征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

This seventh edition of the SETOP workshop will be held in Wroclaw (Poland), the 11th of September of 2014, in conjunction with the 19th annual European research event in Computer Security (ESORICS 2014) symposium. We invite researchers and practitioners from all countries working in autonomous security, privacy, trustworthy data systems and related areas to participate in the event. Autonomous and Spontaneous security focuses on the dynamics of system behaviour in response to threats, their detection, characterisation, diagnosis and mitigation in particular through architectural and behavioural reconfiguration. Such approaches are needed in Embedded Systems, Pervasive Computing, and Cloud environments, which bridge the physical, social, and computing worlds and challenge traditional security provisions from different perspectives. Systems must be agile and continue to operate in the presence of compromise, introspective and self-protecting rather than just hardened, resilient to more complex threats yet more vulnerable as they are physically accessible, widely heterogeneous and need to integrate long-term legacy components. Ensuring their resilience and protecting such systems at scale requires novel solutions across a broad spectrum of computational and resource environments, that integrate techniques from different areas including security, network management, machine learning, knowledge representation, control theory, stochastic analysis and software engineering amongst others.

征稿信息

重要日期

2014-06-23
摘要截稿日期

征稿范围

SETOP invites submissions of novel research results and practical experiences relevant to autonomous and spontaneous security approaches including but not limited to the list below. We are looking for contributions to both technologies application areas. Examples for Relevant Application areas: Cloud Environments Critical Infrastructures Vehicular Networks Mobile Computing Mobile Ad-Hoc Networks Wireless Sensor Networks Personal Area Networks Internet of Things Examples of Relevant Technologies / Methodologies: Intrusion and Compromise detection and characterisation Anomaly detection and diagnosis Continuous Authentication Dynamic re-perimeterisation Autonomous Key-Management Context-aware security adaptation Risk assessment at run-time Trust and Reputation System resilience and Survivability Measures and Metrics of system health and resilience Proactive vs. Reactive Security Strategies Synthesis and Evaluation of response strategies Data centric self-protection Bio-inspired models for security Self-Organisation

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 09月11日

    2014

    会议日期

  • 06月23日 2014

    摘要截稿日期

  • 09月11日 2014

    注册截止日期

主办单位
Wroclaw University of Technology
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询