[agents] ACC 2015 [One week to the deadline] :Second International Workshop on Autonomic Cloud Cybersecurity, Cambridge, MA, USA, September 21, 2015

Yaser Jararweh yaser.amd at gmail.com
Mon Aug 17 10:18:29 EDT 2015


/* Apologies for Multiple Copies */


Second International Workshop on Autonomic Cloud Cybersecurity (ACC
2015)  Cambridge,
MA, USA, September 21, 2015 http://www.cs.bham.ac.uk/~bxb/acc2015/ Call for
Papers

Benefits of the cloud have been widely publicised. Cloud computing services
offer cost effective, scalable, and reliable outsourced platforms. To
benefit from economies of scale, cloud architectures are homogenized to use
only a small variety of applications and operating systems. As a result,
because of the size of the Cloud, the implications for discovery of
vulnerabilities are high. Security is often cited as a main challenges
facing cloud computing. The focus of this workshop is to offer a discussion
forum about autonomous cybersecurity systems, which offer viable and
well-suited solutions for cloud threat prediction, detection, mitigation,
and prevention.

We are soliciting original and unpublished results of ongoing research
projects, emerging trends, uses cases, and implementation experiences in
autonomous cloud cybersecurity systems and solutions.

The topics covered include, but are not limited to:

   - Self-protection techniques of computing systems, networks and
   applications
   - Performance evaluation and metrics of self-protection algorithms
   - Metrics to characterize and quantify the cybersecurity algorithms
   (confidentiality, integrity, and availability of autonomic systems)
   - Anomaly behavior analysis and discovery of autonomic systems and
   services
   - Data mining, stochastic analysis and prediction of autonomic systems
   and applications
   - Datasets and benchmarks to compare and evaluate different
   self-protection techniques
   - Autonomic prediction of cyber crime
   - Cloud cryptographic systems
   - Autonomous cyber threat mitigation methods
   - Cloud security protocols
   - Automated cloud security analysis
   - Cloud cybersecurity tools

Important Dates: Papers Submission: August 24, 2015
Acceptance Notification: August 28th, 2015
Camera Ready: September 11, 2015
Workshop:  September 21th, 2015 Submission

The paper must be formatted in a two-column layout up to 8 pages, with
columns no more than 9.5 in. height and 3.5 in. width. The text must be in
Times font, 10-point or larger, with 11-point or larger line spacing.
Authors are encouraged to use the IEEE conference proceedings templates
<http://www.ieee.org/conferences_events/conferences/publishing/templates.html>.
LaTeX submissions should use IEEEtran.cls version 1.8.

Submissions must be in Portable Document Format (.pdf), via Easy Chair. Click
this link for the submission
<https://easychair.org/conferences/?conf=acc20150>.


General Chair

*Behzad Bordbar,*  University of Birmingham, UK
Co-Chair

*Kangbin Yim,*  Soonchunhyang University, KR
Steering Committee

   - *Bill Buchanan*
    Edinburgh Napier University, UK
   - *Ernesto Damiani*
    Università degli Studi di Milano, IT
   - *Anas Salah Eddin*
    Florida Polytechnic University, USA
   - *Mohand-Said Hacid*
    Université Lyon 1, FR
   - *Salim Hariri*
    University of Arizona, USA
   - *John Howie *
    Cloud Security Alliance, USA
   - *George Spanoudakis*
    City University London, UK



-- 
Yaser


More information about the agents mailing list