[agents] Agents and CyberSecurity @ AAMAS Paris, France - Deadline Extended (Feb. 5)

Jose Such jsu.academia at gmail.com
Mon Jan 20 05:51:04 EST 2014


(Apologize for multiple copies)
(Please, distribute it among potentially interested colleagues)

****************************************************************************************
The First International Workshop on Agents and CyberSecurity
ACySe 2014
Web page: http://sites.google.com/site/acyseaamas2014/

To be held with AAMAS 2014 (http://aamas2014.lip6.fr)
5 - 9 May, 2014, Paris, France
****************************************************************************************

------------------------------
DESCRIPTION
------------------------------
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets, ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud Computing, Smart Grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. The focus of this workshop is to provide a forum to discuss and advance cyber security by means of agent-based approaches. 

Specific topics for this workshop include, but are not limited to:
* Access Control Models
* Adversarial Modelling
* Cloud Computing Security/Privacy
* Collective Decision Making for Access Control
* Contextual Integrity
* Communication Resilience and Robustness
* Critical Infrastructure Protection
* Cyber-dependent and Cyber-enabled Crime
* CyberWar and CyberWeapons
* Denial of Service/ Distributed Denial of Service (DoS/DDoS)
* Digital Forensics Investigation
* Disclosure/Self-disclosure Decision Making
* e-Crime Science
* Game-theoretic approaches to Security and Privacy
* Human Behaviour Modelling
* Human Privacy Attitudes
* Identity Theft
* Information Leakage
* Information-theoretic approaches to Security/Privacy
* Insider Threat 
* Institutional and Social Privacy
* Intrusion Detection/Prevention Systems (Agent-based IDS/IPS, Adaptive IDS/IPS, Collaborative IDS/IPS)
* Learning Security/Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control Models
* Negotiation of Security/Privacy Policies
* Penetration Testing
* Privacy and Personal Information Protection
* Recommendation of Security/Privacy Policies
* Relationship-based Access Control Models
* Risk Management
* Risk Mitigation Strategies
* Social Media Security/Privacy
* Spoofing and Countermeasures
* Steganography
* User Profiling and Countermeasures
* Zero-day attacks

---------------------------------
IMPORTANT DATES
---------------------------------
* Paper Sumbission Deadline: FEBRUARY 5, 2014 (EXTENDED)
* Paper Acceptance Notification: MARCH 3, 2014
* Camera-ready copies due: MARCH 12, 2014
* Workshop Date: MAY 5-9, 2014

--------------------------------------
ORGANIZING COMMITTEE
--------------------------------------
* Natalia Criado (University of Bolton, UK)
* Martin Rehak (Cisco Systems/CTU, Czech Republic)
* Jose M. Such (Lancaster University, UK)
* Laurent Vercouter (INSA de Rouen/LITIS Laboratory, France)

---------------------------------
PROGRAM COMMITTEE
---------------------------------
Javier Bajo (Universidad Politecnica de Madrid, Spain)
Olivier Boissier (Ecole des Mines de St-Etienne, France)
Piero Bonatti (Universita' di Napoli Federico II, Italy)
Gregory Bonnet (GREYC, France)

Vicent Botti (Universitat Politecnica de Valencia, Spain)

Ioana Boureanu (HEIG-VD, Switzerland)
Pascal Bouvry (university of Luxemburg, Luxemburg)

Frances Brazier (TU Delft, Netherlands)
Álvaro A. Cardenas (University of Texas at Dallas, USA)
Javier Carbo (Universidad Carlos III, Spain)
Marco Carvalho (Florida Institute of Technology and IHMC, USA)
Carlos Cid (Royal Holloway University of London, UK)
Natalia Criado (University of Bolton, UK)
Grégoire Dany (University of luxemburg, Luxemburg)
Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)
Andrew Fielder (Imperial College London, UK)
Simone Fischer-Huebner (Karlstad University, Sweden)
Ana Garcia-Fornes (Universitat Politècnica de València, Spain)
Zahia Guessoum (LIP6, France)
Chris Hankin (Imperial College London, UK)
Alvaro Herrero (University of Burgos, Spain)
Dieter Hutter (DFKI, Germany)
Lucas Kello (Harvard University, USA)
Christopher Kiekintveld (University of Texas at El Paso, USA)
Igor Kotenko (SPIIRAS, Russia)
Pavel Laskov (University of Tuebingen, Germany)
Alexei Lisitsa (University of Liverpool, UK)

Emil Lupu (Imperial College, UK)
Pasquale Malacaria (Queen Mary University of London, UK)
Gregorio Martinez (University of Murcia, Spain)

Peter McBurney (King's College, UK)
Ian M. Molloy (T. J. Watson Research Center, IBM, USA)
Hala Mostafa (BBN Technologies, USA)
Haralambous Mouratidis (University of East London, UK)
Andrea Omicini (Universita di Bologna, Italy)
Gilbert L. Peterson (Air Force Institue of Technology, USA)
Tomas Pevny (Cisco, Czech Republic)
Guillaume Piolle (Supelec Rennes, France)
David Pym (University College London, UK)
Sarvapali Ramchurn (University of Southampton, UK)

Awais Rashid (Lancaster University, UK)
Omer Rana (Cardiff University, UK)
Martin Rehak (Cisco Systems, Czech Republic)

Michael Rovatsos (University of Edinburgh, UK)
Jordi Sabater-Mir (IIIA-CSIC, Spain)
Carles Sierra (IIIA-CSIC, Spain)
Jose M. Such (Lancaster University, UK)
Wamberto Vasconcelos (University of Aberdeen, UK)
Laurent Vercouter (INSA de Rouen/LITIS lab, France)
Serena Villata (Université Nice Sophia Antipolis, France)

Salvatore Vitabile (University of Palermo, Italy)

----------------------------------------------------
SUBMISSION and REVIEW DETAILS
----------------------------------------------------
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics, coverage of relevant state of the art and the relevance to cyber security problems. 

Submissions must follow ACM format (http://www.acm.org/sigs/publications/proceedings-templates) and can be of two types:

- Full Papers (maximum of 8 pages) about completed work or work in progress. 

- Position Papers (2-4 pages) reporting views or ambitions, or describing problems. 

Papers must be submitted in pdf format via the conference management system, available at:
https://www.easychair.org/conferences/?conf=acyse2014

Workshop pre-proceedings will be distributed in USB drives during the workshop. Formal workshop proceedings will be published by ACM, in its prestigious International Conference Proceedings Series with ISBN.

We are also exploring the possibility of a follow-up special issue in a top-tier journal, more details to come soon.


--------------------------
CONTACT
--------------------------
ACySe Organising Committee (acyse2014 at easychair.org)


More information about the agents mailing list