FUZZ - IEEE 2022

CYBERSECURITY

in COMPLEX ENVIRONMENTS

18- 23 July 2022

Padua, Italy

WCCI2022 - FUZZ-IEEE 2022 CONFERENCE

Special Session on

CYBERSECURITY

in COMPLEX SYSTEMS


IMPORTANT NOTES FOR SUBMISSION DEADLINE EXTENSION!!


According to the other SS and Track of the WCCI 2022 Conference, we are pleasured to confirm that also the deadline for this SS on CYBERSECURITY in COMPLEX SYSTEMS is extended to the February 14, 2022 (11:59 PM AoE) .


ANYWAY, it's MANDATORY to submit until the January 31, 2022 (11:59 PM AoE) a draft of the final paper including the Title of your Contribution and the Abstract, in order to be be enabled to access to the final submission system that closes on the 14th February.


DO NOT FORGET!!

DO NOT FORGET!!

DO NOT FORGET and do n ot miss the preliminary date of 31st January 2022.


Contributions Draft that will not be submitted in the Conference Manager System until the 31st of January 2022, can't access to the final submission set to the 14th February 2022.


Official Guidelines for prepapring correctly your contributions are provided in the official page of the main hosting conference WCCI 2022, at the following links.


Authors Instructions: https://wcci2022.org/submission/

Official Deadlines: https://wcci2022.org/dates/






Main Scope:

Internet of Things (IoT) is facilitated by heterogeneous technologies, which contribute to the providing of innovative and intelligent services in large number of application domains. The satisfaction of security and privacy requirements in this scenario, are becoming a main challenge for IoT systems and their developers.\r\nNevertheless, most efforts on IoT security and privacy requirements look at these requirements from a high level view. Hence, important aspects of security and privacy functionalities will be disregarded, causing wrong design decisions. Exploiting data from infrastructure, computers, cyber physical systems, it can be possible to discover useful information from data in order to securize system also from both administrators and end users.\r\n\r\n \r\nDecision makers can make more informative and conscious decisions through this kind of emerging analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the security of processes. In this context fuzzy logic can properly be used to help deal with issues associated with computer security and computer forensics.

Special Session Chairs: Dr. Francesco Mercaldo and Dr. Fiammetta Marulli


for Any information about this special session contact [francesco.mercaldo@unimol.it]