Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015)
co-located with
27th International Teletraffic Congress (ITC 2015)

Workshop website: http://stegano.net/BCSN2015

Het Pand
Ghent, Belgium
September 11th, 2015

OVERVIEW

Nature is probably the most amazing and recognized invention machine on
Earth. Its ability to address complex and large-scale problems has been
developed after many years of selection, genetic drift and mutations. As
a result, it is not surprising that natural systems continue to inspire
inventors and researchers.

Nature's footprint is present in the world of Information Technology,
where there are an astounding number of computational bio-inspired
techniques. These well-regarded approaches include genetic algorithms,
neural networks, ant algorithms just to name a few. For example several
networking management and security technologies have successfully
adopted some of nature's approaches, which take form of swarm
intelligence, artificial immune systems, sensor networks, etc.

Nature has also developed an outstanding ability to recognize
individuals or foreign objects to protect a group or a single organism.
Those abilities have great possibility to improve the area of security
and network.

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of bio-inspired security and networking.

The workshop will be accessible to both non-experts interested in
learning about this area and experts interesting in hearing about new
research and approaches.

Topics of interest include, but are not limited to:
- Bio-inspired security and networking algorithms & technologies
- Moving-target techniques
- Bio-inspired anomaly & intrusion detection
- Adaptation algorithms
- Biometrics
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for cyber
security & networking
- Prediction techniques
- Expert systems
- Cognitive systems
- Sensor networks
- Information hiding solutions (steganography, watermarking) for network
traffic
- Cooperative defense systems
- Theoretical development in heuristics
- Management of decentralized networks
- Bio-inspired algorithms for dependable networks

SUBMISSIONS AND REGISTRATION

Submissions are limited to 6 pages 2-column IEEE conference style with
minimal font size of 10 pt. Papers will appear in the conference
proceedings and will be available on IEEE Xplore. Submissions are
handled through the EDAS system. Upon final camera-ready paper
submission, authors will need to sign an IEEE copyright form for each
accepted paper to comply with IEEE regulations.

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the
conference.

The extended versions of all papers accepted for BCSN will be published
in a special issue of the JCR journal (tentative).

IMPORTANT DATES

May 15, 2015: Regular Paper Submission
June 15, 2015: Notification Date
July 1, 2015: Camera-Ready Paper Deadline

WORKSHOP CHAIRS

Wojciech Mazurczyk, Warsaw University of Technology, Poland
Errin W. Fulp, Wake Forest University, USA
Hiroshi Wada, Unitrends, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Contact BCSN 2015 chairs using this email address:
contact@cybersecurity.bio.