[aims-announce] Call for Papers: 1st Workshop on Network Security Operations (NeSecOr)

Martin Husák husakm at ics.muni.cz
Mon Jul 8 13:27:12 CEST 2024


*1st Workshop on Network Security Operations (NeSecOr)*
co-located with 20th International Conference on Network and Service 
Management
Prague, Czech Republic, 28 - 31 October 2024
http://www.cnsm-conf.org/2024/NeSecOr.html
<http://www.cnsm-conf.org/2024/NeSecOr.html>

Automation and orchestration represent a paradigm shift in how security 
operations are conducted. Automation involves the use of technology to 
perform tasks with minimal human intervention, streamlining processes 
such as threat detection, incident response, and system remediation. 
Orchestration goes a step further by integrating these automated tasks 
into a cohesive workflow, enabling seamless coordination across 
different security tools and systems. Together, these approaches can 
significantly improve the speed, accuracy, and efficiency of security 
operations.

The workshop will cover key topics including the fundamentals of 
security automation, the role of orchestration in creating unified 
security workflows, and best practices for implementing these 
technologies in a network security environment. Participants will gain 
hands-on experience with leading automation and orchestration platforms, 
explore real-world case studies, and engage in interactive sessions 
designed to solve practical security challenges.

*Important Dates*

Submission Deadline: *August 23, 2024*
Acceptance Notification: September 9, 2024
Camera Ready: September 16, 2024
Workshop Day: October 28, 2024

*Topics of Interest*

  * Network Security Management

      * Network monitoring, intrusion detection, incident triage

      * Asset management and vulnerability discovery

      * NetOps and SecOps, Network and Security Operations Centers (NOC,
        SOC)

      * Digital twins for security and resilience

  * Scalability and Interoperability in Network Security

      * Automation and orchestration of network security workflows

      * Security Orchestration, Automation, and Response (SOAR)

      * Cybersecurity Mesh Architecture (CSMA)

      * Large-scale deployments of network security tools

  * Resilience and Mitigation

      * Theoretical foundation of network and system resilience

      * Resilience assessment and modeling, attack impact assessment

      * Cyber situational awareness (CSA)

      * Attack mitigation and recovery

  * Applications in Specific Environments

      * Security and resilience in the Internet of Things (IoT) and
        Cyber-Physical Systems (CPS)

      * Security and resilience in cloud, fog, and edge computing

      * Security and resilience in Critical Information Infrastructures
        (CII)

      * Security and resilience in healthcare, energy sector, industrial
        robotics, smart cities, etc.

*Paper Submission Guideline*

Authors are invited to submit original unpublished papers not under 
review elsewhere. Papers should be submitted in *IEEE 2-column format*. 
Maximum paper lengths, including title, abstract, all figures, tables, 
and references, are *7 pages for regular papers* and *4 pages for short 
papers*.

Papers have to be submitted electronically in PDF format through the 
EDAS conference management system, accessible via: 
https://edas.info/newPaper.php?c=32710

All submitted papers will be peer-reviewed and selected based on their 
originality, significance, technical soundness, and relevance to the 
workshop’s theme. For accepted papers, at least one author is expected 
to register and present the paper in person at the workshop. Accepted 
and presented papers will be published in the conference proceedings and 
submitted to IEEE Xplore.

For any questions, please feel free to contact Martin Husák 
(husakm at ics.muni.cz).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ifi.uzh.ch/pipermail/aims-announce/attachments/20240708/40296796/attachment.html>


More information about the aims-announce mailing list