Skip to main content
SHARE
Publication

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and informatio...

by Frederick T Sheldon, Stacy J Prowell, Axel Krings, Robert K Abercrombie
Publication Type
Book
Publication Date
Volume
N/A
Publisher Name
ACM
Publisher Location
New York, New Jersey, United States of America

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society.
The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include:
• Scalable trustworthy systems
• Enterprise-level metrics
• Coping with insider and life-cycle threats
• Coping with malware and polymorphism
• Phishing/whaling, spam and cyber crime
• High assurance system survivability
• Cyber security for the Smart Grid
• Digital provenance and data integrity
• Privacy-aware security and usable security
• Social networking models for managing trust and security
A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.