Wednesday, March 23, 2016

dmanet Digest, Vol 97, Issue 27

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. Call for Papers - ACM Workshop SecDef 2016 (Gunes Kayacik)
2. META'2016 Special Session CfP (Taha Arbaoui)
3. Research Fellow in Freight Logistics at the University of
Southampton (Bektas T.)
4. Kiel University: Two PhD student / PostDoc positions for
software verification (Florin Manea)
5. One week to Proposal Submission Deadline 30 March 2016 --
Book on Security Solutions and Applied Cryptography in Smart Grid
Communications (Mohamed Amine Ferrag)


----------------------------------------------------------------------

Message: 1
Date: Tue, 22 Mar 2016 20:01:03 -0700
From: Gunes Kayacik <gunes.kayacik@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Call for Papers - ACM Workshop SecDef 2016
Message-ID:
<CAAUjpYdv4wW9VYzCKjhDtqPQVy+oz-tQk-U=FkfWh9z1BjRjOw@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

=====================================
Call for Papers - ACM Workshop SecDef 2016
=====================================

Dear Colleagues,

It is our pleasure to announce "SecDef", the third Workshop on Genetic and
Evolutionary Computation in Defense, Security, and Risk Management. This
workshop will be part of the Genetic and Evolutionary Computation
Conference (GECCO 2016), to be held July 20-24, 2016, in Denver, Colorado
USA.

With the constant appearance of new threats, research in the areas of
defense, security, and risk management has acquired increased importance
over the past few years. These new challenges often require innovative
solutions and Computational Intelligence techniques can play a significant
role in finding them. We invite papers describing completed or ongoing
work, with the aim to encourage communication between active researchers
and practitioners to better understand the current scope of efforts within
this domain. The ultimate goal is to understand, discuss, and help set
future directions for computational intelligence in security and defense
problems.

A detailed description of the workshop may be found at
http://kayacik.ddns.net/~secdefworkshop/

Please note that the submissions deadline is April 3, 2016.

Additional information regarding GECCO 2016, including workshop schedules,
is provided at http://gecco-2016.sigevo.org/

If you have questions or require other assistance, please contact the
organizers at secdef2016@gmail.com

We look forward to receiving your papers and meeting you at the conference!

Best regards,

Frank Moore & Gunes Kayacik


------------------------------

Message: 2
Date: Wed, 23 Mar 2016 10:46:59 +0100
From: Taha Arbaoui <taha.arbaoui@utt.fr>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] META'2016 Special Session CfP
Message-ID:
<CANxzwsWiw85RVPhtHvdvYc0WG0kHaZJYbg85ZAjXVGNxwCFeNg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8



*Special Session Call for Papers*

*META'2016 Special Session on *
Optimization methods for the design of production systems

*International Conference on Metaheuristics and Nature Inspired
Computing (META'2016)*

*27-31 Oct 2016 Marrakech, Morocco*

​*SCOPE*

Getting the highest performances with the lowest costs while respecting
environmental constraints is one of the most important concerns of the
designers of production and assembly systems. In addition to that, numerous
sub-problems may be considered in the design procedure such as: buffers
sizing, equipment selection, line balancing, etc. The aim of this session
is to introduce heuristic and metaheuristic optimization methods developed
to get an efficient design of production systems. We will focus on studies
that propose approached optimization techniques to solve various design
problems. Regarding the optimization approaches, single criterion and multi
criteria optimization approaches could be presented.

The topics of this session, but are not limited to, are:


- Manufacturing systems design: buffers sizing, equipment selection,
line balancing, reliability, eco-design, etc
- New heuristic and metaheuristic approaches for manufacturing systems
- Single criterion and multi-criteria optimization methods.



​*IMPORTANT DATES*
- *May 6, 2016*: Paper submission deadline

- *June 3, 2016*: Notification to the authors​

​*SUBMISSION GUIDELINES*

This special session will be held as part of the META'16 conference. Please
submit your paper using the online submission system, as described in the
instructions for authors. During the submission process you should indicate
that the paper is for a special session, which is: '*Metaheuristics for
software engineering*'. Detailed instructions for submitting the papers are
provided on the conference home page at:
http://meta2016.sciencesconf.org/

*​CATEGORIES OF SUBMISSIONS *
Several categories of submissions may be accepted:

- *S1*: Extended abstracts of work-in-progress and position papers
of a maximum of 3 pages
- *S2*: Original research contributions of a maximum of 10 pages
- *S3*: High-quality manuscripts that have recently, within the
last year, been submitted or accepted for journal publication

*CONFERENCE PROCEEDINGS *
​​
Accepted papers in categories *S1* and *S2* will be published in the
proceedings that will be available at the conference. In addition, a
post-conference Springer book and special issue of Journals is planned to
be published. Participants will be invited to submit extended versions of
their work for consideration.

