UACS 2013 - Call for chapters: Unconventional Algorithms and Cyber Security
Date2013-12-21 - 2013-12-24
Deadline2013-03-31
VenueOnline, Online
Keywords
Websitehttps://uacs.cs.vsb.cz
Topics/Call fo Papers
In this book, we try to merge two completely different (at first glance) areas of research: unconventional computing (e.g. artificial intelligence, deterministic chaos, fractal geometry, cellular automata…) and cyber security (computer viruses, hacking, encryption, intruders attack detection, …). Information plays in today's society a key role. In the initial period of expansion of computer technology in recent decades, first cost, then the maximum availability and connectivity of computer systems has been preferred. The security usually didn´t get much attention, because after all, it significantly increases the cost of development and maintenance of any IT system. At the turn of the millennium but it was thanks to the huge number and variety of cyber attacks and significant damage associated with them to a realistic and sobering to the fore now enjoys the safety of the information stored in computers. As a result we now have a reliable antivirus, firewall, intrusion detection systems (some of then with heuristic methods), Windows Update (and other software update systems), spyware, spam filters, improved versions of operating systems and other technology that protects us. Will this development at all for several years, security experts need? In the view of the world's leading security experts and according to our everyday experience clearly yes. Although safety receives much more attention than in the past as well but the number and complexity of technology, that is necessary for the protection is rising as well. Although we now have passed the time of naive attacks, when fifteen hacker were able to run the downloaded script to drop the largest Web sites on the Internet (Mafiaboy case, year 2000), every year we are over and over again proven than still no one can be save.
It is evident that cyber attacks have hardened and certainly imagination and capabilities of their authors is constantly increasing year by year. What's more - in front of McAfee's antivirus is about culture since 2007 Internet underworld has changed a lot in the sense that young hackers have disappeared (so-called script-kiddies) who creates computer viruses and attack just for fun and curiosity and is replaced by organized gangs of professional criminals. Today this area is all about money and national state interests (price of the zero-day exploits on the black market has reportedly increased so much that one its traditional customers ? Russian mafia - is no longer able to purchase the best exploits as they are usually outbit by national state brokers who are willing to pay as much as 250 000 usd per exploit). An entire underground economy has evolved, in which services can be a hacker, the creators of spyware and botnets hire purchase like any other product.
Threats are growing as well and so we must increase our knowledge of these threats to be able to successfully defend ourselves. In the fight against any opponent, it is necessary to know your enemy - his tactics, skills, tools and themes. Activities, knowledge and skills that serve this purpose are usually called ethical hacking, people who carry it out, then "white-hat" hackers. There's no denying that the information in this and similar publications available make it possible to prevent the abuse as well as to carry out cyber attacks. But this is an inevitable aspect of education and certainly the solution is not censor such information and makes them secret - the other side is able to get them as well as, due to the enormous diversity of motives and intentions of other hackers combines curiosity and desire to learn.
Companies and individuals must know how to computer damage occurs to them to prevent it. The purpose of this script is to increase the expertise of professionals in the future security against malicious hacking. The aim is to raise awareness of the issues so that they will in future be able to independently assess the security risks not only their computers but also possibly of computers that they will eventually be in charge of as the network/system administrators.
The book will be (to our knowledge) the first to address the recent advances in our understanding between unconventional algorithms and cyber security. The book intends to become a resource handbook where essential problems and questions are addressed. The main focus is on theoretical and practical aspects of proposed interdisciplinary field is on
- Artificial intelligence
- Fractal geometry
- Complex networks and its vulnerability
- Deterministic chaos in dynamics of computer systems
- Computer malware and its detection by means of unconventional methods
- Unconventional computing in cyber security: membrane computing, DNA computing, immune computing, quantum computing, swarm computing, analogic computing, chaos based computing and computing on the edge of chaos, and agent-based computation, etc.
- Relations and mutual intersections between unconventional methods and cyber security.
It is evident that cyber attacks have hardened and certainly imagination and capabilities of their authors is constantly increasing year by year. What's more - in front of McAfee's antivirus is about culture since 2007 Internet underworld has changed a lot in the sense that young hackers have disappeared (so-called script-kiddies) who creates computer viruses and attack just for fun and curiosity and is replaced by organized gangs of professional criminals. Today this area is all about money and national state interests (price of the zero-day exploits on the black market has reportedly increased so much that one its traditional customers ? Russian mafia - is no longer able to purchase the best exploits as they are usually outbit by national state brokers who are willing to pay as much as 250 000 usd per exploit). An entire underground economy has evolved, in which services can be a hacker, the creators of spyware and botnets hire purchase like any other product.
Threats are growing as well and so we must increase our knowledge of these threats to be able to successfully defend ourselves. In the fight against any opponent, it is necessary to know your enemy - his tactics, skills, tools and themes. Activities, knowledge and skills that serve this purpose are usually called ethical hacking, people who carry it out, then "white-hat" hackers. There's no denying that the information in this and similar publications available make it possible to prevent the abuse as well as to carry out cyber attacks. But this is an inevitable aspect of education and certainly the solution is not censor such information and makes them secret - the other side is able to get them as well as, due to the enormous diversity of motives and intentions of other hackers combines curiosity and desire to learn.
Companies and individuals must know how to computer damage occurs to them to prevent it. The purpose of this script is to increase the expertise of professionals in the future security against malicious hacking. The aim is to raise awareness of the issues so that they will in future be able to independently assess the security risks not only their computers but also possibly of computers that they will eventually be in charge of as the network/system administrators.
The book will be (to our knowledge) the first to address the recent advances in our understanding between unconventional algorithms and cyber security. The book intends to become a resource handbook where essential problems and questions are addressed. The main focus is on theoretical and practical aspects of proposed interdisciplinary field is on
- Artificial intelligence
- Fractal geometry
- Complex networks and its vulnerability
- Deterministic chaos in dynamics of computer systems
- Computer malware and its detection by means of unconventional methods
- Unconventional computing in cyber security: membrane computing, DNA computing, immune computing, quantum computing, swarm computing, analogic computing, chaos based computing and computing on the edge of chaos, and agent-based computation, etc.
- Relations and mutual intersections between unconventional methods and cyber security.
Other CFPs
- 2013 IEEE international conference on smart grid communications
- The 8th International Conference on Robotic, Vision, Signal Processing & Power Applications
- IEEE PERVASIVE Special Issue: Attention Management in Pervasive Computing
- Special Issue on Social Computing and Social Knowledge for e-Learning
- 16th International Congress of the International Psychogeriatric Association
Last modified: 2013-02-05 22:44:19