------------
SUBMISSION and REVIEW DETAILS
---------------------------------
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics, coverage of relevant state of the art and the relevance to cyber security problems.

Submissions must follow ACM format (http://www.acm.org/sigs/publications/proceedings-templates) and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress.

- Position/Short Papers (2-4 pages) reporting views or ambitions, or describing problems.

Papers must be submitted in pdf format via the conference management system, available at:
https://www.easychair.org/conferences/?conf=acyse2014

Workshop pre-proceedings will be distributed in a USB during the workshop. Moreover, formal workshop proceedings will be published by ACM, in its International Conference Proceedings Series with ISBN.

We are also exploring the possibility of a follow-up special issue in a refereed journal, more details to come shortly.


--------------------------
CONTACT
--------------------------
ACySe Organising Committee (acyse2014@easychair.org)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
AAMAS - 2025   The 24th International Conference on Autonomous Agents and Multiagent Systems
ICAART 2025   17th International Conference on Agents and Artificial Intelligence
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
FLAIRS 2025   Florida Artificial Intelligence Research Society