Sessions/Workshops

  • Special Track on Modeling and Simulation for Cyber Security (STMSCS'14)

    Session Chair:
    Dr. Michael Grimaila (Michael.Grimaila@afit.edu)
    Air Force Institute of Technology, USA.

    A significant amount of effort has been expended on developing and evaluating security architectures, principles, practices, processes, and technologies. Modeling and simulation provides a cost effective means to support research, development, refinement, and deployment of next generation security technologies. For example, traditional network simulation tools such as ns2/ns3 have been augmented by new tools such as OMNeT++. In this track, we seek submissions related all aspects of cyber security in a modeling and simulation context.
    Click here for details.

  • Special Track on Sensor, Peer-to-Peer and Social Networks Security (SenSPA 2014)

    Session Chair:
    Dr. Narasimha Shashidhar, karpoor@shsu.edu
    Dr. Lei Chen, chen@shsu.edu
    Sam Houston State University, Huntsville, TX, USA

    Smart, wireless, networked sensors will soon be all around us, collectively processing vast amounts of previously unrecorded data to help run factories, optimize farming, monitor the weather and even watch for earthquakes. The advances made in the area of sensor networks will naturally have a profound impact on our understanding and operation of traditional Peer-to-peer (P2P) systems which are widely used in today's Internet and account for a significant portion of its traffic. The confluence of ideas driving sensor and P2P systems is expected to be intensified by social networks. All submissions enabling cross-pollination of ideas on P2P, Sensor and Social Networks related to architecture, design, implementation, security, simulation, analysis and measurement are welcome. We highly encourage novel and previously unpublished work, even reporting work in early stages. Click here for details.

  • Special Track on Wireless Networks Security (WNSEC'14)

    Session Chair:
    Dr. Hanen Idoudi, (hanen.idoudi@ensi.rnu.tn)
    University of Manouba, Tunisia

    Nowadays, Wireless technologies are deployed in a wide range of applications include enterprise networks, smart environments, health care, industry, precision agriculture, multimedia applications and intelligent transport systems. The tremendous advances in wireless and mobile technologies are still suffering from many security challenges. This track aims at gathering researchers and practitioners working on state-of-the-art solutions in Wireless Networks Security to share ideas and new research innovations in the field. Papers that describe original contributions addressing various aspects of security mechanisms, protocols and architectures of wireless ad hoc, sensor, vehicular and Mesh Networks and their applications are sought. Click here for details.

  • Special Track on Modeling and Analysis of Information Security (MAIS’2014)

    Session Chair:
    Dr. Samiha Ayed, (samiha.ayed@telecom-bretagne.eu)
    Télécom Bretagne, France

    Specifying, modeling, analyzing and enforcing security policies are essential phases to ensure and maintain the security requirements of information systems. There is an increasing demand of models, techniques and mechanisms to take into account aspects of security at all levels of the system development life-cycle. This special session focuses on security mechanisms related especially to access and flow control and mechanisms of detecting, analyzing and resolving security attacks. Click here for details.

  • Special Track on IoT and SCADA Cybersecurity Education

    Session Chair:
    Professor George Markowsky, (markov@maine.edu, markov@umcs.maine.edu)
    University of Maine, USA

    By 2020 various estimates put the number of “things” on the Internet at 26-30 billion. These networked things will be found in every facet of our lives. This is in addition to the SCADA systems that are so critical for the functioning of modern civilization. In the excitement of creating these new systems, it seems clear that not enough attention is being paid to cybersecurity of the Internet of Things (IoT) and SCADA systems. In particular, this aspect of cybersecurity is not addressed in most cybersecurity programs. This is most unfortunate since it is widely believed that these new systems are less secure than the traditional networked systems. It is also clear that vulnerabilities in the IoT and SCADA systems can be exploited to produce vulnerabilities in traditional systems. This session will focus on the state of IoT and SCADA Cybersecurity Education. Of special interest are topics that can be brought into the cybersecurity curriculum. We invite contributions that look at all aspects of the cybersecurity of the Internet of Things and SCADA systems. This includes such devices as ATMs, home and automobile control systems, and medical devices as well as the traditional systems such as power grids, pipelines and water systems. Click here for details.