Use Internet Explorer only, other browsers may not show the site correctly |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
IEEE
Conference record no. #40129 |
CICSyN2016 8th International Confernece on |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Computational
Intelligence, Communication
Systems and Networks |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Kuala Lumpur,
Malaysia, 25 - 27 July 2016, University
of Malaysia in Pahang
View
CICSyN2009, CICSyN2010, CICSyN2011, CICSyN2012, CICSyN2013, CICSyN2014, CICSyN2015, Proceedings
in IEEE online Digital Library I-Xplore |
Malaysia Section |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Call for Papers Paper Submission Registration Social Events Keynote and Tutorial Speakers: Prof Patrick Wang Prof Qiang Shen Submission
of Full/Short/Poster/WIP
papers: see above Notification From: see above Camera-ready to CPS server
& copyright form: see
above
Registration (Payment) due from: see above Credit Card on EDAS Conference Chairs/Honorary Co-Chair: Prof Zuwairie Ibrahimi, UMP Dr Adam Brentnall, Queen Mary, London University Program Chairs: Dr Ibrahim Ibrahim Shapiai, UTM Dr Alessandra Orsoni Kingston University, UK Local General Chair: TBA Advisory Chairs: Prof Frank Wang, UK Prof Philip Sallis, AUT New Zealand Prof Zuwairie Ibrahim UMP University of Malaysia in Pahang Prof Paulus Rihardjo, UNPAR Indonesia Dr Alessandra Orsoni, University of Kingston Norrima Mokhtar University of Malaya. Prof Patrick Wang, USA Prof Jasmy Yunus, UTM Prof Borhanuddin Mohd Bin Ali,
UPM Dr Adam Brentnall, Queen Mary London University Prof Ismail Saad, UMS Prof Mahamod Ismail UKM Prof Rosni Abdullah, USM Prof Rosalam Sarbatly, UMS General Chair: General Co-Chair: Ajith Abraham EUROSIM Liaison Chair: Alessandra Orsoni |
Best papers selected for IJSSST 5pm, Sunday 24 July
2016: Early registration desk opens for one hour, Pacific
Regency hotel, Kuala Lumpur, Malaysia. Conference Venue/Map and hotels: Pacific
Regency hotel, Kuala Lumpur, Malaysia Submission Deadline: 20 June 2016 (EDAS stays open for few
more days after this date for late papers) Use template below to format your paper: Word template (MS Word .doc format) Then submit it through EDAS: http://edas.info
Paper Registration: DEADLINE 10 July 2016 Papers are invited on any aspect of Computational
Intelligence, Communication
Systems and Networks. Papers
presenting work validated by experimentation, simulation or analysis are
solicited. Papers with application and experimental focus from both industry
and academy, duly documenting lessons learnt from test-beds, field trials or
real deployments are particularly welcome. Manuscripts must be submitted
electronically through the EDAS system. Topics of interest include, but are not
limited to: Tracks/Themes
Intelligent Systems Hybrid Intelligent Systems & Hybrid Soft Computing Sensor Nodes, Circuits, Devices, Wireless Sensor Networks Image, Speech and Signal Processing Transport, Logistics, Harbour, Shipping and Marine Virtual Reality, Visualization and Computer Games Parallel and Distributed Architectures and Systems Internet Modelling, Semantic Web and Ontologies Mobile ad hoc Networks Vehicular Technology and Networks Air Interfaces QoS for Voice and Video
in Wireless Networks Applications: aerospace; remote sensing;
wireless communication, intelligence and simulation, electronic circuits and systems;
communication and networks; management; games, war/conflict/rebellion
modelling, cognitive functions, semantics modelling/ dynamics; manufacturing;
robotics; measurement; monitoring; safety critica1 systems; military. Exhibitors: manufacturers of software and
hardware, publishers, etc., are invited to apply to exhibit their products. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Submission Guidelines |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
You are invited
to submit: - proposal to organize a
