Special Session

Welcome to submit your special session proposal!

Special Session 1: Formal Methods and Intelligent Tools for Cybersecurity

This special session delves into the realm of formal methods and intelligent tools for cybersecurity and cyber defense. As the intricacy of communication networks continues to escalate, the imperative for robust security measures becomes increasingly paramount and formidable. Traditional security technologies may prove inadequate to meet the demands of users operating within open, heterogeneous, dynamic, mobile, distributed, and wireless computing environments. Consequently, there arises an incessant demand to cultivate environments that facilitate diverse applications to collaborate while upholding elevated levels of security. The primary aim of this session is to convene researchers and practitioners actively engaged in the realms of security, cybersecurity, and cyber defense. The emphasis lies in deliberating emerging methodologies and strategies for crafting and fortifying secure systems and networks. Submissions focusing on formal methodologies are especially encouraged, as well as papers proposing approaches integrating AI, ML, DL, XAI, and NLP techniques.

Session Co-Chairs:
Prof. Jaouhar Fattahi, Laval University, Québec, Canada
Prof. Mohamed Mejri, Laval University, Québec, Canada
Prof. Ridha Ghayoula, Moncton University, New Brunswick, Canada
Prof. Emil Pricop, Petroleum-Gas University of Ploiesti, Romania


The topics of interest include, but are not limited to:
• Cryptographic protocols
• Cryptography and Cryptanalysis
• Network security
• Hardware security
• Software security
• Formal Methods for security
• Biometrics
• Web applications security
• Security policies, model and architecture
• Privacy, trust and anonymity
• Security in parallel and distributed systems
• Cloud security
• Incident response and management
• Identity and access management
• Governance, risk management, and compliance
• Physical security
• Security architecture and design
• Wireless and mobile security
• Intrusion detection
• Anomaly detection
• Detecting toxic content on social networks


Submission method
Submit your Full Paper (no less than 8 pages) or your paper abstract-without publication (200-400 words) via Online Submission System

Template Download