BCSN 2015 - 2015 Workshop on Bio-inspired Cyber Security & Networking
Topics/Call fo Papers
BCSN 2015 - http://stegano.net/BCSN2015
Het Pand
Ghent, Belgium
September 11th, 2015
OVERVIEW
Nature is probably the most amazing and recognized invention machine on Earth. Its ability to address complex and large-scale problems has been developed after many years of selection, genetic drift and mutations. As a result, it is not surprising that natural systems continue to inspire inventors and researchers.
Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, which take form of swarm intelligence, artificial immune systems, sensor networks, etc.
Nature has also developed an outstanding ability to recognize individuals or foreign objects to protect a group or a single organism. Those abilities have great possibility to improve the area of security and network.
The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of bio-inspired security and networking.
The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.
Topics of interest include, but are not limited to:
- Bio-inspired security and networking algorithms & technologies
- Bio-inspired anomaly & intrusion detection
- Adaptation algorithms
- Biometrics
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for cyber security & networking
- Prediction techniques
- Expert systems
- Cognitive systems
- Sensor networks
- Information hiding solutions (steganography, watermarking) for network traffic
- Cooperative defense systems
- Theoretical development in heuristics
- Management of decentralized networks
- Bio-inspired algorithms for dependable networks
SUBMISSIONS AND REGISTRATION
Submissions are limited to 6 pages 2-column IEEE conference style with minimal font size of 10 pt. Papers will appear in the conference proceedings and will be available on IEEE Xplore. Submissions are handled through the EDAS system. Upon final camera-ready paper submission, authors will need to sign an IEEE copyright form for each accepted paper to comply with IEEE regulations.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
The extended versions of all papers accepted for BCSN will be published in a special issue of the JCR journal (tentative).
IMPORTANT DATES
May 15, 2015: Regular Paper Submission
June 15, 2015: Notification Date
July 1, 2015: Camera-Ready Paper Deadline
WORKSHOP CHAIRS
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, USA
Hiroshi Wada, NICTA, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Contact BCSN 2015 chairs using this email address: contact-AT-cybersecurity.bio.
Het Pand
Ghent, Belgium
September 11th, 2015
OVERVIEW
Nature is probably the most amazing and recognized invention machine on Earth. Its ability to address complex and large-scale problems has been developed after many years of selection, genetic drift and mutations. As a result, it is not surprising that natural systems continue to inspire inventors and researchers.
Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, which take form of swarm intelligence, artificial immune systems, sensor networks, etc.
Nature has also developed an outstanding ability to recognize individuals or foreign objects to protect a group or a single organism. Those abilities have great possibility to improve the area of security and network.
The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of bio-inspired security and networking.
The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.
Topics of interest include, but are not limited to:
- Bio-inspired security and networking algorithms & technologies
- Bio-inspired anomaly & intrusion detection
- Adaptation algorithms
- Biometrics
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for cyber security & networking
- Prediction techniques
- Expert systems
- Cognitive systems
- Sensor networks
- Information hiding solutions (steganography, watermarking) for network traffic
- Cooperative defense systems
- Theoretical development in heuristics
- Management of decentralized networks
- Bio-inspired algorithms for dependable networks
SUBMISSIONS AND REGISTRATION
Submissions are limited to 6 pages 2-column IEEE conference style with minimal font size of 10 pt. Papers will appear in the conference proceedings and will be available on IEEE Xplore. Submissions are handled through the EDAS system. Upon final camera-ready paper submission, authors will need to sign an IEEE copyright form for each accepted paper to comply with IEEE regulations.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.
The extended versions of all papers accepted for BCSN will be published in a special issue of the JCR journal (tentative).
IMPORTANT DATES
May 15, 2015: Regular Paper Submission
June 15, 2015: Notification Date
July 1, 2015: Camera-Ready Paper Deadline
WORKSHOP CHAIRS
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, USA
Hiroshi Wada, NICTA, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Contact BCSN 2015 chairs using this email address: contact-AT-cybersecurity.bio.
Other CFPs
Last modified: 2015-03-01 21:47:46