technical session and/or workshop. Submissions must
be original, unpublished work containing new and interesting results that
demonstrate current research in all areas of computational intelligence,
computer systems and networks, focusing on modelling, simulation and
applications in science, technology, business and commerce. Proceedings will
be published by IEEE Conference Publishing
Service (CPS). The conference is jointly organised by UK
Simulation Society and Asia Modelling and Simulation Section and technically
co-sponsored by the IEEE Malaysia section (pending). Patrons, promoters and
supporters of CICSyN2016 include: -
University
of Malaysia in Pahang -
EUROSIM -
University
Polytechnic of Madrid -
European
Council for Modelling & Simulation -
Society
for Computer Simulation Int. (SCS) Submission implies the willingness of at least one of the authors
to register and present the paper. All papers are to be submitted
electronically,- see full instructions under Paper Submission below,
in PDF or Word format. All papers will be peer reviewed by at least three
independent referees of the international program committee. Paper Submission: CICSyN2016 is using EDAS for submission
and registration, authors need to: - create an
account with EDAS by clicking on the link below - open the list
of conferences managed by EDAS & find CICSyN2016 - click on
Submit button on the right to enter your paper title & abstract - upload file. IEEE Author Kit will be
emailed to authors individually upon acceptance of their papers. Paper Templates: Word template (MS Word .doc format) Authors
of the best papers will be invited to revise and extend their work for publication
in a special issue of the
International Journal of Simulation: Systems, Science and Technology. Conference website: http://cicsyn2016.info re-direction server site: http://uksim.info/cicsyn2016/cicsyn2016.htm |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
TPC/ International Reviewers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prof. Ing. Heinz Frank, Reinhold-Wuerth-University
Künzelsau, Germany Prof. P.K. Meher, NTU, Singapore Dr Athanasios Pantelous, UK Dr. Harkirat Singh, Samsung, USA Dr. Maman Abdurohman,Institut
Teknologi Telkom,Bandung - Indonesia Prof. Vijay Bhargava, University
of British Columbia, Vancouver, Canada Prof. Hai JiangArkansas State University, USA Dr. Theodoros G. Kostis, Greece Dr. Varun
Jeoti, Petronas, Malaysia Dr. Joanne Scillitoe, Michigan Tech Univ, USA Prof Shubha Kher, USA Prof Helen Karatza, Greece Prof Anna Lekova, Bulgaria Dr Pichaya Tandayya, Thailand Mr. Jakapan Suaboot, Thailand Dr. Wasimon Panichpattanakul, Thailand Prof. Sudarshan Tiwari, MNNIT, Allahabad Dr. Shekhar Verma, IIIT, Allahabad Prof. Harnath Kar, MNNIT, Allahabad Prof. A.G. Keshkar, VNIT, Nagpur, India Prof. Yuehui Chen, China Prof. Mokhtar Beldjehem, Canada Prof. P.K. Singhal,
MITS, Gwalior India Prof. S.S. Bhadoria, MITS, Gwalior, India Prof Paulus Rihardjo,
Indonesia Ms. Pallavi Shukla, VITM, Indore, India Prof
Wimpy Santosa, Indonesia Prof. Rubiyah Yusof, Malaysia Mr. Manish Dixit, MITS, Gwalior, India Mr Waqas Bangyal, Pakistan Prof. A.K. Saxena, Libya Dr
Cecilia Nugraheni Dr Hadzli Hashim, Malaysia Dr. Fazal Rehman, MAJ University, Pakistan Dr
Kinley Aritonang, Indonesia Dr Paulus
Kartawijaya, Indonesia Dr
Bagus Arthaya, Indonesia Dr Zuzka Oplatkova, Czech Republic Dr Zuwairie Ibrahim, Malaysia Dr. Aditya Trivedi, IIITM, Gwalior, India Prof. Sung-Bae Cho, Korea Prof. Jeng-Shyang Pan, Dr Ijaz Uddin, Pakistan Dr Zuhaina Zakaria, Malaysia Dr Ari
Prihatmanto, Indonesia Dr Miryam
Wijaya, Indonesia Prof
Patrick Wang |
Prof. Hisao Ishibuchi, Japan Pandian Lucky
Adhie, Indonesia Ali
Sadiyoko, Indonesia Dong-hwa
Kim, Korea, Rian
Pratikto, Indonesia Zhang Yi,
China Noor Aziz,
Malaysia Muhammad
Haron, Malaysia Elisati
Hulu, Indonesia Min-Shiang
Hwang, Taiwan Jeng-Shyang Pan, Taiwan Marihot
Nainggolan, Indonesia Dr.