*SPECIAL SESSION ORGANIZERS:*
*​​*

- Dr. Taha Arbaoui (ICD-LOSI, University of Technology of Troyes, France.
taha.arbaoui@utt.fr)
- Prof. Farouk Yalaoui
(
​ICD-LOSI, ​
University of Technology of Troyes,
​ France.​
farouk.yalaoui@utt.fr​ <farouk.yalaoui@utt.fr%E2%80%8B>
)
- Prof. Mustapha Nourelfath (
Department of Mechanical Engineering, Laval University, Quebec, Canada
​.
mustapha.nourelfath@gmc.ulaval.ca
​)

------------------------------

Message: 3
Date: Wed, 23 Mar 2016 12:05:07 +0000
From: "Bektas T." <T.Bektas@soton.ac.uk>
To: "dmanet@zpr.uni-koeln.de" <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] Research Fellow in Freight Logistics at the
University of Southampton
Message-ID: <D31836F2.20C0D%t.bektas@soton.ac.uk>
Content-Type: text/plain; charset="iso-8859-1"

Applications are invited for the post of Research Fellow in Freight
Logistics in the Southampton Business School. The post holder will take
part in the EPSRC-funded research project ³Freight Traffic Control 2050:
Transforming the Energy Demands of Last-Mile Urban Freight Through
Collaborative Logistics². This is a collaborative multi-disciplinary
project led by the Transport Research Group in Civil Engineering at the
University of Southampton, and involving the Management Science Group in
the Southampton Business School, the Computing & Communications Department
in Lancaster University, the Centre for Advanced Spatial Analysis at
University College London and the Transport Studies Group at the
University of Westminster.

The successful candidate will hold a PhD or equivalent in Operational
Research, Management Science or a related area, with a track record that
uses optimisation techniques. Proficiency in computer programming is
required. Some experience in vehicle routing or game theory is desirable.

The successful candidate will be expected to take up the post on 01
September 2016 or as soon as possible thereafter. Interviews will be held
in April / May 2016. The position is on a full time, fixed term basis for
30 months.

For further details, please see
https://jobs.soton.ac.uk/Vacancy.aspx?ref=699616TR


------------------------------

Message: 4
Date: Wed, 23 Mar 2016 14:23:18 +0100
From: Florin Manea <flmanea@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Kiel University: Two PhD student / PostDoc positions
for software verification
Message-ID:
<CABNxaTMJnBhhQbfiBXyEMwPNzXCxqJ8=3Q62D33D20FoQdUQNA@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8

Two PhD student / PostDoc positions for software verification

Kiel University is Germany's northernmost State University and a scientific
centre of northern Germany. It was founded in 1665, and today assembles
more than 24,000 students and about 2,000 scientists in eight faculties.

We are looking for talented research-oriented people who are interested in
research on software verification. A successful candidate should have or
be on track for a Master degree in Computer Science with a high degree. A
PhD in Computer Science is required for a PostDoc employment. A solid
knowledge in at least two of the following areas is expected: abstract
interpretation, model checking, constraint solving, parallel algorithms.
Experience in programming highly parallel machines would be of an
advantage, but is not mandatory. The positions are connected to projects
funded by the German Ministry of Education and Research for up to 3 years.
The positions will involve the cooperation with other groups both in
academic and industrial (mainly automotive) environments.

We expect the candidates to be fluent in English both in speaking and
writing. Good knowledge of German is preferable but not mandatory.

The Kiel University is an equal opportunity employer. The positions will be
associated to the Dependable Systems group in the Institute of Computer
Science; see zs.uni-kiel.de. We are an international, young, and expanding
group with research interests ranging from theoretical Computer Science to
the application of formal methods in industrial settings.

Applications in electronic form with the usual documents (certificates, CV,
publication list if applicable, etc.) are to be sent as PDF files to Prof.
Dr. Dirk Nowotka (dn@zs.uni-kiel.de).

