International Defense and Homeland Security Simulation Workshop

 

10-12 September, 2014

Agora Multi-Purpose Complex, University of Bordeaux

Bordeaux, France

 

Joint EMSS—DHSS Track

Call For Papers

 

Computer Simulation for Security

 

Track at the International Defense and Homeland Security Workshop

(DHSS 2014)

 

Track Chairs: (a) Edgar Alonso Lopez-Rojas ; (b) Joni A. Amorim ; © Richard Zaluski

 

Contacts: (a)edgar.lopez@bth.se ; (b) joni.amorim@his.se ; ©  richard.zaluski@cscss.org

 

Affiliations:

(a) Blekinge Institute of Technology (b) University of Skövde  (c ) Center for Strategic Cyberspace + Security Science

 

 

 

Deadlines for submission

Paper submission: April 15, 2014

Notification of acceptance: May 15, 2014

Final camera-ready submission: June 15, 2014

 

Author’s Instruction for paper submission

 

Track description

A digitally interconnected world demands that we coordinate modeling and simulation into cyber security with the intent of helping organizations to secure their assets and find practical solutions for the critical issues of today.  Modeling and simulation are essential to research, development and adoption of the next generation of technologies. Nevertheless, these technologies must be delivered to different industries in a close collaboration with academia through public-private partnerships. On the other hand, modeling and simulation are now key competencies to be incorporated by the security workforce. Security is sometimes an obscure topic because of the needs to preserve privacy but simulation is one possible way to address this issue. Examples of new approaches include agent based simulation and similar techniques that may be used to model behaviors, malicious or not. These simulations favor relevant discoveries while being commonly used to test current or experimental detection methods at low cost. In this way, the goal of this track is consider the state of the art in security within the perspective of simulation.

 

Topics of interest include simulation in the following contexts:

· architecture driven security flow

· certification processes for individuals

· cloud, big data, analytics and security

· cyber intelligence and profiling

· cyber security, cybercrime and fraud

· cyber warfare modeling and simulation

· denial of service

· disaster simulation and recovery planning

· discovery and awareness of new and current threats

· education and training

· financial transactions

· forensic computing

· fraud detection

· information security

· intrusion detection

· new approaches for security

· privacy and ‘anonymization’ techniques through simulation

DHSS, 2014

 

< I3M 2014