Anaheim Convention Center
Anaheim, California, United States
9 - 13 April 2017
Conference DS108
Cyber Sensing 2017
show | hide
Abstract Due:
26 September 2016

Author Notification:
5 December 2016

Manuscript Due Date:
13 March 2017

show | hide
Conference Chairs
  • Igor V. Ternovskiy, Air Force Research Lab. (United States)
  • Peter Chin, Draper Lab. (United States), Boston Univ. (United States)

Program Committee
Program Committee continued...
Call for
Cyberspace is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures, including the Internet, telecommunications networks, sensors, computer systems, and embedded processors and controllers. Simply put, if an electronic device produce, emits, or transmits digital information, it is in the cyberspace domain.

As with any domain, the cyber domain requires the environment to be sensed in order to be able to have situational awareness. Cyber sensing seeks to exploit any part of the electromagnetic spectrum in order to provide the information necessary for that situational awareness so the integrity of information assets and the networks that bind them can be better maintained and defended. To achieve this, this conference seeks to discuss the development of novel cyber sensing technologies and cyber sensing methodologies. Technical and scientific papers related to innovative cyber sensing technologies that push beyond the scope of the state of the art in industry are solicited. Nevertheless, the medium itself is not what is truly important; it is how the operation of information systems is affected which defines what is, and is not, a part of the cyber domain.

It is an operational domain equally important as land, sea, air, and space. Cyberspace interconnects and controls communication networks, transportation infrastructure, international financial transactions, and even public utilities (i.e., a nation’s critical infrastructure). These domains must be defended against malicious attack. With the growing dependence on information systems by the modern world, cyber is thought of as a domain of operations where the entire electromagnetic spectrum is the medium.

Some topic areas include, but are not limited to:

Novel Cyber Sensors and Cyber Sensing Paradigms
  • cyber-oriented sensing techniques
  • collaborative sensor networks
  • autonomous sensors and exploitation/data-driven sensing
  • cyber-attacks responsive sensors/networks
  • virtual (software-based) sensors embedded within information systems/networks
  • cellular phone detection and/or geolocation
  • innovative cyber sensing applications.

Information Processing and Analysis Techniques
  • cyber sensor, including fusion of traditional sensor data for cyber effects
  • trusted systems operating in open environment
  • Internet of Things: processing and analysis
  • Big Data processing detection and sensing.

Cyber Protection, Cloud Security
  • access control policy monitoring/enforcement
  • dynamic malware/rootkit detection and network defense technologies
  • network-based and host-based monitors/intrusion detection systems
  • resilient cyber defense agents
  • cyber countermeasures, methods to detect and react to compromised cyber resources
  • techniques to maintain functionality during degraded performance
  • novel measures to ensure trust between cyber resources; identity management
  • computation on encrypted data
  • fully homomorphic encryption schemes.

Theory of Cyber Sensing and Security, Mathematical Understanding of Security
  • emerging method and techniques (graph theory, network topology, complexity theory, experimental game theory, etc.) to model and analyze cyber domain
  • model-based detection of behavior anomalies in cyber space
  • topological data analysis to combine local security information to achieve a coherent global picture.

Social Cyber Sensing; Cyber Sensing Through Social Media
  • crowd-sourced sensing and sense-making from human populations (SETI, FoldIt, etc.)
  • Web 2.0 exploration and analysis
  • social networks and science, education, economy, and politics; controllability of networks, influence and intervention mechanisms
  • efficient methods to find social structures in large-scale graphs; finding rumors, botnets, etc.
Back to Top