<!DOCTYPE html><html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body>
<p><br>
</p>
<div align="center"><b>1st Workshop on Network Security Operations
(NeSecOr)</b></div>
<div align="center"><span class="cnsm-location">co-located with </span><span class="cnsm-header">20th International Conference on Network and
Service Management</span><br>
<span class="cnsm-location">Prague, Czech Republic, 28 - 31
October 2024</span></div>
<div align="center"><span class="cnsm-location"><a href="http://www.cnsm-conf.org/2024/NeSecOr.html">http://www.cnsm-conf.org/2024/NeSecOr.html<br>
</a></span></div>
<br>
Automation and orchestration represent a paradigm shift in how
security operations are conducted. Automation involves the use of
technology to perform tasks with minimal human intervention,
streamlining processes such as threat detection, incident response,
and system remediation. Orchestration goes a step further by
integrating these automated tasks into a cohesive workflow, enabling
seamless coordination across different security tools and systems.
Together, these approaches can significantly improve the speed,
accuracy, and efficiency of security operations.<br>
<br>
The workshop will cover key topics including the fundamentals of
security automation, the role of orchestration in creating unified
security workflows, and best practices for implementing these
technologies in a network security environment. Participants will
gain hands-on experience with leading automation and orchestration
platforms, explore real-world case studies, and engage in
interactive sessions designed to solve practical security
challenges.<br>
<br>
<b>Important Dates</b><br>
<br>
Submission Deadline: <b>August 23, 2024</b><br>
Acceptance Notification: September 9, 2024<br>
Camera Ready: September 16, 2024<br>
Workshop Day: October 28, 2024<br>
<br>
<b>Topics of Interest</b><br>
<ul>
<li>Network Security Management</li>
</ul>
<blockquote>
<ul>
<li>Network monitoring, intrusion detection, incident triage</li>
</ul>
<ul>
<li>Asset management and vulnerability discovery</li>
</ul>
<ul>
<li>NetOps and SecOps, Network and Security Operations Centers
(NOC, SOC)</li>
</ul>
<ul>
<li>Digital twins for security and resilience</li>
</ul>
</blockquote>
<ul>
<li>Scalability and Interoperability in Network Security</li>
</ul>
<blockquote>
<ul>
<li>Automation and orchestration of network security workflows</li>
</ul>
<ul>
<li>Security Orchestration, Automation, and Response (SOAR)</li>
</ul>
<ul>
<li>Cybersecurity Mesh Architecture (CSMA)</li>
</ul>
<ul>
<li>Large-scale deployments of network security tools</li>
</ul>
</blockquote>
<ul>
<li>Resilience and Mitigation</li>
</ul>
<blockquote>
<ul>
<li>Theoretical foundation of network and system resilience</li>
</ul>
<ul>
<li>Resilience assessment and modeling, attack impact assessment</li>
</ul>
<ul>
<li>Cyber situational awareness (CSA)</li>
</ul>
<ul>
<li>Attack mitigation and recovery</li>
</ul>
</blockquote>
<ul>
<li>Applications in Specific Environments</li>
</ul>
<blockquote>
<ul>
<li>Security and resilience in the Internet of Things (IoT) and
Cyber-Physical Systems (CPS)</li>
</ul>
<ul>
<li>Security and resilience in cloud, fog, and edge computing</li>
</ul>
<ul>
<li>Security and resilience in Critical Information
Infrastructures (CII)</li>
</ul>
<ul>
<li>Security and resilience in healthcare, energy sector,
industrial robotics, smart cities, etc.</li>
</ul>
</blockquote>
<b>Paper Submission Guideline</b><br>
<br>
Authors are invited to submit original unpublished papers not under
review elsewhere. Papers should be submitted in <b>IEEE 2-column
format</b>. Maximum paper lengths, including title, abstract, all
figures, tables, and references, are <b>7 pages for regular papers</b>
and <b>4 pages for short papers</b>.<br>
<br>
Papers have to be submitted electronically in PDF format through the
EDAS conference management system, accessible via: <a href="https://edas.info/newPaper.php?c=32710" class="moz-txt-link-freetext">https://edas.info/newPaper.php?c=32710</a><br>
<p>All submitted papers will be peer-reviewed and selected based on
their originality, significance, technical soundness, and
relevance to the workshop’s theme. For accepted papers, at least
one author is expected to register and present the paper in person
at the workshop. Accepted and presented papers will be published
in the conference proceedings and submitted to IEEE Xplore.</p>
For any questions, please feel free to contact Martin Husák (<a class="moz-txt-link-abbreviated moz-txt-link-freetext" href="mailto:husakm@ics.muni.cz">husakm@ics.muni.cz</a>).<br>
</body>
</html>