posted by organizer: ankushmeshram || 63 views || tracked by 1 users: [display]

KES-DCA 2025 : KES Session on 'Detection of Complex Attacks'

FacebookTwitterLinkedInGoogle

Link: https://kes-dca.lre.epita.fr/
 
When Sep 10, 2025 - Sep 12, 2025
Where Osaka, Japan
Submission Deadline Mar 31, 2025
Notification Due May 5, 2025
Final Version Due Jun 2, 2025
Categories    machine learning   cybersecurity   artificial intelligence   industry applications
 

Call For Papers

KES 'Detection of Complex Attacks' (https://kes-dca.lre.epita.fr/) session addresses the next challenges in the coupling of cybersecurity and Artificial Intelligence and Knowledge Management techniques by focusing on the detection of complex cybersecurity attacks. Zero-days, Advanced Persistent Threats (APT) or attacks supported by generative technologies require a coordinated and fine-grained effort for modeling and detecting them and reacting to related intrusions.

Attacks and their countermeasures have grown dramatically more complex with the combination of extensive digital transformation in service and industries, the maturation of both defense and attack software, and the growing pressure of increasing cybersecurity threats. In this context, efficient detection requires a radical refinement of these systems which can no longer be considered as monolithic (or monolithic abstractions). The specificities of the user, machine, operating system, and service levels must be considered, while maintaining a technical control, and a cognitive one for the operator in charge, over the ever-growing heterogeneity. The stack involved goes from data capture to cyber situational awareness and reaction, through automated analysis of attack techniques and malware, characterization of intrusion, detection of known malicious activity as well as abnormal behaviors.

The advent of code and security procedure generation both for defense and pentest increases the threats to yet another level. Being able to hunt these novel threats necessitates supporting the identification of emerging behaviors, tracking the evolution of connections as well as connection patterns, or even making correlations through remote systems. And to do so in an antagonist environment where the adversary does not passively wait to be detected but takes actives steps to evade, lure or exploit the detection systems.

The session on "Detection of Complex Attacks" deals with the following key challenges:
• Novel models and best practices for generative AI in security
• Novel models and best practices for machine learning in security
• Interactions model between users, machines, systems, and services
• How to design robust systems, detection systems (federated learning), or bricks of detection systems (SOCs at system and user level)

Topics of interest are, but not restricted to:
• Learning emerging behaviors for security detection
• Generative AI for defense
• Generative AI for pentest operations
• Machine learning for security attack and defense
• Graph representation learning for security: knowledge, provenance, connectivity graphs.
• Adversarial machine learning
• Federated learning
• Security of AI pipelines
• Explainable and trustworthy learning models

Application domains are, but not restricted to:
• IoT environments
• Critical infrastructures
• Cloud infrastructures
• IT Networks

Fundamental and theoretical as well as applied research work are welcome.

Submission instructions:

For all updates and comprehensive instructions for authors please refer to:
http://kes2025.kesinternational.org/submission.php

Papers are invited for KES2025 on topics lying within the scope of the session. All contributions must be of high quality, original, and must not have been previously published elsewhere or intended for publication elsewhere.
All papers will be reviewed by members of the International Program Committee and depending on their level and attributes, may be selected for oral or poster presentation, and publication in the conference proceedings.
Full papers will be reviewed by the IPC and if accepted and presented, they will be published in Elsevier's Procedia Computer Science open access journal, available in ScienceDirect and submitted to be indexed/abstracted in CPCI (ISI conferences and part of Web of Science), Engineering Index, and Scopus.
Authors of selected papers may be invited to submit extended versions of their papers for publication as full journal papers, for example in the KES Journal or other journals.

Submitting your work

Submissions for the conference must be made as complete papers (there is no abstract submission stage) submitted as PDF documents through the PROSE online submission and review system.
Full papers should be detailed academic articles in conventional format. The guide length for full papers is 8 to 10 pages (maximum).

More information on submission, Guidance notes and templates here:
http://kes2025.kesinternational.org/submission.php.

Submission site: EasyChair online submission and review system.

Main Contributing Research Centers:
- EPITA, Paris, France
- University of Strasbourg, France
- Fraunhofer Institute IOSB, Germany
- Masaryk Uni Brno, Czech Republic
- LIPAH, Tunisia
- INRIA Lille, France
- Uni Lyon II, France
- IMT Atlantique, France
- Uni Lyon I, France
- ISEP, France
- Fujitsu, Luxembourg

Program committee:
- Juba Agoun, University Lyon II (France)
- Christophe Biernacki, INRIA Lille (France)
- Tristan Bilot (France)
- Amel Borgi, LIPAH (Tunisie)
- Nour EL MADHOUN, ISEP (France)
- Ghada Gharbi, EPITA (France)
- Martin Husak, Masaryk Uni Brno (Czech Republic)
- Rushed Kanawati, Université Paris 13 (France)
- Sofiane Lagraa, Fujitsu (Luxembourg)
- Valeria Loscri, INRIA Lille (France)
- Nidà Meddouri, EPITA (France)
- Ankush Meshram, Fraunhofer Institute IOSB (Germany)
- Mohamed Lamine Messai, University Lyon II (France)
- Julien Michel, EPITA/Unistra (France)
- Marc-Oliver Pahl, IMT Atlantique (France)
- Pierre Parrend, EPITA/Unistra (France)
- Hamida Seba, University Lyon I (France)

Related Resources

KES 2025   29th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
KES-IDT 2025   17th International KES Conference on Intelligent Decision Technologies
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
KES-InMed 2025   13th International KES Conference on Innovation in Medicine and Healthcare
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
CompleNet 2025   16th International Conference on Complex Networks
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
OMCS 2025   5th IEEE Conference on Optimization and Modeling of Complex Systems
NLAIM 2025   2nd International Conference on NLP, Artificial Intelligence, Machine Learning and Applications