{"id":428,"date":"2023-01-27T22:07:53","date_gmt":"2023-01-27T22:07:53","guid":{"rendered":"https:\/\/aiccsa.net\/AICCSA2023\/?page_id=428"},"modified":"2023-11-06T18:41:28","modified_gmt":"2023-11-06T18:41:28","slug":"track2","status":"publish","type":"page","link":"https:\/\/aiccsa.net\/AICCSA2023\/tracks-and-subtopics\/track2\/","title":{"rendered":"Track2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"428\" class=\"elementor elementor-428\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22c2094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22c2094\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2bb9f7\" data-id=\"d2bb9f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34bdd0f elementor-widget elementor-widget-text-editor\" data-id=\"34bdd0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"color: #0000ff;\"><b>Track 2: Security, Privacy, and Trust<\/b><\/span><\/p><p><span style=\"color: #800080;\"><strong>Track Chair:<\/strong><\/span><\/p><ul><li><span style=\"color: #000000;\"><strong>Marco Viviani<\/strong> (University of Milan-Bicocca) <\/span><\/li><li><span style=\"color: #000000;\"><strong>Rasheed Husain<\/strong> (Bristol Digital Futures Institute, UK)<\/span><\/li><\/ul><p><strong><span style=\"color: #000000;\"><span style=\"color: #800080;\">Scope\u00a0<\/span> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/strong><span style=\"color: #000000;\">The Security, Privacy and Trust track aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products that involve the cybersecurity aspects in our daily activities. The focus of the track is on advances in<\/span><\/p><p><span style=\"color: #000000;\">Cybersecurity technologies that involves new attacks and hacker exploits in several domains such as automotive, cyber-physical systems, networking infrastructure, quantum computing, artificial intelligence, deep learning for information security, digital crime and forensics, intrusion detection\/prevention and incident response, malware and attack analysis, privacy and data breaches, and governance and information security management. The track aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main stockholders of the Security, Privacy and Trust domain. We solicit submissions of original unpublished scholarly work that is not under consideration by another journal or conference.<\/span><\/p><p><span style=\"color: #800080;\"><strong>Topics<\/strong><\/span><\/p><ul><li><span style=\"color: #000000;\">Security threats and vulnerabilities<\/span><\/li><li><span style=\"color: #000000;\">Privacy and Security in Cloud and Edge Computing<\/span><\/li><li><span style=\"color: #000000;\">Privacy and Security in Data Center Networks<\/span><\/li><li><span style=\"color: #000000;\">Automated Vehicular Technologies<\/span><\/li><li><span style=\"color: #000000;\">Vehicular Communications and Networks<\/span><\/li><li><span style=\"color: #000000;\">In-Vehicle communication protocols<\/span><\/li><li><span style=\"color: #000000;\">Offensive and Defensive Cybersecurity<\/span><\/li><li><span style=\"color: #000000;\">Identity Management and Key Management Systems<\/span><\/li><li><span style=\"color: #000000;\">Security and Privacy in Quantum Computing<\/span><br \/><span style=\"color: #000000;\">Exploit design and implementation<\/span><\/li><li><span style=\"color: #000000;\">Network privacy and security<\/span><\/li><li><span style=\"color: #000000;\">Application security<\/span><\/li><li><span style=\"color: #000000;\">Cyber-security solutions for connected and autonomous vehicles<\/span><\/li><li><span style=\"color: #000000;\">Attacks and Countermeasures<\/span><\/li><li><span style=\"color: #000000;\">Authentication<\/span><\/li><li><span style=\"color: #000000;\">Safety and Security Trade-off and Convergences<\/span><\/li><li><span style=\"color: #000000;\">Distributed systems security<\/span><\/li><li><span style=\"color: #000000;\">Embedded systems security<\/span><\/li><li><span style=\"color: #000000;\">Forensics<\/span><\/li><li><span style=\"color: #000000;\">Intrusion detection and Response<\/span><\/li><li><span style=\"color: #000000;\">Malware and virus detection<\/span><\/li><li><span style=\"color: #000000;\">Mobile security and privacy<\/span><\/li><li><span style=\"color: #000000;\">Network security<\/span><\/li><li><span style=\"color: #000000;\">Privacy-preserving systems<\/span><\/li><li><span style=\"color: #000000;\">IoT privacy and security<\/span><\/li><li><span style=\"color: #000000;\">Security and privacy policies<\/span><\/li><li><span style=\"color: #000000;\">Security architectures<\/span><\/li><li><span style=\"color: #000000;\">System security<\/span><\/li><li><span style=\"color: #000000;\">Usable security and privacy<\/span><\/li><li><span style=\"color: #000000;\">Web security and privacy<\/span><\/li><li><span style=\"color: #000000;\">Privacy of vehicular data<\/span><\/li><li><span style=\"color: #000000;\">Standardization and Interoperability<\/span><\/li><li><span style=\"color: #000000;\">National information Security<\/span><\/li><li><span style=\"color: #000000;\">Mobile trusted computing<\/span><\/li><li><span style=\"color: #000000;\">Security policy and management of trusted computing<\/span><\/li><li><span style=\"color: #000000;\">Access control for trusted platforms<\/span><\/li><li><span style=\"color: #000000;\">Privacy aspects of trusted computing<\/span><\/li><li><span style=\"color: #000000;\">Verification of trusted computing architectures<\/span><\/li><li><span style=\"color: #000000;\">End-user interactions with trusted platforms<\/span><\/li><li><span style=\"color: #000000;\">Limitations of trusted computing.