------------------------------

Message: 5
Date: Wed, 23 Mar 2016 11:40:26 -0400
From: Mohamed Amine Ferrag <maferrag@lrs-annaba.net>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] One week to Proposal Submission Deadline 30 March
2016 -- Book on Security Solutions and Applied Cryptography in Smart
Grid Communications
Message-ID: <d9066a24f064a96f922ee78aee91fa51@lrs-annaba.net>
Content-Type: text/plain; charset=UTF-8; format=flowed


******* One week to Proposal Submission Deadline 30 March 2016 ***

"Security Solutions and Applied Cryptography in Smart Grid
Communications"

Edited by: Mohamed Amine Ferrag and Ahmed Ahmim
To be published by: IGI Global, USA

URL1 :
http://www.igi-global.com/publish/call-for-papers/call-details/2020
URL2
: https://sites.google.com/site/smartgridsigiglobal/

Editorial Advisory Board
Nacira Ghoualmi-Zine, Badji Mokhtar- Annaba University, Algeria
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Pascal Lorenz, University of Haute Alsace, France
Djamel Djenouri, CERIST Research Center, Algeria
Albena Mihovska, Center for TeleInFrastructur, Aalborg University,
Aalborg, Denmark
Mehdi Nafa, Badji Mokhtar- Annaba University, Algeria
Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/ Islamic University in
Madinah, KSA
Hui Hou, School of Automation, Wuhan University of Technology, China
Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
Mubashir Husain Rehmani, COMSATS Institute of Information Technology,
Wah Cantt, Pakistan
Homero Toral Cruz, University of Quintana Roo, México
Makhlouf Derdour, University of Cheikh Laarbi, Tebessa, Algeria
Lynn M. Batten, Deakin University, Australia
Ram Chakka, RGMCET, RGM Group of Institutions, India
Cristina Alcaraz, University of Malaga, Spain
Sumanth Yenduri, Columbus State University, USA
Chi-Yuan Chen, National Ilan University, Taiwan
P. Venkata Krishna, VIT University, India
Alessio Merlo, University of Genova, Italy
Syed Faraz Hasan, Massey University, New Zealand
Farrokh Aminifar, University of Tehran, Iran
Hossein Akhavan-Hejazi, University of California, USA
Danda B. Rawat, Georgia Southern University, USA

Introduction
Electrical energy storage is a key factor for the future. The
consumption of electrical energy (i.e. the use of air conditioning,
audio and video devices or electric heating) is increasing every year
due; firstly to the increase of the population and secondly by the
appearance of new uses of consumption, such as electric cars. With this
increase consumption, how to ensure the balance between supply and
demand for electricity at all times? To address this problem, the idea
of placing the new generation of smart grids to control this energy has
appeared in recent literature in different flavors in order to provide
electric power supply secure, sustainable and competitive to consumers.
In addition, the revolution in smart grid involves a significant change
in side of the consumer where consumers will also become producer with
the ability of energy storage such as in the vehicle battery, or as a
local generation sources such as photovoltaic panels. However, the smart
grid develops modern solutions for the next-generation network and
digital communication in which many systems and subsystems are
interconnected to provide services from end-to-end network between
various actors and between intelligent devices that are deployed there.
Within each network, a hierarchical structure is composed of different
types of networks, such as the HANs (Home Area Networks), the BANs
(Building Area Networks), the IANs (Industrial Area Networks), the NANs
(Neighborhood Area Networks), the FANs (Field Area Networks), and the
WANs (Wide Area Networks). Currently, large societies propose the use of
cloud computing in smart grid applications connected with the electrical
control center. The main problem in the development of a smart grid is
not located at the physical medium but mainly in delivery of reliability
and security. The possibility of fitting with active or passive attacks
in smart grid network is great to divulge privacy and disrupt energy
(e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack,
Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary
Attack, Routing Table Overflow Attack etc.). Therefore, the security
requirements, including authentication, accountability, integrity,
non-repudiation, access control and confidentiality should be paid more
attention in the future for high performance smart grids. This book will
cover the current scope of various methodologies and mechanisms in the
theory and practice of security, privacy, intrusion detection, and
applied cryptography in smart grid communications in one place.

Objective
This comprehensive and timely publication aims to be an essential
reference source, building on the available literature in the field of
smart grid security in developing countries while providing for further
research opportunities in this dynamic field. It is hoped that this text
will provide the resources necessary for policy makers, technology
developers and managers to adopt and implement smart grid platforms in
developing nations across the globe.

