Next Generation Cyber Ranges 2018

NeXCyRa 2018


Computer Security & Cryptography Security & Trust & Testing



[Apologies for multiple postings]
Thanks to consider contributing and forwarding to interested associates this Next Generation Cyber Ranges (NeXCyRa) Special Track Call for papers.
-----------------------------
Today, the importance of Cyber Security Training (CST) is unquestionable. As a consequence, the design and development of Cyber Ranges (CR) have become a necessity for many governments and organizations. Cyber Ranges are environments that offer tools and services to support Cybersecurity simulation and training experience. In other words, a Cyber Range allows reproduction of IT and/or OT systems execution in a real or simulated environment.
Cyber Range emulates real-world scenario involving complex, large-scale and/or domain-specific infrastructures such as IoTs (Internet of Things) and/or Industrial IoT (IIoT). Such environments reveal to be quite convenient to practice skills related to systems pen-testing, hardening and/or defending. It allows also for training in response to incidents and attacks mitigation.
The science discipline that designs and develops Cyber Ranges is still its infancy. However, the state of the arts is quickly growing boosted by the ever-increasing number of cyber attacks and the growing concern and preoccupation of governments about these threats.
The ambition of the workshop is to provide an interactive discussion space wherein the participants share their knowledge and understanding about scientific, technical and pedagogical approaches and methods about Cyber Ranges design, implementation and piloting.
The main topics addressed by NeXCyRa 2018 includes but is not limited to:
- Literature review and state-of-the-art of previous and current cyber ranges
- Cyber Training methodologies and Assessment
- Attacks Catalog and Training Scenario development
- Social Context and Cyber Training Environment
- Domain application and case studies of Cyber Ranges
- IT, OT and Hybrid approaches of Cyber Ranges
- Cloud-based Cyber Ranges models
Important Datelines :
Inform the Chair: As soon as you decided to contribute
- Submission: October 5
- Notification: October 20
- Registration: October 30
- Camera-ready: October 30
Contribution Types
- Regular papers [in the proceedings, digital library]
- Short papers (work in progress) [in the proceedings, digital library]
- Posters: two pages [in the proceedings, digital library]
- Posters: slide only [slide-deck posted on www.iaria.org]
- Presentations: slide only [slide-deck posted on www.iaria.org]
- Demos: two pages [posted on www.iaria.org]
Publications
- Extended versions of selected papers will be published in IARIA Journals:http://www.iariajournals.org
- Print proceedings will be available via Curran Associates, Inc.:http://www.proceedings.com/9769.html
- Articles will be archived in the free access ThinkMind Digital Library:http://www.thinkmind.org
Contacts
Reda Yaich:
reda.yaich@irt-systemx.fr
ADVCOMP Logistics:steve@iaria.org