<\/span><\/li><\/ul><p><span style=\"color: #000000;\">This topic list is not meant to be exhaustive. Security and privacy is interested in all aspects of computer security and privacy.<\/span><\/p><p><span style=\"color: #000000;\">Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.<\/span><\/p><p><span style=\"color: #800080;\"><strong>Program Committee:<\/strong><\/span><\/p><table width=\"795\"><tbody><tr><td width=\"158\"><span style=\"color: #000000;\">Iberia<\/span><\/td><td width=\"166\"><span style=\"color: #000000;\">Medeiros<\/span><\/td><td width=\"471\"><span style=\"color: #000000;\">LaSIGE, Faculdade de Ci\u00eancias da Universidade de Lisboa, Portugal<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Manuel<\/span><\/td><td><span style=\"color: #000000;\">Munier<\/span><\/td><td><span style=\"color: #000000;\">UPPA, France<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Raul\u00a0<\/span><\/td><td><span style=\"color: #000000;\">Pardo<\/span><\/td><td><span style=\"color: #000000;\">IT University of Copenhagen, Denmark<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Stelvio<\/span><\/td><td><span style=\"color: #000000;\">Cimato\u00a0<\/span><\/td><td><span style=\"color: #000000;\">Universita degli studi di Milano, Italy<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Marc<\/span><\/td><td><span style=\"color: #000000;\">Lacoste<\/span><\/td><td><span style=\"color: #000000;\">Orange Labs\u00a0<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Marco\u00a0<\/span><\/td><td><span style=\"color: #000000;\">De Vincenzi<\/span><\/td><td><span style=\"color: #000000;\">IIT-CNR, Italy<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Francesco<\/span><\/td><td><span style=\"color: #000000;\">Santini<\/span><\/td><td><span style=\"color: #000000;\">Dipartimento di Matematica e Informatica, Universit\u00e0 di Perugia, Italy<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Miran<\/span><\/td><td><span style=\"color: #000000;\">Taha<\/span><\/td><td><span style=\"color: #000000;\">University of Sulaimani, Iraq<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Romain\u00a0<\/span><\/td><td><span style=\"color: #000000;\">Laborde<\/span><\/td><td><span style=\"color: #000000;\">University Paul Sabatier Toulouse III, France<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Battou<\/span><\/td><td><span style=\"color: #000000;\">Amal<\/span><\/td><td><span style=\"color: #000000;\">New University Campus Agadir, Morocco<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Abderrahim<\/span><\/td><td><span style=\"color: #000000;\">Maizate<\/span><\/td><td width=\"471\"><span style=\"color: #000000;\">RITM Laboratory, CED Engineering Sciences Ecole Superieure de Technologie Hassan II University of Casablanca, Morocco<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Stefano\u00a0<\/span><\/td><td><span style=\"color: #000000;\">Sebastio<\/span><\/td><td><span style=\"color: #000000;\">Collins Aerospace, Irland<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Naercio<\/span><\/td><td><span style=\"color: #000000;\">Magaia<\/span><\/td><td><span style=\"color: #000000;\">University of Sussex, United Kingdom<\/span><\/td><\/tr><tr><td><span style=\"color: #000000;\">Chinmaya Kumar<\/span><\/td><td><span style=\"color: #000000;\">Dehury<\/span><\/td><td><span style=\"color: #000000;\">University of Tartu<\/span><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Track 2: Security, Privacy, and Trust Track Chair: Marco Viviani (University of Milan-Bicocca) Rasheed Husain (Bristol Digital Futures Institute, UK) Scope\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":45,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","footnotes":""},"class_list":["post-428","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/pages\/428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/comments?post=428"}],"version-history":[{"count":55,"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/pages\/428\/revisions"}],"predecessor-version":[{"id":1118,"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/pages\/428\/revisions\/1118"}],"up":[{"embeddable":true,"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/pages\/45"}],"wp:attachment":[{"href":"https:\/\/aiccsa.net\/AICCSA2023\/wp-json\/wp\/v2\/media?parent=428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}