Baltimore Convention Center
Baltimore, Maryland, United States
20 - 24 April 2015
Conference DS108
Cyber Sensing 2015
This conference is no longer accepting submissions.
Late submissions may be considered subject to chair approval. For more information, please contact Pat Wight.
show | hide
Abstract Due:
6 October 2014

Author Notification:
15 December 2014

Manuscript Due Date:
23 March 2015

show | hide
Conference Chairs
  • Igor V. Ternovskiy, Air Force Research Lab. (United States)
  • Peter Chin, Draper Lab. (United States), Boston Univ. (United States)

Program Committee
  • Chad D. Heitzenrater, Air Force Research Lab. (United States)
  • Tony C. Kim, Air Force Research Lab. (United States)

Call for
Cyberspace is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures, including the Internet, telecommunications networks, sensors, computer systems, and embedded processors and controllers. Simply put, if an electronic device produce, emits, or transmits digital information, it is in the cyberspace domain.

It is an operational domain equally important as land, sea, air, and space. Cyberspace interconnects and controls communication networks, transportation infrastructure, international financial transactions, and even public utilities (i.e., a nation’s critical infrastructure). These domains must be defended against malicious attack. With the growing dependence on information systems by the modern world, cyber is thought of as a domain of operations where the entire electromagnetic spectrum is the medium.

Nevertheless, the medium itself is not what is truly important; it is how the operation of information systems is affected which defines what is, and is not, a part of the cyber domain. A basic example is that a “traditional” RF sensor can be considered a cyber sensor if it is being used in such a way as to detect the presence of a wireless network.

As with any domain, the cyber domain requires the environment to be sensed in order to be able to have situational awareness. Cyber sensing seeks to exploit any part of the electromagnetic spectrum in order to provide the information necessary for that situational awareness so the integrity of information assets and the networks that bind them can be better maintained and defended. To achieve this, this conference seeks to discuss the development of novel cyber sensing technologies and cyber sensing methodologies. Technical and scientific papers related to innovative cyber sensing technologies that push beyond the scope of the state of the art in industry are solicited.

Some topic areas include, but are not limited to:

Novel Cyber Sensors and Cyber Sensing Paradigms
  • cyber-oriented sensing techniques
  • collaborative sensor networks
  • autonomous sensors and exploitation/data-driven sensing
  • cyber attacks-aware sensors/networks
  • virtual (software-based) sensors embedded within information systems/networks
  • cellular phone detection and/or geolocation
  • innovative cyber sensing applications.
Information Processing and Analysis Techniques
  • cyber domain state estimation
  • cyber sensor, including fusion of traditional sensor data for cyber effects
  • artificial immune systems
  • trusted systems operating in open environment
  • Internet of Things: processing and analysis
  • Big Data processing detection and sensing.
Cyber Protection, Cloud Security
  • access control policy monitoring/enforcement
  • dynamic malware/rootkit detection and network defense technologies
  • network-based and host-based monitors/intrusion detection systems
  • resilient cyber defense agents
  • cyber countermeasures, methods to detect and react to compromised cyber resources
  • techniques to maintain functionality during degraded performance
  • novel measures to ensure trust between cyber resources; identity management
  • computation on encrypted data
  • fully homomorphic encryption schemes.
Theory of Cyber Sensing and Security, Mathematical Understanding of Security
  • emerging method and techniques (graph theory, network topology, complexity theory, experimental game theory, etc.) to model and analyze cyber domain
  • model-based detection of behavior anomalies in cyber space
  • algorithm-independent performance bounds prediction
  • topological data analysis to combine local security information to achieve a coherent global picture
  • Game-Semantics: a new paradigm to model correctness of a part, if not whole, of a piece of software
  • Lambda calculus
  • Turing computational models.
Social Cyber Sensing; Cyber Sensing Through Social Media
  • crowd-sourced sensing and sense-making from human populations (SETI, FoldIt, etc.)
  • Web 2.0 exploration and analysis
  • social networks and science, education, economy, and politics; controllability of networks, influence and intervention mechanisms
  • efficient methods to find social structures in large-scale graphs; finding rumors, botnets, etc.
Back to Top