Special Session 3: Formal Methods and Intelligent Techniques for Cybersecurity and Cyberdefense


This special session focuses on formal methods and intelligent techniques for cybersecurity and cyberdefense. As communication networks become increasingly complex, the need for robust security measures becomes ever more crucial and challenging. Traditional security technologies may not meet user requirements in open, heterogeneous, dynamic, mobile, distributed and wireless computing environments. Consequently, there is a constant demand to create environments that enable diverse applications to collaborate while maintaining high levels of security. The main objective of this session is to bring together researchers and practitioners involved in security, cybersecurity and cyberdefense. The focus is on discussing emerging methods and techniques for designing and building secure systems and networks. We particularly encourage submissions on formal methods and papers proposing approaches involving AI, ML, DL, XAI and NLP techniques.

 

● Session Co-chairs:

Chair: Asso. Prof. Jaouhar Fattahi, Laval University, Québec, Canada (E-mail: jaouhar.fattahi.1@ulaval.ca, main contact)
Full Prof. Mohamed Mejri, Laval University, Québec, Canada. (E-mail: mohamed.mejri@ift.ulaval.ca)
Asso. Prof. Ridha Ghayoula, Moncton University, New Brunswick, Canada. (E-mail: ridha.ghayoula@umoncton.ca)
Asso. Prof. Emil Pricop, Petroleum-Gas University of Ploiesti, Romania (Email : emil.pricop@upg-ploiesti.ro)


● Submission Method:

 Please submit your manuscript to http://www.zmeeting.org/submission/hp3c2024 and select Track “Special Session 3: Formal Methods and Intelligent Techniques for Cybersecurity and Cyberdefense"

 

● Topics of interest include (but are not limited to:
Cryptographic protocols
Cryptography and Cryptanalysis
Network security
Hardware security
Software security
Formal Methods for security
Biometrics
Web applications security
Security policies, model and architecture
Privacy, trust and anonymity
Security in parallel and distributed systems
Cloud security
Incident response and management
Identity and access management
Governance, risk management, and compliance
Physical security
Security architecture and design
Wireless and mobile security
Intrusion detection
Anomaly detection
Detecting toxic content on social networks