Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Workshops

The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations, poster presentations, keynote lectures and panels. Depending on the number of presentations, workshops can be scheduled for 1 day or 2 days. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on digital support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by EI, Web of Science / Conference Proceedings Citation Index, DBLP and SCOPUS.

WORKSHOPS LIST

BASS 2018International Workshop on Behavioral Analysis for System Security (ICETE)
Chair(s): Andrea Saracino, Francesco Mercaldo and Alessandro Aldini

International Workshop on
Behavioral Analysis for System Security
 - BASS 2018

Paper Submission: June 13, 2018 (expired)
Authors Notification: June 19, 2018 (expired)
Camera Ready and Registration: June 27, 2018 (expired)

Co-chairs

Andrea Saracino
Consiglio Nazionale delle Ricerche - Istituto di Informatica e Telematica
Italy
 
Francesco Mercaldo
Institute of Informatics and Telematics of Pisa CNR
Italy
 
Alessandro Aldini
Università di Urbino Carlo Bo
Italy
 
Scope

Behavioral features are getting in the last years an increasing attention from both IT research and industrial world. Human behavioral aspects are extremely valuable pieces of information, exploited by companies to profile current or potential customers, in order to anticipate their preferences and presenting custom offers. Runtime behavioral analysis is being applied with increasing success for continuous and silent user authentication, and is considered an enabler for the seamless authentication paradigm in several environment and devices. Furthermore, behavioral analysis is posing itself as a valuable alternative to signature-based approaches to identify anomalies, intrusions, security attacks and system malfunctioning. These approaches are in fact known to be flexible, self-learning and able to consider multi-level and multi-domain features, related to software execution, system status, user interaction and current context.
BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system or software behavioral analysis for IT security. The workshop solicits submission on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling and privacy and security aspects related to recording and exploitation of behavioral features.


Topics of interest include but are not limited to:
-    Software Behavior Analysis
-    User behavior modeling and classification
-    Human behavior profiling
-    Behavior-based authentication
-    Behavioral features and approaches for intrusion detection
-    Privacy-preserving behavioral analysis
-    Secure recording and management of behavioral features
-    Hazardous behavior prediction and risk mitigation
-    Behavioral models for distributed IT systems
-    Hardware and virtual network traffic behavior
-    Behavioral analysis and classification for forensic applications
-    Cyber-Risk models exploiting behavioral features
-    Behavioral practices for cyber-disaster management and recovery
-    Models and practices for collaborative behavioral analysis
-    Biometric-behavioral models for user authentication
-    Ability authentication
-    Behavioral Analysis for Access and Usage Control






footer