IEEE Intelligent Systems Special Issue on Intelligent Cyber Security Agents
http://www.computer.org/web/computingnow/iscfp5
Submission Deadline: 15 January 2016
Publication: September/October 2016
Cybersecurity is of utmost importance to the development of a sustainable, resilient, and prosperous cyber world. This includes protecting crucial assets, ranging from critical infrastructures to an individual's personal information, and it spans domains like cloud computing, the smart grid, virtual organisations, virtual communities, social media, and electronic commerce. In the last few years, cybercriminals have attacked targets using a broad range of tactics, devising very professional approaches to monetisation of exploits, and conducting political and industrial espionage.
To deal with these threats, the security community has been looking at more intelligent, distributed, and adaptable security mechanisms. This is where research from the intelligent agent community can make a difference in cybersecurity. However, agent technologies are not capable of providing a drop-in replacement for the current methods. They need to be carefully crafted to work with the existing methods and systems.
This special issue is intended to explore state-of-the-art research dealing with new tools, techniques, concepts, and applications concerning agent-based approaches to cybersecurity. Topics of interest include, but are not limited to:
• Intelligent Access Control Models
• Advanced Persistent Threats
• Adversarial Modelling
• Automated Vulnerability Assessment/ Penetration Testing
• Cloud Computing and Social Media Security and Privacy
• Critical Infrastructure Protection
• Cybercrime and Cyberwar
• Denial of Service/ Distributed Denial of Service (DoS/DDoS)
• Game-theoretic approaches to Security and Privacy
• Human Behaviour Modelling
• Information Forensics
• Information Leakage and Exfiltration
• Insider Threat
• Intrusion Detection/Prevention Systems
• Learning/Recommendation/Negotiation of Security and Privacy Policies
• Malware (Virus, Worms, Trojans, Backdoors)
• Multi-party/Multi-agent Access Control
• Privacy and Personal Information Protection
• Resilience and Robustness
• Risk Management and Risk Mitigation Strategies
Submission Guidelines
Submissions should be 3,000 to 5,400 words (counting a standard figure or table as 200 words) and should follow IEEE Intelligent Systems style and presentation guidelines (www.computer.org/web/peer-review/magazines). The manuscripts cannot have been published or be currently submitted for publication elsewhere.
Guest Editors
• Laurent Vercouter. INSA de Rouen. Email: [log in to unmask]
• Jose M. Such, Lancaster University. Email: [log in to unmask]
• Martin Rehak, Cisco, Czech Technical University in Prague. Email: [log in to unmask]
• Natalia Criado Pacheco, Liverpool John Moores University. Email: [log in to unmask]
Questions?
Information about the special issue's focus: [log in to unmask]
General author guidelines: www.computer.org/web/peer-review/magazines
Submission details: contact [log in to unmask]
To submit an article: https://mc.manuscriptcentral.com/is-cs
------------------------
Dr. Jose M. Such
Lecturer (Assistant Professor)
Security Lancaster, an EPSRC and GCHQ Academic Centre of Excellence in Cyber Security Research
School of Computing and Communications
Lancaster University, UK
Web: http://www.lancaster.ac.uk/staff/suchj
|