Conference Information
CSET 2024: Workshop on Cyber Security Experimentation and Test
https://cset24.isi.edu/
Submission Date:
2024-05-17
Notification Date:
2024-06-21
Conference Date:
2024-08-13
Location:
Philadelphia, Pennsylvania, USA
Years:
17
Viewed: 13731   Tracked: 3   Attend: 0

Call For Papers
Overview

For 16 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for discussing all encompassing cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability — in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and demonstrably grow community resources.

Invited Topics

For CSET '24, we solicit exciting work across a broad range of areas relevant to security and privacy. A list of topics of interest (broadly interpreted):

    Cybersecurity research methods: designing and conducting large and complex system evaluations in the context of cybersecurity, i.e., experiences and discussions of qualitative and quantitative methods, what are the models and tools that facilitate research.
    Measurement and metrics: measurement required to understand performance and optimization of cybersecurity systems and defining appropriate metrics, i.e., valid metrics, test cases, and benchmarks, effectiveness of metric in evaluation, impact of measurement on evaluation.
    Data sets: collection, analysis, and interpretation of data for cyber security, i.e., what makes good data sets and how do we compare data sets, methods to collect, generate, or derive new ones, historical impact of a dataset.
    Experimental infrastructure: testbeds, simulations, emulations, and virtualizations, i.e., designing, orchestrating, and deploying testbeds, tools for improving testbed operation and maintenance, usage and impact studies of experimentation infrastructure.
    Education: surveys, tools, and techniques for cyber security education and training, i.e., evaluating and presenting educational approaches to cybersecurity, approaches that leverage datasets, utilize testbeds, apply experiential learning principles, or promote awareness of research methods and sound measurement approaches.
    High consequence cyber systems: rigorous experimental methodologies, i.e., appropriate design of experiments, parameter sampling strategies, quantifying uncertainties with confidence intervals, ensuring reproducibility, and validating models.
    Ethics in cybersecurity: tussle between security and privacy, i.e., experiences balancing stakeholder considerations, participant privacy, frameworks for evaluating the ethics of cybersecurity experiments, and illustrative experiment samples for ethical conduct that upholds the code outlined in [].
    Evaluating real-world security controls: measurements of deployed security frameworks, i.e., evaluation methodologies for real-world security performance, user-related characteristics (behavior, demographics) modeling, cybersecurity and social media. 
Last updated by Dou Sun in 2024-03-14
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
PCIPan-Hellenic Conference on Informatics2019-09-102019-10-172019-11-28
CSWInternational Workshop on Cyber Security2024-04-202024-05-042024-06-07
CAIMLRInternational Conference on Artificial Intelligence and Machine Learning Research2024-07-262024-08-312024-09-28
aa*a1NDSSAnnual Network & Distributed System Security Symposium2024-07-102024-09-192025-02-23
IEEE MILCOMIEEE Military Communications Conference2024-06-102024-08-122024-10-28
aa*a1EurocryptInternational Conference on the Theory and Applications of Cryptographic Techniques2024-10-022025-01-312025-05-04
MMAsiaACM Multimedia Asia2024-08-092024-09-202024-12-03
ICSEMInternational Conference on System Science, Engineering Design and Manufacturing Informatization2014-05-012014-06-012014-10-25
aEACLEuropean Association of Computational Linguistics2016-09-302016-12-122017-04-03
ICECEInternational Conference on Electrical and Control Engineering2015-03-312015-04-052015-04-18
Related Journals
CCFFull NameImpact FactorPublisherISSN
Online Information Review3.100Emerald1468-4527
Journal of Pathology InformaticsElsevier2229-5089
Advances in Materials Science and EngineeringHindawi1687-8434
cJournal of Cybersecurity2.900Oxford University Press2057-2093
StandardsMDPI2305-6703
Journal of Smart Environments and Green ComputingOAE Publishing Inc.2767-6595
Journal of Optical Communications and Networking4.000OSA Publishing1943-0620
cComputer Speech and Language3.100Elsevier0885-2308
cConnection Science3.200Taylor & Francis0954-0091
IEEE Robotics & Automation Magazine5.400IEEE1070-9932
Full NameImpact FactorPublisher
Online Information Review3.100Emerald
Journal of Pathology InformaticsElsevier
Advances in Materials Science and EngineeringHindawi
Journal of Cybersecurity2.900Oxford University Press
StandardsMDPI
Journal of Smart Environments and Green ComputingOAE Publishing Inc.
Journal of Optical Communications and Networking4.000OSA Publishing
Computer Speech and Language3.100Elsevier
Connection Science3.200Taylor & Francis
IEEE Robotics & Automation Magazine5.400IEEE
Recommendation