CICYBER_22: Edited Book on Computational Intelligence for Cybersecurity Management and Applications September 25, 2022 |
Conference website | https://sites.google.com/view/cicyber |
Submission link | https://easychair.org/conferences/?conf=seecyph-21 |
Submission deadline | April 25, 2022 |
Scope
As cyber-attacks against critical infrastructure increase and evolve, automated systems to complement human analysis are needed. Moreover, chasing the breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort through to obtain actionable information that it seems impossible to know where to start. The analysis of the intelligence of an attack is traditionally an iterative, mainly manual process, which involves an unlimited amount of data to try to determine the sophisticated patterns and behaviours of intruders.
The book is expected to address the above issues and will aim to present new research in the field of cyber threat hunting, information on cyber threats and analysis of important data. Therefore, cyber-attacks protection of computer systems is one of the most important cybersecurity tasks for single users and businesses, since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, Big Data Analytics and machine intelligence-based techniques can be used.
Important Dates
Submission of Full Paper: April 25, 2022
Notification of Acceptance: May 10, 2022
Registration & Camera-Ready Submission: May 30, 2022
Publication Date: September 2022
Submission Guidelines
Authors are invited to submit their full paper by April 25, Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. Submitted manuscripts should respect the standard guidelines of the CRC Taylor & Francis chapter format. Manuscripts must be prepared using Latex, or Word, and according to the CRC requirements that can be downloaded from the (link) and the Chapter should contain in between 12-20 pages. Manuscripts that do not follow the formatting rules will be rejected without review. Prospective authors should send their manuscripts electronically through the easychair submission system as mentioned below:
https://easychair.org/conferences/?conf=seecyph-21
NB:
The paper prior to submission should be checked for plagiarism from licensed plagiarism software like Turnitin, iThenticate, etc. The similarity content should not exceed 25% (in any case either self-sourced contents or others).
List of Topics
-
Artificial intelligence models cybersecurity
-
AI for future cybersecurity applications
-
AI and Blockchain in Cybersecurity threat detection
-
AI for cybersecurity in E-Health
-
AI for cybersecurity in cyber physical systems
-
AI for cybersecurity in Smart cities
-
AI for cybersecurity in IoT
-
Clustering and classification algorithms for blockchain for sensor networks
-
Crypto chips and artificial intelligence
-
Reinforcement learning for Cybersecurity
-
Intelligent systems for fraud detection and forensics in blockchain environments
-
Intelligent applications of blockchain and cybersecurity
-
Multi agent systems and blockchain for cybersecurity
-
AI for cybersecurity in cyber-physical systems
-
Malware detection and Prevention using AI
-
Big data analytics for Cybersecurity
-
Deep Learning for Security Operation Centers
-
AI for detecting threats and attacks
-
Cybersecurity Using Blockchain Technology
-
Intrusion and cybersecurity threat detection and analysis
-
Deep Learning techniques for Cybersecurity and Privacy
-
Machine Learning techniques for Cybersecurity and Privacy
-
Big Data Analytics for cybersecurity in smart city
-
Cybercrime and digital forensics in IoT and cloud computing
-
AI for Cybersecurity in SCADA systems
-
Cybersecurity and privacy in industrial control systems
Editors
-
Yassine Maleh, Sultan Moulay Slimane University, Morocco
-
Mamoun Alazab, Charles Darwin University, Australia
- Soufyane Mounir, Sultan Moulay Slimane University, Morocco
Publication
All accepted papers will be published as a book chapter in Advances in cybersecurity Management Series. The series serves as a central reference source for cybersecurity research and developments. The series aims to publish in-depth, coherent overviews of specific cybersecurity, emerging technology and systemic risk topics, as well as works that are broader than review articles and contain more detailed background information.
All books published in the series are submitted for consideration in Web of Science.
Contact
For questions regarding the book, please contact the Book Editors:
-
Prof. Yassine Maleh, Sultan Moulay Slimane University: yassine.maleh@ieee.org