professor mohammed atiquzzaman
university of oklahoma, usa
journal of network and computer applications
Dr. Dave Towey
University of Nottingham
Title:Metamorphic Testing to enhance Cybersecurity
Abstract:Metamorphic testing (MT) first appeared in the literature just under twenty years ago, but in this short time it has already had an enormous impact on how people can conceive of testing their software systems. MT was initially put forward as an approach to alleviate the Oracle Problem --- situations where it is difficult or impossible to determine the correctness of program output or behaviour. MT's scope and applicability have expanded considerably since the early days, including into areas of cybersecurity. This talk, which will be as interactive with the audience as possible, will explain the background and motivations of MT. Some examples of how to use MT will be used to illustrate the process of becoming competent in its application. Finally, some recent case studies involving MT and cybersecurity will be discussed, and some key directions for future work and development will be outlined.
Professor Wenhua Yu
Key Laboratory of Big Data Science and Engineering
The 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year. Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm).
The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
As in previous years, the conference intends to attract the cyber security and cyber intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%. We will invite three internationally renowned keynote speakers for this conference.
Areas of interest include, but are not limited to:
|- Access control||- Language-based Security|
|- Anti-Virus and Anti-Worms||- Malicious software|
|- Authentication and Authorization||- Network Security|
|- Cloud Security||- Operating System Security|
|- Computer / Digital Forensics||- Privacy Protection|
|- Big Data Security||- Risk Evaluation and Security Certification|
|- Data and System Integrity||- Security for Cyber-physical Systems|
|- Distributed Systems Security||- Security for Mobile Computing|
|- Electronic Commerce Security||- Security Models|
|- Crypto/Security Systems||- Security Protocols|
|- Information Hiding and Watermarking||- Smartphone Security|
|- Intellectual Property Protection||- Software Security|
|- Algorithms for efficient classification and clustering||- Smart grid cyber security|
|- Forensic computing||- Data leakage detection|
|- Intrusion Detection||- Trusted and Trustworthy Computing|
|- Sensitive data identification and protection||- Applied Electronic Technology|
|- Electric Automatization Technology||- Computer network technology|
|- Key Management and Key Recovery||- Smartphone Security|
The conference proceedings will be published in Springer's "Advances in Intelligent Systems and Computing" book series (http://www.springer.com/series/11156). Please follow the instructions on https://www.springer.com/us/authors-editors/conference-proceedings/conference-proceedings-guidelines when preparing the conference submission.
A number of Special Issues have been proposed and under review at both EI- and SCI-indexed journals. Authors of selected best papers will be invited to extend their accepted conference paper for consideration in the relevant special issue.
1988#, Airport Road, Ningbo, Zhejiang, China
Ningbo is a seaport with sub-provincial administrative status. The city has a population of 2,201,000 and is situated in northeastern Zhejiang province, China. Lying south of the Hangzhou Bay, and facing the East China Sea to the east, Ningbo borders Shaoxing to the west and Taizhou to the south, and is separated from Zhoushan by a narrow body of water.Climate Climatic Features: sub-tropical monsoon climate featured with temperate and humid weather and four distinct seasons; frost-free of 230-240 days Average Temperature: 16.2°C (61.2°F); average high in summer is 32°C (90°F), in winter 9°C (48°F)
Papers should be submitted through EASYCHAIR at www.easychair.org
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (as per Author Kit). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.Submit
Chair: Prof. Si Tian;
General Chair: Tiejun Pan, Shui Wang, Huasheng Zhou
Prof. Wenhua Yu, Jiangsu Normal University, America
Prof. Qing Tao Wu, Henan University of Science and Technology, China
Prof. Jun Liu, Nanjing University of Finance and Economics, Nanjing, China
Artificial Intelligence methodology plays a very important role in Business and Information Engineering. Some thoughts of intelligence can strengthen and enhance the performance considering the problem of optimizing functions. The integration of these aspects will bring the new inspiration to us.
The main aims of this conference are to highlight the latest scientific advances within the Artificial Intelligence and Advanced Engineering. The objective is to provide a forum for researchers to present new ideas and contributions in the form of technical papers.
Foundations, Analysis, Model, Management, Searching, Mining and Simulation
Human & Social-level Intelligence
Social Engineering and Social Intelligence
Cognition and Semantics
Emotion, Learning and Brain
Multimodal information fusion
Human & Social -level AI systems and methods
Web, Web Semantics, Semantic Web, and Services
Semantic Search and Query
Semantic Link Network
Semantic Visualization and Modeling
Semantic Web Mining
Semantic and Knowledge Engineering:
Automatic Semantic Annotation
Semantic Web Services
Theory and Model of Semantic Grids
Ontology and Learning
Web2.0 and Collaborative Tagging
Rich Media Semantics
Internet/Web of Things
Semantic Data Models
Knowledge Web, Discovery and Knowledge Grids
Web knowledge representation and Reasoning
Semantic Knowledge Portals
Web Knowledge Discovery
Theory and Model of Knowledge Grids
Large-Scale Distributed Knowledge Management
Ontology Information/ Knowledge/Service Integration
Knowledge Flow Network
Internet-based Knowledge Engineering and Software Engineering
Software as a Service
Advanced Networking Model
Resource Management Models
Internet-based Multi-agent Systems
Internet-based Intelligent Applications
Mobile Web and Cloud
Systems, Tools and Applications
Semantics-based Virtual Organization
e-culture, e-Science, e-Business
e-Learning, e-Government, e-health
Mobile Web, Security
Energy-Sensitive Mobile Engineering
Paper Submissions for AIBIE 2017
Authors are invited to submit original, unpublished research papers that are not being considered for publication in any other forum. Manuscripts should be submitted electronically, in PDF format and formatted using the CPS camera-ready templates available at: Word Template or Latex template
Papers cannot exceed 8 pages in length. There is also a short paper track. Both short paper and regular paper are invited for presentation.
Please submit papers through Submission link: https://easychair.org/conferences/?conf=atci2017
Accepted papers will be published in Springer's "Advances in Intelligent Systems and Computing" book series (http://www.springer.com/series/11156). Please follow the instructions on https://www.springer.com/us/authors-editors/conference-proceedings/conference-proceedings-guidelines when preparing the conference submission.Previous proceedings have been indexed by EI Compendex. This workshop also will recommend selected papers to SCI or EI indexed international journals after conference.
UNIVERSITY OF OKLAHOMA
University of Nottingham
Key Laboratory of Big Data Science and Engineering