posted by organizer: CCDCOE || 9861 views || tracked by 13 users: [display]

CyCon 2014 : 6th International Conference on Cyber Conflict

FacebookTwitterLinkedInGoogle

Link: http://www.cycon.org
 
When Jun 3, 2014 - Jun 6, 2014
Where Tallinn, Estonia
Submission Deadline Oct 1, 2013
Notification Due Nov 1, 2013
Final Version Due Mar 1, 2014
Categories    computer science   security   information technology   strategy
 

Call For Papers

CyCon 2014 will focus on ‘Active Cyber Defence’. Despite lacking a universal definition, active cyber defence is usually seen as entailing proactive measures that are launched to defend against malicious cyber activities or cyber attacks. Due to the growing dependency on information and communication technologies as well as the increasing sophistication of cyber threats, active cyber defence apparently has become an important issue for both public and private entities. During CyCon 2014 the risks and benefits as well as the technical, strategic and legal implications of (applying) active cyber defence will be discussed.

The conference solicits original unpublished research, applications and experience papers on the following or other topics relevant to active cyber defence:

Conceptual framework of active cyber defence
* (Non-)essentiality and (non-)feasibility of a common terminology regarding active cyber defence
* Active cyber defence classification and categorisation
* Levels of activity of active cyber defence
* Active versus passive cyber defence
* Pre-emptive and preventive defence (detecting, tracing and counter-striking, mitigative and retributive counter-actions)
* Self defence, self help, hot pursuit
* Active cyber defence as an instrument of policy – limits and opportunities
* Active cyber defence and different legal regimes: peacetime and armed conflict
* Active cyber defence and aspects of public international law: e.g., sovereignty, non-intervention, use of force
* Political, military, economic and ideological aspects of active cyber defence
* Integrating active cyber defence operations with other (military, security) operations
* Active cyber defence strategies and their relations to conventional warfare
* Active cyber defence and deterrence (overt, obvious and covert cyber operations)
* The position of international and regional organisations in active cyber defence

Actors in active cyber defence
* Military (active, reserve), government, nation states, intelligence, law enforcement, mercenaries, commercial entities, volunteers, terrorists, criminals, hacktivists, etc. and their role in active cyber defence
* Cooperation between stakeholders within the scope of active defence
* Artificial (intelligent) agents
* Identifying, recruiting, training and retaining the cyber workforce

Tactical, operational and strategic aspects of active cyber defence
* Challenges of active cyber defence from political and military perspectives
* Extended situation awareness and mission monitoring within the scope of active cyber defence
* Means of active cyber defence in asymmetric warfare
* Active cyber defence missions and risk management
* Contingency planning for active cyber defence mission assurance
* Active cyber defence in space, ground, airborne, naval and underwater operations
* Arms control for active cyber defence systems

Technical implementation of active cyber defence
* Intrusion detection and malware analysis techniques from the active defence perspective
* Anomaly detection methods for network traffic and system log data focussing on active defence
* Exploitation and malware spreading techniques
* Botnet detection, infiltration and mitigation
* Counter IDS / counter-counter IDS systems and methods
* System resilience

Targeting in active cyber defence operations
* Mission-critical assets, targets and processes in cyber space
* Active cyber defence and cyber attack modelling (distributed cyber-attacks; coordinated multi-party cyber attacks recursion attacks, cyber storm attacks, cyber pranks, hoaxes, etc.)
* Attacker behavioural modelling, motivation, intensions
* Threat detection and predictive modelling in active cyber defence

Impact of using active cyber defence
* Active cyber defence and cyber attack impact propagation and assessment on military missions
* Mission impact assessment
* Active cyber defence and cyber attack verification
* Benefits of employing active cyber defence
* Economic aspects of employing active cyber defence
* Political, ethical, legal and operational risks
* Active cyber defence and issues of international and national criminal law, human rights law, private law, intellectual property, and telecommunication law, ITU regulations
* Consequences of non-state actor actions in international relations and crisis escalation
* Application of the basic principles of the Law of Armed Conflict
* Collateral damage to third party systems
* Rights and duties of Internet Service Providers

Reasoning and attribution requirements for active cyber defence
* Attribution process of complex cyber-attacks, cyber conflicts and campaigns
* Effectiveness of existing attribution methods
* Novel methods for attribution
* Extending cyber attribution process beyond the cyber domain, including conventional warfare and human modelling
* Forensic investigations of active cyber defence activity

Case studies, experiments and prototype active cyber defence systems
* Analysis of prototype active cyber defence systems;
* Experimentation, simulation, mock-ups and test environments for active cyber defence systems
* Evaluation criteria, definitions and metrics within the scope of active cyber defence
* Real-life cases

Active cyber defence models
* Formal models and theoretical foundations of active cyber defence
* Self-organization and adaptability in cyber defence
* Information fusion, big data management and active cyber defence situation awareness
* Automated decision making / decision support in active

Authors are required to first submit an abstract of the planned paper, which should describe the topic and lay out the main aspects as well as the structure of the research (300-500 words). After a preliminary review and acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review.

Accepted papers will be published in the printed conference proceedings with an ISBN and made digitally available through the conference website.

Submission details, author guidance, copyright transfer form and other practical information will be made available on the conference website at a later date. The anonymised abstracts and manuscripts must be uploaded electronically to EasyChair.org, for which an account creation at EasyChair.org is required.

Authors of papers accepted for publishing in the conference proceedings are required to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer from and to Lennart Meri Tallinn Airport, accommodation and lunches for the duration of the conference, and participation in social and sightseeing activities, depending on the final programme of the conference. Please note that on case of several authors for one paper, only one author will be offered the travel, accommodation and free entrance to the conference.

Important Dates
Abstract submission 01 October 2013
Full paper 10 January 2014
Notification of Authors 3 March 2014
Final Paper 24 March 2014
CyCon on 3-6 June 2014

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ECCWS 2025   24th European Conference on Cyber Warfare and Security