| |||||||||||
IJCSA 2017 : International Journal On Cyber Situational Awareness | |||||||||||
Link: http://www.c-mric.org/journals-ijcsa | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The International Journal on Cyber Situational Awareness (IJCSA) is a comprehensive reference journal, dedicated to disseminating the most innovative, systematic, topical and emerging theory, methods and applications on Situational Awareness (SA) across Cyber Systems, Cyber Security, Cyber Physical Systems, Computer Network Defence, Enterprise Internet of Things (EIoT), Security Analytics and Intelligence to students, scholars, and academia, as well as industry practitioners, engineers and professionals.
**Overall Scope** The International Journal of Cyber Situational Awareness (IJCSA) covers innovative research on theoretical and practical aspects of Situational Awareness on Cyber Systems. The journal focuses on the advancement of the principles, methods and applications of situational awareness to support, enable and facilitate advances in Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS), Enterprise Internet of Things (IoTs), Social Media, Cyber Incident Responses, Control, Containment and Countermeasures (CIRC3). **Coverage** Recommended topics include, but are not limited to, the following: **Situational Awareness for Computer Networks Defense Computer Network Defense Cyber Situation Awareness Correlation & Automation Collaborative Situation Awareness for Decision Making Collaborative Defense Approach Situation Assessment & Decision Making **Defense Strategy for the Enhancement of Situational Awareness Risk Management, Governance and Compliance Trust, Privacy and Anonymity Issues Digital Forensic Information Analysis Enterprise Information Security Policies, Standards and Procedures Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment **Cyber Situational Awareness Tools & Techniques Fuzzy Logic Rough Set Artificial Neural Networks Artificial Intelligence Genetic Algorithm Evidence Theory (DST) Bayesian Networks & Set Theory Big Data Analytics Game Theory Graph Theory **Network Situational Awareness Cyber Attack Scenarios Situation-Aware and Context-Aware Network Applications CERTs and CSIRTs Security Event and Information Management Application Security, Audits and Penetration Testing **Human Factor Cognitive Workload Perception Stress Knowledge Training and Expertise Risk Assessment and Decision Making Forecasting and Prediction Operator SA & Team SA **National and Critical Infrastructure Security Issues Information Security Cyber Security Database Security Application Security Law Enforcement and Surveillance Border Protection and Controls Cyber Warfare and Counter Terrorism **Situation Awareness in Military Operations Military Doctrinal in Situation Awareness C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) Computer Network Operations Computer Network Defense Mission Awareness, Command and Control **Analysis of Large-Scale Internet Traffic Attack Graphs Advanced Security Incident Analysis Sensor Correlation and Cross-Correlation Implementing Situational Awareness Systems Information Security Metrics and Measurements **Web Traffic Characterisation Intrusion Detection Systems Traffic Characterisation Techniques Web Analytics Security Incident Response **Cyber Situational Awareness Frameworks Proactive Defense Strategies Instance-Based Learning Adaptive Neural Logic Human-Assisted Decision Control Human in the Loop Automated Self-Responder **Fusion Centres Tools for Metric Optimisation Visualisation and Digital Analytics Data Mining Filtration, Selection, and Risk-Based Prioritisation Metrics for Evaluation and Assessment **Situational Awareness Applications Situational Awareness in C4ISR Situational Awareness in Cyber Command and Control Centres Situational Awareness in Intrusion Defense Situational Awareness in Cyber Physical Systems (CPS) Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs) Open Source Applications **Designing Cyber Situational Awareness Solutions and Services Functional Requirements for Situation-aware services Non-Functional Requirements for Situation-aware Services and solutions Interface Design Interoperability Dynamism Complexity Performance Automation Realtime Processing **Usefulness of Multisensor Data Fusion Information Data Fusion Sensor Fusion for Security Incident Analysis Security Incident Analysis Data Association & Correlation Security Information Visualisation Data Analytics Security Monitoring Situational Awareness Training Research and development in Situational Awareness Simulation and Testbeds in Cyber Situation Awareness Experimentation & Instrumentation Modelling Knowledge-base Theoretical Underpinnings in Situation Awareness ** Readership/Audience** The primary audience for this journal are industry professionals, scholars, researchers and academia working in this fast evolving and emerging field of discipline. Practitioners and managers working in information technology and information security across all industries would vastly improve their knowledge and understanding of critical human and social aspects of situational awareness and computer network defence, and information security in general. Air space controllers and defence agencies will also find this journal a very helpful and practical resource. **Competing Journals (list of current competition publication)** There are no competing journals in this unique and specialist area, especially those focusing on the application of situation awareness to Cyber Security (CS), Cyber Physical Systems (CPS), and Cyber Anything (CA). **Indices** Academic Search Complete ACM Digital Library CiteULike CiteSeerX Compendex (Elsevier Engineering Index) Computer Science Index DBLP Computer Science Google Scholar Microsoft Academic Search SCOPUS **Frequency of Publication** Bi-annual Journal **Access** All our journals are Open Access. This means they are abide by open access policy. **SUBMISSION DEADLINE** We are always receiving article submissions for future volumes and numbers, please check the submission guidelines on our website. **EDITOR INFORMATION – Academics & Practitioners** **Editor in Chief** Dr. Cyril Onwubiko Chair, Intelligence and Security Assurance E-Security Group, Research Series, London, UK **Associate Editors** Dr. Thomas Owens Senior Lecturer & Director of Quality, Department of Electronic and Computer Engineering, Brunel University, London, UK Professor Frank Wang Head of School / Professor of Future Computing, School of Computing, University of Kent, Canterbury, UK Chair - IEEE Computer Society, IEEE UK & Ireland **Editorial Board Members** Dr. Janne Merete Hagen Norwegian Defence Research Establishment (FFI), NORWAY Dr. Nick Savage Communication Networks and Security Department, University of Portsmouth, UK Dr. Xavier Bellekens Computer Security & Privacy, University of Abertay, Scotland Dr. Matija Stevanovic Wireless Communication Networks (WCN) Section, Department of Electronic Systems, Aalborg University, Denmark Dr. Ciza Thomas Electronics and Communication Department, College of Engineering Trivandrum, INDIA Dr. Subrata Acharya CIS Department, Towson University, USA Professor Stefanos Gritzalis Professor at the Department of Information and Communication Systems, Engineering, University of the Aegean, GREECE Dr. Xinyu Yang Department of Computer Science and Technology, Xi’an Jiaotong University, CHINA Dr Andrew Lenaghan OxCERT, University of Oxford, Oxford, UK |
|