Workshop on Advances in Nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec'2014)
Organizing Committee
Mohamed Eltoweissy, Virginia Military Institute and Virginia Tech, USA
Errin Fulp, Wake Forest University, USA
Atin Basuchaudhary, Virginia Military Institute, USA
Sven Brueckner, Axon, USA
Panel Chair
Stephan Olariu, Old Dominion University, USA
NatSec program: click here
NatSec keynote: click here
NatSec tutorial: click here
Synopsis
Cyberspace has been declared as the 5th dimension of operations, albeit the only human-made one. Numerous aspects of our modern life involve cyber and cyber-enabled systems. Cyberspace plays a critical role in the effectiveness, efficiency, safety and resilience of numerous applications ranging from healthcare and transportation to national security and defense to gaming and entertainment. Current cyber systems, particularly for mission-critical applications, face tremendous security problems due to a myriad of challenges. These challenges include the complexity of the systems in terms of size, heterogeneity and functionality; the monolithic software culture; the asymmetric advantage of attackers; legacy systems with limited security provisioning; the extreme volume of data generated due to automation; real-time demands rendering patching almost infeasible; and the lack of coordination, cooperation and sharing among security tools or among organizations. It follows that persistent and evolving attacks in cyberspace are a fact we have to live with.
Nature is replete with examples of adequate defense systems and mechanisms that may be mimicked or adapted in cyperspace. Biological organisms for example are complex systems that can adapt to become highly resistant to attacks. Furthermore biological systems are robust and can self-repair, often learning from mistakes they may make. These attributes allow organisms to cope with new threats that develop over time. Finally, biological systems are noted for their ability to maintain multi-stability, which allows the existence of multiple stable states. All of these characteristics are desirable for securing computer systems.
This workshop seeks to present new ideas that are inspired by nature to design, operate, manage and study cyber and cyber-enabled systems that are highly resilient to attacks, can adapt after a successful attack to continue useful operations, learn from previous attacks to better guard against and cope with future attacks, and can repair themselves after attacks have succeeded.
NatSec'2014 will offer a very rich technical program, with a keynote speaker, a panel discussion and technical papers sessions. We expect to bring together researchers from academia, industry and government labs from varied related disciplines. NatSec'2014 solicits technical contributions in nature-inspired cyber and cyber-physical security including, but not limited to:
- Intrusion prevention
- Resilience and survivability
- Evolving security services and policies
- Intrusion detection and pervasive analytics
- Attack tracking and attribution
- Attack and defense modeling and analysis
- Cooperative defense services
- Personalized security
- Components and architectures for next-generation security platforms
- Information and behavior hiding
- Autonomic security architectures and services
- Cyber security game changers
- Testbeds, benchmarks, performance and experimental studies
Paper Submission
Authors are invited to submit a paper up to 6 pages (in English) in double-column IEEE format following the submission guidelines available at the IRI-2014 web page. Papers should describe original, previously unpublished work, not currently under review or accepted by another conference, workshop, or journal. Argument justifying contribution to nature-inspired cyber security must be provided in the manuscript. An electronic version (PDF format) of the full paper should be submitted by the paper submission deadline to EasyChair (IEEE IRI 2014 submission: https://www.easychair.org/conferences/?conf=ieeeiri2014) and please select the "IEEE International Workshop on Advances in nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec’2014))". All submissions will be acknowledged. More information is available on the IRI 2014 web page.
Each paper will be peer reviewed by at least two experts in the topical area. Papers accepted by the workshops will be published in the conference proceedings published by IEEE Computer Society Press. Outstanding papers will be selected for extension and publication in a special issue of a journal.
IMPORTANT DATES
Submission deadline: April 27, May 23, 2014
Notification of acceptance: May 11, 2014
Author registration, May 14, 204
Camera ready version: May14 - 25, 2014
Technical Program Committee (under construction)
Ehab Al-Shaer, University of North Carolina Charlotte, USA
Glenn Fink, Pacific Northwest National Laboratory, USA
Mirsad Hadzikadic, University of North Carolina Charlotte, USA
Salim Hariri, University of Arizona, USA
Ling Liu, Georgia Tech, USA
Laura Razzolini, Virginia Commonwealth University, USA
Nazli Choucri, MIT, USA
Sponsors
Virginia Military Institute
Others pending
Menu

Society for Information Reuse and Integration (SIRI)
- Call for papers
- Important dates
- Organizing committee
- Program committee
- Paper submission instructions
- Camera ready instructions
- Registration
- Visa
- Conference Program
- Special Issues
- Call for Ind/Gov/App Papers
- Call for workshops
- Workshops
- IRI-HI 2014
- FMi 2014
- DIM 2014
- EMRITE 2014
- WICSOC 2014
- SocialSec 2014
- IICPS 2014
- NatSec 2014
- Keynotes
- Industry Speakers
- Tutorials
- Student travel grant
- Conference hotel
- IRI-2013 Photos