International Workshop on AI for Privacy and Security
The Hague, Holland, 30/08/2016
Research in security and privacy is nowadays one of the hottest topics in computer science. This is because these topics are of capital importance to the development of a sustainable, resilient and prosperous cyber world. This includes protecting crucial assets ranging from Critical Infrastructures to individual's Personal Information, and it spans domains like Cloud computing, Social Computing, Electronic Commerce and many more. Approaches that are intelligent and self-adaptable are required to deal with the complexities of effectively protecting these crucial assets in all these domains. This is where research from the AI community can make a difference in security and privacy. Indeed, these two areas are increasingly receiving more and more attention from the AI community.
topics of interest
- Cloud Computing Security and Privacy
- Social Software / Social Computing Security and Privacy
- Online Social Networks Security and Privacy
- Cyber-Physical Systems Security and Privacy
- Internet of Things Security and Privacy
- Game-theoretic approaches to Security and Privacy
- Trust modelling in the context of Security and Privacy
- Norms and Normative Systems for Security and Privacy
- Machine Learning and Data Mining for Security and Privacy
- AI approaches for detecting Security and privacy violations
- Access Control
- Adversarial Modelling
- Automated Vulnerability Assessment / Penetration Testing
- Critical Infrastructure Protection
- CyberCrime and CyberWar
- Data Leakage and Exfiltration
- Denial of Service / Distributed Denial of Service (DoS/DDoS)
- Digital Forensics
- Distributed collaboration patterns of malicious software and their discovery
- Human Behaviour Modelling and Human Factors
- Insider Threat
- Intrusion Detection/Prevention Systems
- Learning/Recommendation/Negotiation of Security and Privacy Policies
- Validation and verification of security and privacy policies
- Multi-party/Multi-agent Access Control
- Privacy and Personal Information Protection
- Resilience and Robustness
- Risk Assessment and Management, and Risk Mitigation Strategies