[aims-announce] Call for Papers: 1st Workshop on Network Security Operations (NeSecOr)
Martin Husák
husakm at ics.muni.cz
Mon Jul 8 13:27:12 CEST 2024
*1st Workshop on Network Security Operations (NeSecOr)*
co-located with 20th International Conference on Network and Service
Management
Prague, Czech Republic, 28 - 31 October 2024
http://www.cnsm-conf.org/2024/NeSecOr.html
<http://www.cnsm-conf.org/2024/NeSecOr.html>
Automation and orchestration represent a paradigm shift in how security
operations are conducted. Automation involves the use of technology to
perform tasks with minimal human intervention, streamlining processes
such as threat detection, incident response, and system remediation.
Orchestration goes a step further by integrating these automated tasks
into a cohesive workflow, enabling seamless coordination across
different security tools and systems. Together, these approaches can
significantly improve the speed, accuracy, and efficiency of security
operations.
The workshop will cover key topics including the fundamentals of
security automation, the role of orchestration in creating unified
security workflows, and best practices for implementing these
technologies in a network security environment. Participants will gain
hands-on experience with leading automation and orchestration platforms,
explore real-world case studies, and engage in interactive sessions
designed to solve practical security challenges.
*Important Dates*
Submission Deadline: *August 23, 2024*
Acceptance Notification: September 9, 2024
Camera Ready: September 16, 2024
Workshop Day: October 28, 2024
*Topics of Interest*
* Network Security Management
* Network monitoring, intrusion detection, incident triage
* Asset management and vulnerability discovery
* NetOps and SecOps, Network and Security Operations Centers (NOC,
SOC)
* Digital twins for security and resilience
* Scalability and Interoperability in Network Security
* Automation and orchestration of network security workflows
* Security Orchestration, Automation, and Response (SOAR)
* Cybersecurity Mesh Architecture (CSMA)
* Large-scale deployments of network security tools
* Resilience and Mitigation
* Theoretical foundation of network and system resilience
* Resilience assessment and modeling, attack impact assessment
* Cyber situational awareness (CSA)
* Attack mitigation and recovery
* Applications in Specific Environments
* Security and resilience in the Internet of Things (IoT) and
Cyber-Physical Systems (CPS)
* Security and resilience in cloud, fog, and edge computing
* Security and resilience in Critical Information Infrastructures
(CII)
* Security and resilience in healthcare, energy sector, industrial
robotics, smart cities, etc.
*Paper Submission Guideline*
Authors are invited to submit original unpublished papers not under
review elsewhere. Papers should be submitted in *IEEE 2-column format*.
Maximum paper lengths, including title, abstract, all figures, tables,
and references, are *7 pages for regular papers* and *4 pages for short
papers*.
Papers have to be submitted electronically in PDF format through the
EDAS conference management system, accessible via:
https://edas.info/newPaper.php?c=32710
All submitted papers will be peer-reviewed and selected based on their
originality, significance, technical soundness, and relevance to the
workshop’s theme. For accepted papers, at least one author is expected
to register and present the paper in person at the workshop. Accepted
and presented papers will be published in the conference proceedings and
submitted to IEEE Xplore.
For any questions, please feel free to contact Martin Husák
(husakm at ics.muni.cz).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ifi.uzh.ch/pipermail/aims-announce/attachments/20240708/40296796/attachment.html>
More information about the aims-announce
mailing list