Target Audience
Policy makers, academicians, researchers, advanced-level students,
technology developers, and government officials will find this book
useful in furthering their research exposure to pertinent topics in
smart grid security and assisting in furthering their own research
efforts in this field.

Recommended Topics
This book will include (but will not be limited to) the following
topics. Any other related topics in the area of smart grid security are
also welcome :

- Game theoretical models of smart grid security
- SCADA and legacy system security
- Security and Privacy in Mobile Cloud and Grid Computing
- Secure and resilient cyber-physical and communication architectures
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Machine learning for security
- Computer security visualization techniques
- Intrusion detection based on data mining techniques
- Online money laundering and underground economy
- Hardware vulnerabilities
- Binary analysis and reverse engineering
- Security risk assessment, measurement and management
- Network exfiltration
- Security, privacy, and resource management in Wireless Access Networks
(WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless
Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Hardware security
- Quantum cryptography
- Privacy-preserving systems
- New attacks against computers and networks
- Denial-of-Service Attacks
- Insider attack detection
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis
- Secure software development
- Security and Privacy in Next Generation Mobile Networks
- Protocol security
- Network & active defenses
- Malware and botnet analysis, detection, and mitigation
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Tamper-resistant device technologies
- Smartphone and other embedded systems security
- Fraudulent usage, prevention of traffic analysis
- Cryptography, key management, authorization and access control
- False data injection, detection and mitigation
- Performance evaluation, performance/security tradeoff analysis
- Modern infrastructure for cities(roads, power plants, water treatment
plants, sewage systems, transit systems)
- Energy Efficiency including non-conventional energy management
- Green Environment including E-Waste Management, Hospital Management
etc
- Electro-mobility
- Public key and conventional algorithms and their implementations
- Distributed systems security
- Cyber and Cross-Domain (power to cyber) security event detection,
analysis and response
- DoS/DDoS resiliency
- Cloud security
- Embedded systems security
- Security design and verification tools

Submission Procedure
Researchers and practitioners are invited to submit on or before March
30, 2016 (Extended), a 2-3 page chapter proposal clearly explaining the
mission and concerns of his or her proposed chapter. Authors of accepted
proposals will be notified by April10, 2016 about the status of their
proposals and sent chapter guidelines. Full chapters are expected to be
submitted by May 15, 2016. All submitted chapters will be reviewed on a
double-blind review basis. Contributors may also be requested to serve
as reviewers for this project. Chapters with multiple authors are
welcome, even encouraged.

Propose a Chapter :
http://www.igi-global.com/publish/call-for-papers/submit/2020

Publisher
This book is scheduled to be published by IGI Global (formerly Idea
Group Inc.), publisher of the "Information Science Reference" (formerly
Idea Group Reference), "Medical Information Science Reference,"
"Business Science Reference," and "Engineering Science Reference"
imprints. For additional information regarding the publisher, please
visit www.igi-global.com. This publication is anticipated to be released
in 2016.


Important Dates
March 30, 2016: Proposal Submission Deadline (Extended)
April 10, 2016: Notification of Acceptance
May 15, 2016: Full Chapter Submission
July 30, 2016: Review Results Returned
September 01, 2016: Final Acceptance Notification
September 15, 2016: Final Chapter Submission

Editors

Mohamed Amine Ferrag (Ph.D.)
Department of Computer Science
Faculty of Mathematics, Computer Science, and Material Science
Guelma University
BP 401 Guelma 24000 – Algeria
Tel.: +2137 96 96 14 53
E-mail: mohamed.amine.ferrag@gmail.com
Homepage : https://sites.google.com/site/mohamedamineferrag/

Ahmed Ahmim (Ph.D.)
Department of Mathematics and Computer Science,
Faculty of Exact Sciences and Sciences of Nature and Life
University of Larbi Tebessi,
Route of Constantine, Tebessa 12000 – Algeria
Tel.: + 213 5 55 86 70 65
E-mail: a.ahmim@gmail.com
Homepage: http://lrs-annaba.net/ahmim/
__________________________________________________
Dr. Mohamed Amine Ferrag
Assistant Professor
Department of Computer Science
Guelma University
BP 401 Guelma 24000, Algeria
Tel. : +213 796 961 453
E-mails: maferrag@outlook.fr / mohamed.amine.ferrag@gmail.com
maferrag@lrs-annaba.net
HomePage : https://sites.google.com/site/mohamedamineferrag/
____________________________________________________


------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 97, Issue 27
**************************************

No comments:

Post a Comment