network

queen

Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015)

Het Pand
Ghent, Belgium
September 11th, 2015
OVERVIEW

Nature is probably the most amazing and recognized invention machine on Earth. Its ability to address complex and large-scale problems has been developed after many years of selection, genetic drift and mutations. As a result, it is not surprising that natural systems continue to inspire inventors and researchers.

Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, which take form of swarm intelligence, artificial immune systems, sensor networks, etc.

Nature has also developed an outstanding ability to recognize individuals or foreign objects to protect a group or a single organism. Those abilities have great possibility to improve the area of security and network.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of bio-inspired security and networking.

The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.

Topics of interest include, but are not limited to:

  • Bio-inspired security and networking algorithms & technologies
  • Bio-inspired anomaly & intrusion detection
  • Moving-target techniques
  • Adaptation algorithms
  • Biometrics
  • Biomimetics
  • Artificial Immune Systems
  • Adaptive and Evolvable Systems
  • Machine Learning, neural networks, genetic algorithms for cyber security & networking
  • Prediction techniques
  • Expert systems
  • Cognitive systems
  • Sensor networks
  • Information hiding solutions (steganography, watermarking) for network traffic
  • Cooperative defense systems
  • Theoretical development in heuristics
  • Management of decentralized networks
  • Bio-inspired algorithms for dependable networks

SUBMISSIONS AND REGISTRATION

Submissions are limited to 6 pages 2-column IEEE conference style with minimal font size of 10 pt. Papers will appear in the conference proceedings and will be available on IEEE Xplore. Submissions are handled through the EDAS system. Upon final camera-ready paper submission, authors will need to sign an IEEE copyright form for each accepted paper to comply with IEEE regulations.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

The extended versions of selected papers will be published in a special issue of the Security and Communication Networks, Wiley (confirmed!) or EURASIP Journal on Information Security (confirmed!). The decision to which journal authors of the extended version of the accepted paper will be invited depends on the quality of the paper and quality of the presentation at BCSN. The final decision will be made by co-chairs after the workshop.

IMPORTANT DATES

May 25, 2015 (EXTENDED DEADLINE): Regular Paper Submission [submit your paper here!]
June 15, 2015: Notification Date
July 1, 2015: Camera-Ready Paper Deadline

WORKSHOP CHAIRS

Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, USA
Hiroshi Wada, Unitrends, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

PROGRAM COMMITTEE

Ozgur B. Akan, Koc University, Tukey
Eitan Altman, INRIA Sophia-Antipolis, France
Elias Bou-Harb, National Cyber Forensics and Training Alliance (NCFTA) & Concordia University, Canada
Luca Caviglione, ISSIA, CNR, Italy
Eric Chan-Tin, Oklahoma State University, USA
Michal Choras, University of Technology and Life Sciences, Poland
Ruairi De Frein, University College Dublin, Ireland
Roya Ensafi, Princeton University, USA
Eduardo Feo, Dalle Molle Institute for Artificial Intelligence, Switzerland
Richard Ford, Florida Institute of Technology, USA
Zeno Geradts, Netherlands Forensic Institute, Netherlands
Julie Greensmith, University of Nottingham, UK
Kay Hamacher, Technische Universitat Darmstadt, Germany
Amir Houmansadr, University of Massachusetts Amherst, USA
Artur Janicki, Warsaw University of Technology, Poland
Maciej Korczynski, Delft University of Technology, The Netherlands
Igor Kotenko, SPIIRAS, Russia
Jean-Francois Lalande, Inria, Univ. Rennes 1, INSA Centre Val de Loire, Univ. Orlaeans, France
Kenji Leibnitz, National Institute of Information and Communications Technology, Japan
Guangjie Liu, Nanjing University of Science and Technology, China
Sean Moore, Centripetal Networks, USA
Tadashi Nakano, Osaka University, Japan
Michele Nogueira, Federal University of Parana, Brazil
Christopher S. Oehmen, Pacific Northwest National Laboratory, USA
Josef Pieprzyk, Macquarie University, Australia
Marinella Petrocchi, IIT, CNR, Italy
Mayank Raj, Missouri University of Science and Technology, USA
Raj Rajagopalan, Honeywell, USA
Hui Tian, National Huaqiao University, China
George Weir, University of Strathclyde, UK
Steffen Wendzel, Fraunhofer FKIE, Germany
David Wolinsky, Yale University, USA
Athanasios Vasilakos, University of Western Macedonia, Greece
Sebastian Zander, Swinburne University of Technology Melbourne, Australia
Chenyu Zheng, University of Colorado, USA

CONTACTS

Contact BCSN 2015 chairs using this email address: contact@cybersecurity.bio.