2nd International Workshop on Agents and CyberSecurity
04/05/2015–05/05/2015
Research in cyber security is nowadays one of the hottest topics in computer science. This is because security is of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Smart grid, Virtual Organisations, Virtual Communities, Social Media, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the agent community can make a difference in cyber security. Indeed, cyber security is increasingly receiving more and more attention from the agent community. The focus of the Second International Workshop on Agents and CyberSecurity (ACySE) is to provide a forum to discuss and advance cyber security by means of agent-based approaches.
topics of interest
- Access Control Models
- Adversarial Modelling
- Cloud Computing Security/Privacy
- Collective Decision Making for Access Control
- Contextual Integrity
- Communication Resilience and Robustness
- Critical Infrastructure Protection
- Cyber-dependent and Cyber-enabled Crime
- CyberWar and CyberWeapons
- Denial of Service/ Distributed Denial of Service (DoS/DDoS)
- Digital Forensics Investigation
- Disclosure/Self-disclosure Decision Making
- e-Crime Science
- Game-theoretic approaches to Security and Privacy
- Human Behaviour Modelling
- Human Privacy Attitudes
- Identity Theft
- Information Leakage
- Information-theoretic approaches to Security/Privacy
- Insider Threat
- Institutional and Social Privacy
- Intrusion Detection/Prevention Systems (Agent-based IDS/IPS, Adaptive IDS/IPS, Collaborative IDS/IPS)
- Learning Security/Privacy Policies
- Malware (Virus, Worms, Trojans, Backdoors)
- Multi-party/Multi-agent Access Control Models
- Negotiation of Security/Privacy Policies
- Penetration Testing
- Privacy and Personal Information Protection
- Recommendation of Security/Privacy Policies
- Relationship-based Access Control Models
- Risk Management
- Risk Mitigation Strategies
- Social Media Security/Privacy
- Spoofing and Countermeasures
- Steganography
- User Profiling and Countermeasures
- Zero-day attacks
hosting event
colocated event
works as
hosted event for
colocated event for