Jongman Cho, Korea Thedy
Yogasara, Indonesia Noor
Hafizah Abdul Aziz, Malaysia Prof. B.K. Mohanty, JIET, Guna, India Prof. Osamu Ono, Japan Prof
Robertus Triweko, Indonesia Mr. R.S. Tomar, IITM, Gwalior, India Dr. Er Meng Joo, Singapore Cynthia
Juwono, Indonesia Ignatius
Sandy, Indonesia Paramasivan Saratchandran, Singapore Mario Koeppen, Japan Mr. B.K. Chaurasia, IIIT, Allahabad, India Prof. Zhou Mingtao, China Prof. Kazunori Sato, Japan Prof Shah Rizam Mohd Shah Baki, Malaysia Prof. Kunio Igusa, Japan Prof Mohamed Khalil Hani, Malaysia Dr. Shirsu Verma, IIIT, Allahabad, India Mr. Arvind Jain, RJIT, Gwalior, India Prof Teruaki Ito, Japan Prof Eduard Babulak, Fiji Prof R K Subramanian, Mauritius Prof K.G.
Subramanian, Malaysia Dr
Cecilia Nugraheni Dr Hadzli Hashim, Malaysia Dr. Fazal Rehman, MAJ University, Pakistan Mr. Prashant Purohit, RJIT, India Mr. P. Ganeshan, British Telecom, Malaysia Dr. S.S. Bedi, Barielly, India Dr. Lei Shu, Japan Dr. K. Madduletty, NITIE, Mumbai, India Dr. Atul Negi, Hyderabad, India Dr. S.K. Shukla, India Prof. Suresh Kumar, Tumkur, India Dr. C.V. Tripathi, India Dr. Azrin Aris, Malaysia Dr Danilo Pelusi |
Dr. Shwkat Ali, Australia Mr. Valliappan Raman, USM, Malaysia Mr. Rajit Ram, VITM, India Prof
Eduard Babulak, Canada Prof. Rakesh Saxena Abu Khari A'ain Ghulam Abbas Mohsen Askari Athanasios Pantelous Mohd Zaidi Abd Rozan Normaziah Abdul Aziz Izhal Abdul Halin Theodoros G. Kostis Ruzairi Abdul Rahim Irfan Syamsuddin Rosni Abdulla Shahrum Shah Abdullah Dayang Norhayati Abg Jawawi Shukri Abidin Hassan Abolhassani Athanasios Goudosis Ajith Abraham Kamalrulnizam Abu Bakar Gregorio Romero Luisa Martinez Rohani Abu Bakar Carlota Tovar Ford Lumban Gaol Wan Hussain bin Wan Ishak Syed Abd Rahman Abu Bakar Johari Adnan Mohamad Noh Ahmad Mohammad Nazir Ahmad Waqas Ahmad Shakeel Ahmad Waqas Ahmed Khalid Al-Begain David Al-Dabass Dhiya Al-Jumeily Rafe' Alasem Mikulas Alexik Marco Remondino Belal Alhaija Tony Allen Ferda Alpaslan Ismail Amin Shamsudin Amin Konar Amit Marcelo Ang, Jr Obinna Anya Ishak Aris Vijay Arora Irfan Awan |
Eduard Babulak Kambiz Badie Youakim Badr Gurvinder-Singh Baicher Preeti Bajaj Frank Ball Abhijit Bapat Narendra Bawane Arijit Bhattacharya Fabian Boettinger Mohammad Razaa Borujerdi Vesna Bosilj-Vuksic Felix Breitenecker Adam Brentnall John Brinkman Agostino Bruzzone Bustanur Busta Hueseyin Cakmak Piers Campbell Richard Cant Andre Carvalho Sanjay Chaudhary Russell Cheng Monica Chis Sung-Bae Cho Chin Soon Chong Monica Chris Robert Colomb Emilio Corchado Roy Crosbie Amol Deshmukh R Deshmukh Jafri Din Jiri Dvorsky Andrzej Dzielinski Chionh Eng Wee Mazlina Esa Tony Fleet Thomas Freytag Vikram Gadre Boon Ping Gan G Ganesan Viranjay M. Srivastava Fengge Gao Xiao-Zhi Gao Xiaohong Gao Yannis Goulermas Crina Grosan Jafar Habibi Abdul Razak Hamdan Habibollah Haron Faiezah Haron Fazilah Haron Manaf Hashim Uda Hashim |
Aboul Ella Hassanien George Herterich Seth Hetu Vlatka Hlupic Sadiq Hussain Abir Hussain Min-Shiang Hwang Zuwairie Ibrahim Hanif Ibrahim Ismail Ibrahim Subariah Ibrahim Mohd. Yazid Idris Mojca Indihar Štemberger Rolly Intan Hisao Ishibuchi Razali Ismail Nauman Israr Norafida Ithnin Teruaki Ito Lakhmi Jain Sudhanshu Jamuar Safeeullah Soomro Janos-Sebestyen Janosy Gerrit Janssens Don Jeng Emilio Jiménez Macías Rao Jinnah Er Joo Kasmiran Jumari Esko Juuso Lilia Kakaradova Nikolaos Karadimas Helen Karatza S. D. Katebi SHET KC Arpad Keleman Avinash Keskar Marzuki Khalid Noor Khafifah Khalid Mohamed Khalil-Hani Hisham Khamis M Kharat Shubha Kher Dong-hwa Kim Mario Koeppen Petia Koprinkova Anna Lekova Michal Kratky Vijay Kukreja Rajeev Kumar Tri Basuki Kurniawan Alhad Kuwadekar Rik Van Landeghem Caroline
Langensiepen |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Registration (all
