ISCA - International Speech
Communication Association

ISCApad Archive  »  2015  »  ISCApad #206  »  Events  »  Other Events  »  (2015-09-11) Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015), Ghent, Belgium

ISCApad #206

Thursday, August 20, 2015 by Chris Wellekens

3-3-29 (2015-09-11) Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015), Ghent, Belgium


Workshop on Bio-inspired Cyber Security & Networking (BCSN 2015) co-located with 27th
International Teletraffic Congress (ITC 2015)

Workshop website:

Het Pand
Ghent, Belgium
September 11th, 2015


Nature is probably the most amazing and recognized invention machine on Earth. Its
ability to address complex and large-scale
problems has been developed after many years of selection, genetic drift and mutations.
As a result, it is not surprising that
natural systems continue to inspire inventors and researchers.

Nature's footprint is present in the world of Information Technology, where there are an
astounding number of computational
bio-inspired techniques. These well-regarded approaches include genetic algorithms,
neural networks, ant algorithms just to name a
few. For example several networking management and security technologies have
successfully adopted some of nature's approaches,
which take form of swarm intelligence, artificial immune systems, sensor networks, etc.

Nature has also developed an outstanding ability to recognize individuals or foreign
objects to protect a group or a single
Those abilities have great possibility to improve the area of security and network.

The aim of this workshop is to bring together the research accomplishments provided by
the researchers from academia and the
industry. The other goal is to show the latest research results in the field of
bio-inspired security and networking.

The workshop will be accessible to both non-experts interested in learning about this
area and experts interesting in hearing about
new research and approaches.

Topics of interest include, but are not limited to:
- Bio-inspired security and networking algorithms & technologies
- Moving-target techniques
- Bio-inspired anomaly & intrusion detection
- Adaptation algorithms
- Biometrics
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for cyber security & networking
- Prediction techniques
- Expert systems
- Cognitive systems
- Sensor networks
- Information hiding solutions (steganography, watermarking) for network traffic
- Cooperative defense systems
- Theoretical development in heuristics
- Management of decentralized networks
- Bio-inspired algorithms for dependable networks


Submissions are limited to 6 pages 2-column IEEE conference style with minimal font size
of 10 pt. Papers will appear in the
conference proceedings and will be available on IEEE Xplore. Submissions are handled
through the EDAS system. Upon final
camera-ready paper submission, authors will need to sign an IEEE copyright form for each
accepted paper to comply with IEEE

Submission of a paper implies that should the paper be accepted, at least one of the
authors will register and present the paper in
the conference.

The extended versions of all papers accepted for BCSN will be published in a special
issue of the JCR journal (tentative).


May 22, 2015 (extended!): Regular Paper Submission
June 15, 2015: Notification Date
July 1, 2015: Camera-Ready Paper Deadline


Wojciech Mazurczyk, Warsaw University of Technology, Poland Errin W. Fulp, Wake Forest
University, USA Hiroshi Wada, Unitrends,
Australia Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Contact BCSN 2015 chairs using this email address: --


Back  Top

 Organisation  Events   Membership   Help 
 > Board  > Interspeech  > Join - renew  > Sitemap
 > Legal documents  > Workshops  > Membership directory  > Contact
 > Logos      > FAQ
       > Privacy policy

© Copyright 2024 - ISCA International Speech Communication Association - All right reserved.

Powered by ISCA