22/02/2022 18:02:05

Accepted Special Sessions


Organisers of Special Sessions are responsible for:

  • Select a topic of interest to conference delegates.
  • Obtain papers on this topic, normally a minimum of 5 for an invited special session, but often more. At least 60% of the papers must be by authors that are neither session chairs, from their team nor reviewers for the session. 
  • If there are not sufficient papers, final accepted papers will be moved to the general track.
  • Manage the review process for these papers on due time and deadlines.
  • Provide suitable reviewers for the reviews of the papers.
  • Ensure the final versions of the papers are uploaded before the deadline.
  • Attend the conference and chair the session.
  • Provide a list of international reviewers (name, affiliation, country) who have already accepted to review the papers.
  • Disseminate widely a call for papers for the special session.


Special Session 1

Cybersecurity in Future Connected Societies

Víctor Gayoso Martíne, Spanish National Research Council (CSIC)
Prof. Koji Ishibashi, University of Electrocommunications (Japan)

Today it is clear that future societies can only be built upon continuous and reliable data connectivity, in which IoT devices will be ubiquitous. This presents great opportunities for developing new services, but at the same time it also brings many risks and technical challenges in areas such as data security and user privacy. The advent of quantum computers will reinforce the need to design algorithms, protocols, and primitives that can withstand both conventional and quantum attacks. This special session welcomes theoretical and applied contributions that address algorithms, technologies, and practices to strengthen the security of any device storing and transmitting data, specially IoT devices, with the ultimate goal of developing trusted and reliable connected societies. The list of possible topics includes, but is not limited to, the following:

  • Cybersecurity in future connected societies.
  • Pre-quantum and post-quantum cryptography applied to IoT devices.
  • New proposals for technologies that can be deployed now and survive the advent of quantum computers.
  • Wireless Physical Layer Security


Special Session 2

New methods and models to simulate the propagation of malware and fakes news

Angel Maria Martin del Rey, Universidad de Salamanca (Spain)
Marina Castaño Ishizaka, Universidad de Salamanca (Spain)
Roberto Casado Vara, University of Burgos (Spain)

Abstract: This special session is devoted to gather high-quality research papers and reviews focused on the design, analysis, and development of novel mathematical and computational models to simulate the propagation of both malicious code (malware) and fake news. Specifically, this special session will cover different perspectives on these and related potential topics:

  • Design and analysis of novel epidemiological models based on standard paradigms.
  • Analysis of new techniques based on Artificial Intelligence or Complex Network Analysis for designing epidemiological models.
  • Analysis of the relation and analogies of the propagation of different entities: biological agents, malicious code, fake news, etc.
  • Study of novel methodologies to control epidemics.


Special Session 3

Cybersecurity and trusted supply chains of ICT

Petrica Pop, Technical Univesity of Cluj-Napoca (Romania)
Jose Barata, UNINOVA, (Portugal)
Ovidiu Cosma, Technical Univesity of Cluj-Napoca (Romania)
Oliviu Matei, HOLISUN (Romania)

Abstract: While every year cyber-attacks are rising in both importance and volume, it is of greatest importance to ensure that deployed code is free of known problems, including interactions between software and hardware components. A single security vulnerability may leave ICT systems vulnerable to data breaches, cyber-attacks, and other cyber incidents. This special session is focused mainly on the design of algorithms, software, and hardware systems to provide security, privacy, data protection, fault tolerance, etc. High quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in this area of Cyber Security are cordially invited for presentation at the conference. The topics relevant to this special session include, but are not limited to:

  • Development of mechanisms that measure the performance of ICT systems with regards to cybersecurity and privacy
  • Development of dynamic methods and tools for better forecasting, detecting and preventing propagated vulnerabilities
  • Design and develop security, privacy and accountability measures and mitigation strategies for all entities involved in the supply chain
  • Design and develop techniques, methods and tools to better audit complex algorithms
  • Vulnerability detection
  • Vulnerability propagation
  • Exploitability forecasting
  • Vulnerability forecasting
  • Hardware security
  • Software and system security
  • Cybersecurity data analytics
  • Auditing mechanisms
  • Predictive simulation
  • Runtime monitoring


Special Session 4
Intelligent solutions for cybersecurity systems

Dr. Daniel Urda Muñoz, Universidad de Burgos (Spain)
Dr. Roberto Magán Carrión, Universidad de Granada (Spain)
Dr. Bernabé Dorronsoro, Universidad de Cádiz (Spain)
Dr. Meelis Kull, University of Tartu (Estonia)

Abstract: In recent years, the fast growth in technology has drastically increased the amount of data generated by people and communication services. We are currently living in a digitalized world in which information and processes come in digital form where new security threats and actors appear thus being mandatory to account for cybersecurity systems. In parallel, Artificial intelligence (AI) is now being used everywhere in our life, from consumer electronics, vehicles, and smart systems in offices and factories, to various cloud services on the Internet. AI, in particular Machine Learning (ML) and Deep Learning (DL) techniques, are now becoming key technologies that support our lives and society. In this sense, AI arises as a powerful tool, not only to gain insights from data but also to ensure privacy and security of the information and communication services. Additionally, these technologies also increase the chances of being targeted by cyberattacks, thus requiring the development of cutting-edge smarter approaches which help minimise the exposure of our living infrastructure, property, and privacy. This session welcomes recent contributions in all areas connected to machine learning and cybersecurity addressing related issues including, but not limited to:

  • Data security and privacy.
  • Smart security control.
  • Adversarial machine learning.
  • Robustness and resiliency of AI models.
  • XAI in cybersecurity.
  • Privacy preserving machine learning.
  • Federated learning for cybersecurity.
  • Data visualisation and visual analytics for cybersecurity.
  • Zero-day attack detection and reaction.
  • Deep learning for cybersecurity.
  • Data fusion methods.
  • Datasets’ integration.
  • Cybersecurity forensic analysis.
  • Business Intelligence and Security.
  • Privacy-enhancing technologies and anonymity.
  • AI-based SOARs (Security Orchestration, Automation & Response).
  • AI-based EDRs (End-point Detection and Response).
  • AI-based IDSs (Intrusion Detection Systems).
  • AI-based IRSs (Intrusion Response Systems).
  • AI for cybersecurity.
  • Cybersecutiry for AI-based models: threats, attack generation and countermeasures.
  • AI, Ethics and Law.

Papers reporting industry experiences, practical applications and case studies are welcomed in this special session.