figures in US$) Currency Converter Due to the labour intensive process of
handling bank transfers a $50 surcharge applies. |
Author/
Participant |
Student
Paper (2
authors maximum) |
Student
Participant (no paper) or Co-Author (No Pack) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credit Card |
Bank Transfer |
Credit Card |
Bank Transfer |
Credit Card |
Bank Transfer |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Registration BEFORE early bird deadline
of 20 June IEEE Members: 5% discount is given to
author after presentation at conference |
$595 $30 |
$645 $30 |
$545 $25 |
$595 $25 |
$300 |
$350 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Registration AFTER earlt bird deadline
of 20 June IEEE Members: 5% discount given to
author after presentation at conference |
$640 $32 |
$690 $32 |
$590 $30 |
$640 $30 |
$350 |
$400 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Registration: Only one
method of payment is available on EDAS: Credit Card:
payment is accepted online and confirmation is instant. Here is
the procedure: 1. go to
EDAS at http://edas.info and click on Register yellow
tab at the top, a list of conferences will appear 2. Scroll
down to conference name (e.g. CICSyN2015) line and click on the extreme right green money symbol at the
end of this line, a new page will appear 3. click on the extreme right button (Trolley symbol) after
USD $595, a new table will immediately appear under a new line Registered, but no paid. 4. Under
this table a list of credit card symbols and SWIFT. Click on the credit card
symbol. 5. A new
page will appear, enter all card details, scroll down to the bottom and click
Pay for Registration 6. REMEMBER: NO payment received by
the set deadline means your paper will NOT be in the Proceedings. If you
have problems meeting this deadline email david.al-dabass@ntu.ac.uk immediately. Best wishes
and look forward to meeting you at the conference. Conference Chairs. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Keynote Speaker Effects of
Social Interactions on System Vulnerabilities Yong Meng TEO Department of Computer Science National University of Singapore email: teoym@comp.nus.edu.sg url: www.comp.nus.edu.sg/~teoym More than 40% of computer and organizational security professionals believe that their greatest security threat is insider threats where employees jeopardized security through data leaks or similar errors [1]. Though insider threats are of growing interest and importance in system security, it is not well understood and investigated. This talk discusses the role of social interactions in an organization and the insider threats it presents on system vulnerabilities. To investigate this, we propose an approach consisting of three key steps. Firstly, users roles, security policies and their interactions are modeled as facts and interaction rules. Secondly, a reasoning engine consumed these facts and interaction rules, and together with a model of the hardware system configuration produces an attack graph. An attack graph represents the cumulative effect of attack steps, showing how series of individual steps or network paths can potentially enable an intruder to gain privileges in the system. Lastly, the attack graph can be analyzed to obtain an objective measure of risks and to prioritize security hardening measures among others. For examples, How likely is it that an intruder could gain privilege X? Which user group and system component are most vulnerable? In this talk, we present preliminary results that investigate the impact of security leakage arising from user interactions on system vulnerabilities. Reference 1. Unintentional Insider Threats: Social Engineering, Technical Report, Software Engineering Institute, Carnegie Mellon University, Jan 2014. Biography
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||