International Workshop on Bio-inspired Security, Trust, Assurance and
Resilience (BioSTAR 2016) co-located with 37th IEEE Symposium on
Security and Privacy (IEEE S&P 2016)

May 26, 2016
Fairmont Hotel, San Jose, CA, USA

Workshop website: http://biostar.cybersecurity.bio/

IMPORTANT DATES
 January 15, 2016: Regular Paper Submission
 February 15, 2016: Notification Date
 March 5, 2016: Camera-Ready Paper Deadline

OVERVIEW
As computing and communication systems continue to expand and offer new
services, these advancements require more dynamic, diverse, and
interconnected computing infrastructures. Unfortunately, defending and
maintaining resilient and trustworthy operation of these complex systems
are increasingly difficult challenges. Conventional approaches to
Security, Trust, Assurance and Resilience (STAR for short) are often too
narrowly focused and cannot easily scale to manage large, coordinated
and persistent attacks in these environments. Designs found in nature
are increasingly used as a source of inspiration for STAR and related
networking and intelligence solutions for complex computing and
communication environments.

Nature's footprint is present in the world of Information Technology,
where there are an astounding number of computational bio-inspired
techniques. These well-regarded approaches include genetic algorithms,
neural networks, ant algorithms, immune systems just to name a few. For
example several networking management and security technologies have
successfully adopted some of nature's approaches, such as swarm
intelligence, artificial immune systems, sensor networks, moving target
defense, diversity-based software design, etc.

Nature has also developed an outstanding ability to recognize
individuals or foreign objects and adapt/evolve to protect a group or a
single organism. Solutions that incorporate these nature-inspired
characteristics often have improved performance and/or provided new
capabilities beyond more traditional methods.

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of nature-inspired STAR aspects in computing and communications.
Topics of interests include, but are not limited to:
  Nature-inspired anomaly and  intrusion detection
  Adaptation algorithms
  Biometrics
  Nature-inspired algorithms and technologies for STAR
  Biomimetics
  Artificial Immune Systems
  Adaptive and Evolvable Systems
  Machine Learning, neural networks, genetic algorithms for STAR
  Nature-inspired analytics and prediction
  Cognitive systems
  Sensor and actuator  networks and systems
  Information hiding solutions (steganography, watermarking) for network
    traffic
  Cooperative defense systems
  Cloud-supported matire-inspired STAR
  Theoretical development in heuristics
  Management of decentralized networks
  Nature-inspired algorithms for dependable networks
  Platforms for STAR services
  Diversity in computing and communications
  Survivable and sustainable systems
  STAR management systems
  Autonomic cyber defenses

The workshop is an interesting supplement for the IEEE Security and
Privacy 2016 in area of security & communication networks.

SUBMISSION AND REGISTRATION
Papers will be accepted based on peer review (3 per paper) and should
contain original, high quality work. All papers must be written in English.

Authors are invited to submit Regular Papers (maximum 8 pages) via
EasyChair. Papers accepted by the workshop will be published in the
Conference Proceedings published by IEEE Computer Society Press.

Papers must be formatted for US letter (not A4) size paper with margins
of at least 3/4 inch on all sides. The text must be formatted in a
two-column layout, with columns no more than 9 in. high and 3.375 in.
wide. The text must be in Times font, 10-point or larger, with 12-point
or larger line spacing. Authors are encouraged to use the IEEE
conference proceedings templates found here. Failure to adhere to the
page limit and formatting requirements will be grounds for rejection.

The extended versions of accepted papers will be considered for
publication in a special issue of the EURASIP Journal on Information
Security (http://www.jis.eurasipjournals.com). The decision which of the
accepted paper will be invited depends on the quality of the paper and
quality of the presentation at BioSTAR. The final decision will be made
by chairs after the workshop.

ORGANIZING COMMITTEE
Errin W. Fulp, Wake Forest University, NC, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Mohamed Eltoweissy, Virginia Military Institute, USA
Hiroshi Wada, Unitrends, Australia

CONTACT
For any enquires please contact us at: contact@cybersecurity.bio.