PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Workshops

The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations, poster presentations, keynote lectures and panels. Depending on the number of presentations, workshops can be scheduled for 1 day or 2 days. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on CD-ROM support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

WORKSHOPS LIST

2CBDIoT 2018International Workshop on Cloud Computing, Big Data and Internet of Things (ICETE)
Chair(s): Ben othman soufiene

BASS 2018International Workshop on Behavioral Analysis for System Security (ICETE)
Chair(s): Andrea Saracino, Francesco Mercaldo and Alessandro Aldini

International Workshop on
Cloud Computing, Big Data and Internet of Things
 - 2CBDIoT 2018

Paper Submission: June 5, 2018
Authors Notification: June 19, 2018
Camera Ready and Registration: June 27, 2018

Chair

Ben othman soufiene
ISIMED, PRINCE Laboratory Research
Tunisia
 
Scope

The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations . IoT is recognized as one of the most important areas of the future Internet; enabling ubiquitous computing among global networked machines and physical objects.


International Workshop on
Behavioral Analysis for System Security
 - BASS 2018

Paper Submission: June 5, 2018
Authors Notification: June 19, 2018
Camera Ready and Registration: June 27, 2018

Co-chairs

Andrea Saracino
Consiglio Nazionale delle Ricerche - Istituto di Informatica e Telematica
Italy
 
Francesco Mercaldo
Institute of Informatics and Telematics of Pisa CNR
Italy
 
Alessandro Aldini
Università di Urbino Carlo Bo
Italy
 
Scope

Behavioral features are getting in the last years an increasing attention from both IT research and industrial world. Human behavioral aspects are extremely valuable pieces of information, exploited by companies to profile current or potential customers, in order to anticipate their preferences and presenting custom offers. Runtime behavioral analysis is being applied with increasing success for continuous and silent user authentication, and is considered an enabler for the seamless authentication paradigm in several environment and devices. Furthermore, behavioral analysis is posing itself as a valuable alternative to signature-based approaches to identify anomalies, intrusions, security attacks and system malfunctioning. These approaches are in fact known to be flexible, self-learning and able to consider multi-level and multi-domain features, related to software execution, system status, user interaction and current context.
BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system or software behavioral analysis for IT security. The workshop solicits submission on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling and privacy and security aspects related to recording and exploitation of behavioral features.


Topics of interest include but are not limited to:
-    Software Behavior Analysis
-    User behavior modeling and classification
-    Human behavior profiling
-    Behavior-based authentication
-    Behavioral features and approaches for intrusion detection
-    Privacy-preserving behavioral analysis
-    Secure recording and management of behavioral features
-    Hazardous behavior prediction and risk mitigation
-    Behavioral models for distributed IT systems
-    Hardware and virtual network traffic behavior
-    Behavioral analysis and classification for forensic applications
-    Cyber-Risk models exploiting behavioral features
-    Behavioral practices for cyber-disaster management and recovery
-    Models and practices for collaborative behavioral analysis
-    Biometric-behavioral models for user authentication
-    Ability authentication
-    Behavioral Analysis for Access and Usage Control





footer