SPIE Defense, Sensing, and Security   	 	
5 - 9 April, 2010
Orlando World Center Marriott Resort and Convention Center
Orlando, FL United States
http://spie.org/x10.xml

Cyber Sensing II
Conference DS225

Part of program track on Signal, Image, and Neural Net Processing
This conference has an open call for papers:
See submission guidelines for Authors & Presenters
Submit an abstract

Conference Chair
John Erickson, Sensors Directorate, Air Force Research Lab.
Conference Co-Chair
Richard A. Raines, Air Force Institute of Technology
Program Committee
Anup K. Ghosh, George Mason Univ.; Michael J. Mendenhall, Air Force
Institute of Technology; Aleksey Nogin, HRL Labs., LLC; Steven
K. Rogers, Air Force Research Lab.; Charles H. Romine, Office of
Science and Technology Policy

Post-Meeting Proceedings Manuscript Due Date: 8 March 2010

Cyberspace is a global domain within the information environment
consisting of the interdependent network of information technology
infrastructures, including the Internet, telecommunications networks,
computer systems, and embedded processors and controllers. Simply put,
if an electronic device emits, transmits, or reflects, it is in the
cyberspace domain. It is an operational domain equal to land, sea,
air, and space. Cyberspace contains and controls communication
networks, transportation, finances, and standard utilities (i.e., a
nation's critical infrastructure). These domains must be defended
against enemy attack.

With the growing dependence on information systems by the modern
world, cyber is thought of as a domain of operations where the entire
electromagnetic spectrum (including electrons flowing over wires) is
the medium. Although this seems overly broad, the medium itself is not
what is truly important - it is how the operation of information
systems is affected which defines what is, and is not, a part of the
cyber domain. A basic example is that a "traditional" RF sensor can be
considered a cyber sensor if it is being used in such a way as to
detect the presence of a wireless network.

As with any domain, the cyber domain requires the environment to be
sensed in order to be able to have situational awareness. Cyber
sensing seeks to exploit any part of the electromagnetic spectrum in
order to provide the information necessary for that situational
awareness so the integrity of information assets and the networks that
bind them can be better maintained and defended. To achieve this, this
conference seeks to discuss the development of novel cyber sensing
technologies and sensing methodologies. Technical and scientific
papers related to innovative cyber sensing technologies that push
beyond the scope of the state-of-the-art in industry are solicited.

Some topic areas include, but are not limited to:

Novel Cyber Sensors and Cyber Sensing Paradigms

    * collaborative sensor networks
    * autonomic sensors
    * self-aware sensors/networks
    * exploitation-driven sensing
    * virtual (software-based) sensors embedded within 
      information systems/networks.

Cyber-oriented Exploitation of Existing Sensors and Sensor Networks

    * novel exploitation techniques
    * directed energy methods
    * network-based methods for co-opting sensors
    * opportunistic sensing.

Information Processing and Analysis Techniques

    * cyber sensor fusion
    * fusion of traditional sensor data for cyber effects
    * algorithms for collaborative sensing
    * algorithm-independent performance bounds prediction
    * cyber-based mission impact assessment.

Cyber Protection

    * cyber-oriented electronic (RF/IR/EO) and directed energy-based
      defense techniques
    * access control policy monitoring/enforcement via fusion of
      cross-domain sources
    * dynamic malware/rootkit detection and network defense technologies
    * network-based and host-based monitors/intrusion detection
      systems (hardware or software).

Innovative Cyber Sensing Applications

    * artificial immune systems
    * RADAR-jammer jammers
    * cellular phone detection and/or geolocation
    * trustable systems operating in untrusted environments
    * cognitive radio and "whitespace" devices.

Cyber Countermeasures

    * methods to detect and react to compromised cyber resources
    * techniques to maintain functionality during degraded performance
    * novel measures to ensure trust between cyber resources.