| |||||||||||||
CyCon 2013 : 5th International Conference on Cyber Conflict | |||||||||||||
Link: http://www.cycon.org | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
CyCon 2013 will focus on the technical, strategic and legal implications of using automatic methods to manage cyber conflicts. The conference will be organized along two tracks: a Strategic Track and a Technical Track. Legal aspects will be incorporated in these two tracks.
Strategic Issues Conceptual Framework of Cyber Conflicts • Defining cyber conflict, cyber war, cyber attack, cyber weapon, etc. • (Non-)essentiality and (non-)feasibility of a common terminology • Cyber attack as an instrument of policy – limits and opportunities • Economic, political, military and ideological aspects of cyber conflicts • Integrating cyber operations with other (military, security) operations • Cyber offence and defence strategies and their relations to conventional warfare • Tactical, operational and strategic considerations Concepts for using automatic methods in cyber conflict • Decision support • Situational awareness • Situation prediction • Automated defences • Autonomous offensive capabilities • Ethical, legal and operational risks • Automation of legal advice • Application of the basic principles of the Law of Armed Conflict • Command responsibility Actors in cyber conflict • Military (active, reserve), intelligence, law enforcement, mercenaries, commercial entities, volunteers, terrorists, criminals, hacktivists, etc. and their role in cyber conflict • Artificial (intelligent) agents • Organizational models, missions and functions • Identifying, recruiting, training and retaining the cyber workforce Technical Issues Automation of Tactical, Operational and Strategic Procedures in Cyber Conflicts • Cyber conflicts from military, political and system control science perspectives • Asymmetric warfare in cyber conflicts • Cyber attacks and counter-attacks • Cyber conflict situation awareness • Contingency planning for mission assurance • Cooperative mission risk management • Novel intrusion detection and malware analysis techniques • Anomaly detection methods for network traffic and system log data • Botnet detection and mitigation Case Studies, Experiments and Systems • Real life examples, analyses • Experimentation, simulation and test environments • Evaluation criteria, metrics • Cyber conflicts in space, ground, airborne, naval and underwater operations Cyber Conflict Models • Formal models and theoretical foundations of cyber conflicts • Game-theoretic models • Biologically inspired models • Statistical models • Policy-based management • AI models • Self-organization and adaptability in cyber defence • Information fusion, situation awareness and decision support in cyber conflicts Reasoning and Attribution in Cyber Conflict • Attribution process of complex cyber attacks, cyber conflicts and campaigns • Novel methods for attribution • Effectiveness of existing attribution methods • Extending cyber conflict attribution process beyond the cyber domain, including conventional warfare, and human modelling Targeting and Cyber Attack Impact Assessment • Mission-critical assets, targets and processes in cyber space • Cyber attack modelling (distributed cyber-attacks; coordinated multi-party cyber-attacks recursion attacks, cyber-storm attacks, cyber-pranks, hoaxes, etc.) • Attacker behavioural modelling, motivation, intensions • Threat detection and predictive modelling in cyber warfare • Cyber attack impact propagation and assessment on military missions • Mission impact assessment • Attack verification • Predicting, assessing and managing collateral damage |
|