[agents] Agents and CyberSecurity (ACySe @ AAMAS 2015) - Deadline extended Feb. 16

Jose Such jsu.academia at gmail.com
Mon Feb 9 16:18:10 EST 2015


* Note deadline extended to Feb. 16th 2015 *

(Apologise for multiple copies)
(Please, distribute it among potentially interested colleagues)


**************************************************************************************** 

The Second International Workshop on Agents and CyberSecurity 
                               ACySe 2015 
              https://sites.google.com/site/acyse2015/

       to be held with AAMAS 2015 (http://www.aamas2015.com/) 
                  May 4-8, 2015. Istanbul, Turkey

Selected papers will be invited to submit an extended and improved version to 
a special issue published in the IEEE Intelligent Systems Magazine (JCR 1.92)

**************************************************************************************** 

------------------------------ 
DESCRIPTION 
------------------------------ 
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. 

The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of *agent-based approaches*. Specific topics for this workshop include but are not limited to:
* Game-theoretic approaches to Security and Privacy
* Cloud Computing Security and Privacy
* Online Social Networks / Social Computing Security and Privacy
* Access Control
* Advanced Persistent Threats 
* Adversarial Modelling
* Automated Vulnerability Assessment / Penetration Testing
* Critical Infrastructure Protection
* CyberCrime and CyberWar
* Data Leakage and Exfiltration
* Denial of Service / Distributed Denial of Service (DoS/DDoS)
* Digital Forensics
* Distributed collaboration patterns of malicious software and their discovery
* Human Behaviour Modelling and Human Factors
* Insider Threat 
* Intrusion Detection/Prevention Systems 
* Learning/Recommendation/Negotiation of Security and Privacy Policies
* Malware (Virus, Worms, Trojans, Backdoors)
* Multi-party/Multi-agent Access Control
* Privacy and Personal Information Protection
* Resilience and Robustness
* Risk Assessment and Management, and Risk Mitigation Strategies


--------------------------------- 
IMPORTANT DATES 
--------------------------------- 
    *Paper Submission Deadline: FEBRUARY 16, 2015
    *Paper Acceptance Notification: MARCH 10, 2015
    *Camera-ready copies due: MARCH 19, 2015
    *Workshop Date: MAY 4-5, 2015

--------------------------------- 
INVITED SPEAKER 
--------------------------------- 
Milind Tambe (University of Southern California, US)

--------------------------------- 
ORGANIZING COMMITTEE 
--------------------------------- 
    *Natalia Criado (Liverpool John Moores University, UK)
    *Martin Rehak (Cisco Systems, Czech Republic)
    *Jose M. Such (Lancaster University , UK)
    *Laurent Vercouter (INSA de Rouen/LITIS lab, France)


--------------------------------- 
PROGRAM COMMITEE
--------------------------------- 
Javier Bajo (Universidad Politecnica de Madrid, Spain)
Jim Blythe (USC Information Sciences Institute, USA)
Olivier Boissier (Ecole des Mines de St-Etienne, France)
Gregory Bonnet (GREYC, France)
Vicent Botti (Universitat Politècnica de València, Spain)
Pascal Bouvry (university of Luxemburg, Luxemburg)
Frances Brazier (TU Delft, Netherlands)
Ioana Boureanu (HEIG-VD, Switzerland)
Álvaro A. Cardenas (University of Texas at Dallas, USA)
Marco Carvalho (Florida Institute of Technology and IHMC, USA)
Natalia Criado (Liverpool John Moores, UK)
Grégoire Danoy (University of luxemburg, Luxemburg)
Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)
Ana Garcia-Fornes (Universitat Politècnica de València, Spain)
Zahia Guessoum (LIP6, France)
Chris Hankin (Imperial College London, UK)
Dieter Hutter (DFKI, Germany)
Lucas Kello (Harvard University, USA)
Christopher Kiekintveld (University of Texas at El Paso, USA)
Igor Kotenko (SPIIRAS, Russia)
Alexei Lisitsa (University of Liverpool, UK)
Ricard Lopez (Universitat Politècnica de València, Spain)
Emil Lupu (Imperial College, UK)
Pasquale Malacaria (Queen Mary University of London, UK)
Gregorio Martinez (University of Murcia, Spain)
Peter McBurney (King's College, UK)
Haralambous Mouratidis (University of Brighton, UK)
Andrea Omicini (Universita di Bologna, Italy)
Gilbert L. Peterson (Air Force Institue of Technology, USA)
Tomas Pevny (Cisco, Czech Republic)
Guillaume Piolle (Supélec - campus de Rennes, France)
David Pym (University College London, UK)
Awais Rashid (Lancaster University, UK)
Omer Rana (Cardiff University, UK)
Martin Rehak (Cisco Systems, Czech Republic)
Michael Rovatsos (University of Edinburgh, UK)
Jordi Sabater-Mir (IIIA-CSIC, Spain)
Fabrizio Smeraldi (Queen Mary University of London, UK)
Jose M. Such (Lancaster University, UK)
Wamberto Vasconcelos (University of Aberdeen, UK)
Laurent Vercouter (INSA de Rouen/LITIS lab, France)
Salvatore Vitabile (University of Palermo, Italy)
Martijn Warnier (TU Delft, Netherlands)


--------------------------------- 
SUBMISSION and REVIEW DETAILS 
--------------------------------- 
Papers will be peer-reviewed by at least 3 reviewers from the Program Committee. Criteria for the selection of papers will include: high quality, clear presentation, novelty of research, relevance to the topics and taking an agent-based approach, coverage of relevant state of the art and the relevance to cyber security problems. 
 
Submissions must follow AAMAS format (http://www.aamas2015.com/files/downloads/Paper-Submission/aamas2015.cls) and can be of two types:
 
- Full Papers (maximum of 8 pages) about completed work or work in progress. 
 
- Position Papers (2-4 pages) reporting views or ambitions, or describing problems. 
 
Papers must be submitted in pdf format via the conference management system, available at: https://easychair.org/conferences/?conf=acyse2015
 
---------------------------------- 
PUBLICATION DETAILS
----------------------------------
Pre-proceedings with all accepted papers are provided electronically on a USB stick as part of the AAMAS workshop registration package. Assuming a sufficient number of high-quality submissions, we will also consider the publication of formal post-proceedings with an international publisher. The proceedings of  ACySE 2014  were published by ACM, in its prestigious International Conference Proceedings Series with ISBN.

 
Authors of selected papers will be invited to submit an extended and improved version to a special issue published in the IEEE Intelligent Systems Magazine.


-------------------------- 
CONTACT 
-------------------------- 
ACySe Organising Committee (acyse2015 at easychair.org)


More information about the agents mailing list