Contact Person : Jcel Bautista ; Last Date for the submission of abstract : 23/01/2019; The huge dfusion of computational capabilities in embedded systems, cars, smart houses, smartphones, critical infrastructures, e-health, and the penetration of computers and software in enterprises of every dimension have led to an enormous number of victims of cyber attacks.