SPIE Defense, Sensing, and Security 5 - 9 April, 2010 Orlando World Center Marriott Resort and Convention Center Orlando, FL United States http://spie.org/x10.xml Cyber Sensing II Conference DS225 Part of program track on Signal, Image, and Neural Net Processing This conference has an open call for papers: See submission guidelines for Authors & Presenters Submit an abstract Conference Chair John Erickson, Sensors Directorate, Air Force Research Lab. Conference Co-Chair Richard A. Raines, Air Force Institute of Technology Program Committee Anup K. Ghosh, George Mason Univ.; Michael J. Mendenhall, Air Force Institute of Technology; Aleksey Nogin, HRL Labs., LLC; Steven K. Rogers, Air Force Research Lab.; Charles H. Romine, Office of Science and Technology Policy Post-Meeting Proceedings Manuscript Due Date: 8 March 2010 Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Simply put, if an electronic device emits, transmits, or reflects, it is in the cyberspace domain. It is an operational domain equal to land, sea, air, and space. Cyberspace contains and controls communication networks, transportation, finances, and standard utilities (i.e., a nation's critical infrastructure). These domains must be defended against enemy attack. With the growing dependence on information systems by the modern world, cyber is thought of as a domain of operations where the entire electromagnetic spectrum (including electrons flowing over wires) is the medium. Although this seems overly broad, the medium itself is not what is truly important - it is how the operation of information systems is affected which defines what is, and is not, a part of the cyber domain. A basic example is that a "traditional" RF sensor can be considered a cyber sensor if it is being used in such a way as to detect the presence of a wireless network. As with any domain, the cyber domain requires the environment to be sensed in order to be able to have situational awareness. Cyber sensing seeks to exploit any part of the electromagnetic spectrum in order to provide the information necessary for that situational awareness so the integrity of information assets and the networks that bind them can be better maintained and defended. To achieve this, this conference seeks to discuss the development of novel cyber sensing technologies and sensing methodologies. Technical and scientific papers related to innovative cyber sensing technologies that push beyond the scope of the state-of-the-art in industry are solicited. Some topic areas include, but are not limited to: Novel Cyber Sensors and Cyber Sensing Paradigms * collaborative sensor networks * autonomic sensors * self-aware sensors/networks * exploitation-driven sensing * virtual (software-based) sensors embedded within information systems/networks. Cyber-oriented Exploitation of Existing Sensors and Sensor Networks * novel exploitation techniques * directed energy methods * network-based methods for co-opting sensors * opportunistic sensing. Information Processing and Analysis Techniques * cyber sensor fusion * fusion of traditional sensor data for cyber effects * algorithms for collaborative sensing * algorithm-independent performance bounds prediction * cyber-based mission impact assessment. Cyber Protection * cyber-oriented electronic (RF/IR/EO) and directed energy-based defense techniques * access control policy monitoring/enforcement via fusion of cross-domain sources * dynamic malware/rootkit detection and network defense technologies * network-based and host-based monitors/intrusion detection systems (hardware or software). Innovative Cyber Sensing Applications * artificial immune systems * RADAR-jammer jammers * cellular phone detection and/or geolocation * trustable systems operating in untrusted environments * cognitive radio and "whitespace" devices. Cyber Countermeasures * methods to detect and react to compromised cyber resources * techniques to maintain functionality during degraded performance * novel measures to ensure trust between cyber resources.