Anaheim Convention Center
Anaheim, California, United States
26 - 30 April 2020
Conference SI214
Cyber Sensing 2020
Important
Dates
show | hide
Abstract Due:
16 October 2019

Author Notification:
20 December 2019

Manuscript Due Date:
1 April 2020

Conference
Committee
show | hide
Conference Chairs
  • Igor V. Ternovskiy, Air Force Research Lab. (United States)
  • Peter Chin, Boston Univ. (United States)

Program Committee
  • Patrick W. Jungwirth, U.S. Army Research, Development and Engineering Command (United States)
  • Tony C. Kim, Air Force Research Lab. (United States)
  • Michael A. Kolodny, U.S. Army Research Lab. (United States)

Program Committee continued...
Call for
Papers
Cyber Sensing aims to bring together leading academic and government scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Network Information Security, Data Breaches and Malware Analysis, Privacy Management, Autonomous Data Analysis and Protection. Cyberspace is a global domain within the information environment consisting of the interdependent networks of information technology infrastructures, including the Internet, telecommunications networks, sensors, computer systems, and embedded processors and controllers. As with any domain, the cyber domain requires the environment to be sensed in order to be able to have situational awareness. Cyber sensing seeks to exploit any part of the electromagnetic spectrum in to provide the information necessary for that situational awareness so the integrity of information assets and the networks that bind them can be better maintained and defended. To achieve this, this conference seeks to discuss the development of novel cyber sensing technologies and cyber sensing methodologies. Technical and scientific papers related to innovative cyber sensing technologies that push beyond the scope of the state of the art in industry are solicited. Cyberspace interconnects and controls communication networks, transportation infrastructure, international financial transactions, and a nation’s critical infrastructure, i.e. the Internet of things (IoT). These domains must be defended against malicious attack. With the growing dependence on information systems by the modern world, cyber is thought of as a domain of operations where the entire electromagnetic spectrum is the medium.

Novel Cyber Sensors and Cyber Sensing Paradigms
  • cyber-oriented sensing techniques
  • collaborative sensor networks
  • autonomous sensors and exploitation/data-driven sensing
  • cyber-attacks responsive sensors/networks
  • innovative cyber sensing applications
  • autonomous data protection systems.
Cyber Sensing for Adversarial ML
  • cyber techniques for detecting adversarial machine learning algorithms
  • cyber techniques for detecting media manipulations (deep fake, etc.)
  • ideas for using reinforcement leaning for cyber hardening
Sparsity Techniques in Cyber Sensing
  • sparse coding, sparse representations, and dictionary learning for cyber data
  • sparse and low-rank approximation algorithms for cyber data
  • compressed Learning – compressive sensing for learning: new theory and methods.
  • dimensionality reduction, feature extraction, classification, detection, and source separation.
  • geometric Wavelet Theory
  • statistical models and algorithms for exploiting sparsity in cyber data.
Information Processing and Analysis Techniques
  • fusion of sensor data for cyber effects
  • trusted systems operating in open environment
  • Internet of Things (IoT): processing and analysis
  • Big Data processing detection and sensing
  • machine learning and autonomy for cyber data.
Cyber Protection, Cloud Security
  • access control policy monitoring/enforcement
  • dynamic malware/rootkit detection and network defense technologies
  • network-based and host-based monitors/intrusion detection systems
  • resilient cyber defense agents
  • cyber countermeasures, methods to detect and react to compromised cyber resources
  • techniques to maintain functionality during degraded performance
  • novel measures to ensure trust between cyber resources
  • identity management
  • computation on encrypted data
  • fully homomorphic encryption schemes
  • Information and multimedia forensic.
Theory of Cyber Sensing and Security, Mathematical Understanding of Security
  • emerging method and techniques (graph theory, network topology, complexity theory, experimental game theory, etc.) to model and analyze cyber domain
  • model-based detection of behavior anomalies in cyber space
  • topological data analysis to combine local security information to achieve a coherent global picture.
Social Cyber Sensing; Cyber Sensing Through Social Media
  • crowd-sourced sensing and sense-making from human populations (SETI, FoldIt, etc.)
  • Web 2.0 exploration and analysis
  • social networks and science, education, economy, and politics; controllability of networks, influence and intervention mechanisms
  • efficient methods to find social structures in large-scale graphs; finding rumors, botnets, etc.
  • cyber techniques for defeating ransomware attacks.
Special Session Hardware Assisted Cyber Security (HACS)

A new approach based on hardware: OS co-design offers a number of cyber security advantages. Papers describing hardware approaches to improve cyber security and reduce software complexity are solicited for this session. Topics included, but not limited to:
  • use of practical PUFs for avoiding clones, old ICs being refurbished, and counterfeits
  • TPMs: the advantages and disadvantages of the standard, and applications
  • how can FPGAs potentially help with securing servers, IoT devices, and gateways
  • instruction set modification to improve security and applications (additions to virtualization and other dimensions of trust-related instructions)
  • security tagged architectures and metadata (security tag) label propagation
  • more secure architectures. Harvard, von Neumann, and other architectures analysis
  • hardware features to reduce complexity of an operating system
  • hardware security features for IoT
  • hardware features to improve and simplify provable correct operating systems
  • hardware: OS co-design for improved cyber security.
Back to Top