Workshop on Cyber Security with Artificial Intelligent techniques


Artificial intelligence (AI) plays an important role for many applications. AI techniques can be used to analyze relevant signals in large amounts of situational awareness data which is beneficial for cyber security. Machine learning techniques (an active field of AI) that can be trained to remove unwanted data or ‘noise’ and to improve the analysts’ ability to understand their cyber environment and to detect anomalous activities. In addition, cyber security can be benefited through the use of automated techniques to generate cyber courses of action in response to cyber threats. Game theoretic reasoning and agent-based modeling techniques can be used to explore potential attacker-defender adversary interactions and their associated outcomes in order to evaluate candidate solutions and to inform decision makers.

Within the scope of IES2017, this workshop is structured to encourage a lively exchange of ideas between researchers and practitioners in these communities from the academic, public and commercial sectors. The workshop will focus on AI research in cyber security, including machine learning, game theory, natural language processing, knowledge representation, and automated and assistive reasoning. Further, the workshop will emphasize applications of AI techniques that enable resilience in cyber security systems in operational or mission settings.  

 

THE TOPIC IS LIMITED TO:

Natural language processing techniques

Machine Learning approaches to make cyber system secure

Anomaly/Threat detection techniques

Big Data Noise reduction techniques

Human behavioral modeling

Formal reasoning, with focus on human element, in cyber systems

Multi-agent interaction/agent based modeling in cyber systems

Modeling and simulation of cyber systems and system components

Decision making under uncertainty in cyber systems

Game Theoretic reasoning in cyber security

Economics of cyber security

Automated security aids for system administrators

Malware analysis and detection

Intrusion detection systems

 

PAPER SUBMISSION 

To help ensure correct formatting, please use the style files for U.S. Letter Size found at the link below as templates for your submission. These include Word and LaTeX.

http://www.ieee.org/conferences_events/conferences/publishing/templates.html

Violations of any of the above paper specifications may result in rejection of your paper. Please note that the Latex template does not allow for Keywords. If you are using the Latex template, do not include Keywords in your paper.

Submission Website:

http://www.easychair.org/conferences/?conf=ies2017


ACCEPTED PAPERS:

 It is the author's responsibility to ensure an accepted paper strictly adheres to the proper formatting guidelines. Accepted papers must be verified using PDF eXpress. Before submission of the final camera-ready manuscript, authors shall verify their own papers at www.pdf-express.org.

All accepted papers will be included in IES2017’s proceedings, which will be published by IEEE (pending) and be available at the conference.

 

IMPORTANT DATES 

• Deadline for paper submission: July 1, 2017 July 30, 2017
• Notification of acceptance:August 15, 2017 September 15, 2017
• Deadline for camera ready paper submission:August 30, 2017 September 30, 2017


CHAIRS

Nguyen Le Minh, JAIST  

Mizuhito Ogawa, JAIST 

Lam Thu Bui, LQDTU