Cyber Security (CYBERSEC 2015)

 

Introduction

Although awareness about necessary security appliances seems to be common and the tools used for that purpose are getting more and more advanced, the number of successful attacks targeted on computer systems is growing. They are mostly related to denial of offered services, gaining access or stealing private data, financial fraud, etc. Moreover, the evolution towards cloud computing, increasing use of social networks, mobile and peer-to-peer networking technologies that are intrinsic part of our life today, carrying many conveniences within our personal life, business and government, gives the possibility to use them as tools for cyber criminals and potential path of malware propagation. Computer systems are prone to cyber attacks even though a number of security controls are already deployed. Cyber criminals are focused on finding a way to bypass security controls and gain access into the protected network. For that reason organizations, companies, governments and institutions as well as ordinary citizens all over the world are interested in detection of all attempts of malicious actions targeted on their computer networks and single machines.

The CyberSec Special Session focuses on the diversity of the systems security developments and deployments in order to highlight the most recent challenges and report the latest research results. The session is intended to attract researchers and practitioners from academia and industry, and provides an international discussion forum for sharing experiences and new ideas concerning emerging aspects of the systems security in different application domains.

List of topics

Topics of interest include but are not limited to:

  • Decision support systems for information security
  • Risk assessment and risk management in different application domains
  • Tools supporting security management and development
  • Computer network security
  • Cyber-attack detection
  • Attack mitigation
  • Cyber breaches scientific reports
  • Cryptographic solutions
  • Network security
  • Anomaly detection
  • Threat analysis
  • IT security monitoring
  • Web/mobile Application security

Information for authors

The submitted papers should present results of the original and unpublished research. The papers will be reviewed by the CYBCONF 2015 International Program Committee. Accepted papers will be presented at the conference and will be included in the conference proceedings. Papers must be prepared using IEEE templates for conference proceedings. All papers must be submitted electronically via conference submission system.

Important dates

Paper submission:  March 15, 2015
Notification of acceptance:  April 15, 2015
Final paper submission and Early registration:     April 30, 2015
Conference:  June 24-26, 2015

Organizers

Chair

Prof. Marcin Szpyrka
AGH University of Science and Technology, Krakow, Poland
email: mszpyrka@agh.edu.pl

Co-chair

Dr. Bartosz Jasiul
Military Communication Institute, Zegrze, Poland
email: b.jasiul@wil.waw.pl

Special session program committee

Jose M. Alcaraz Calero, University of the West of Scotland, UK
Roberto Di Pietro, Roma Tre, University of Rome, Italy
Damas P. Gruska, Comenius University in Bratislava, Slovakia
Marko Jahnke, Federal Office for Information Security (BSI), Germany
Bartosz Jasiul, Military Communication Institute, Poland
Dennis McCallam, Northop Grumman and George Mason University, USA
Marco Manso, Rinicom, UK
Piotr Matyasik, AGH University of Science and Technology, Poland
Roberto Rigolin Ferreira Lopes, Gjøvik University, Norway
Marcin Szpyrka, AGH University of Science and Technology, Poland
Joanna Śliwa, Military Communication Institute, Poland
Jens Toelle,  Fraunhofer Research Institute for Communication, Information Processing, and Ergonomics FKIE, Germany
Qi Wang, University of the West of Scotland, UK
Stephen D. Wolthusen, Royal Holloway, University of London, UK
Konrad Wrona, NATO Communication and Information Agency, The Hague, Netherlands