Cyber Resilience<br>Cyber security assessment; Data analytics for Cyber resilience; Organizational security (government, commercial); Resilient smart cities; Resilient Internet of Things (RIOT); Cyber–cities and Cyber–environments; Critical infrastructure security; Back up and recovery for systems of systems; Disaster planning and management from Cyber perspective; Integrated and smarter sensors<br>Cyber Security<br>Security management [overall information security management in the sense of 27000 series applied to cyber systems]; Compliance management [verify/check compliance with defined policies, provide corresponding management reports]; Security administration of cyber systems [technical security management of security services]; Security and privacy regulations and laws; Securely interconnected cyber systems [firewalls, cross–domain security solutions]; Self–securing and self–defending cyber systems; Trust management, trust–based information processing [using possibly untrustworthy data sources in a controlled way]; Security technologies for protecting cyber systems and devices; Identity and access management in cyber systems; Anti–counterfeiting; Secure production and supply chain; Cloud computing security; Big–data security; Advanced persistent threats; Network traffic analysis and trace–back; Cyberspace operations; Incident response, investigation, and evidence handling; Intrusion detection and prevention; Cyberspace protection and anti–malware; Cooperation and sharing for Cyber–defense<br>Cyber Infrastructure<br>Cyber–Cities and Cyber–environments; Information technology infrastructure; Telecommunications and networks; Cyber–space and data centers; Cyber–enabled control systems; Cyber–enabled critical infrastructure systems; Cyber–physical systems and Internet of Things; Special application domains (smart grid, traffic management systems, autonomous driving, etc.); Embedded processors and controllers; Mobility in Cyber–space; Virtualization in Cyber–space<br>Cyber Forensics<br>Computer and networks forensics; Social networking forensics; Digital forensics tools and applications; Applications of information hiding; Identification, authentication, and collection of digital evidence; Anti–forensic techniques and methods; Watermarking and intellectual property theft; Privacy issues in network forensics; Tools, applications, case studies, best practices<br>Cyber Crime<br>Cyber–crimes: Challenges in detection/prevention; Anomalies detection; Advanced Persistent Threats and Cyber–resilience; BotNets and MobiNets; Cyber crime–related investigations; Challenges and detection of Cyber–crimes; Network traffic analysis, traceback; Security information and event management (SIEM); Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.<br>Nature–inspired and Bio–inspired Cyber–defense<br>Bio–inspired anomaly & intrusion detection; Autonomic and Adaptive Cyber–Defense; Adaptive and Evolvable Systems; Cooperative defense systems; Network artificial immune systems; Adaptation algorithms for cyber security; Biometrics related to cyber defense; Bio–inspired security and networking algorithms and technologies; Biomimetics related to cyber security; Bio–inspired cyber threat intelligence methods and systems; Bio–inspired algorithms for dependable networks; Correlations in moving–target techniques; Neural networks, evolutionary algorithms, and genetic algorithms for cyber security Prediction techniques for cyber defense; Information hiding solutions (steganography, watermarking) and detection<br>Social–inspired opportunistic mobile Cyber–systems<br>Design of cyber–physical applications for opportunistic mobile systems based on behavioral models; Social metrics for networks and systems operations; Application of mixed physical and online social network sensing; Social–aware modeling, design and development of routing algorithms in cyber–physical; Incentive mechanisms, reputation systems and key management algorithms in cyber–physical opportunistic mobile systems; Participatory mobile sensing for mining integration in cyber–physical opportunistic mobile systems; Experiments with cyber–physical opportunistic mobile systems<br>
Abbrevation
CYBER
City
Venice
Country
Italy
Deadline Paper
Start Date
End Date
Abstract