![]() |
| |||||||||||||||||
Cyber Science 2026 : International Conference on Cybersecurity, Situational Awareness and Social Media | |||||||||||||||||
Link: https://c-mric.org | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Cyber Science 2026 will be a hybrid event, however, we encourage participant to endeaviour to attend in-person.
The International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2026) is a multidisciplinary conference. It brings academics, researchers, practitioners and participants together to share and discuss new and emerging ideas, concepts and research outcomes. The conference focuses in advancing the principles, methods and applications of cybersecurity, situational awareness and social media. Cyber Science 2026 invites participants to submit original papers that encompass principles, concepts, analysis, design, methods and applications in Cybersecurity, Situational Awareness, Artificial Intelligence, Human Factors, Blockchain Technologies, Cyber Security Education, Social media, Engineering, CIR, & Security Operations Centres. All submitted papers will be independently peer-reviewed, and accepted papers must be registered and presented at the conference in order to be included in the conference proceedings. Topics Cyber Situational Awareness Situational Awareness Assessments Cyber Situational Awareness Tools & Techniques Human Factor Cognitive Situation Awareness in Military Operations Cyber Situational Awareness Frameworks & Fusion Centres Situational Awareness Applications, Design & Operations Cyber Situational Awareness Designs Situational Awareness Training Artificial Intelligence & Robotics Predictive Data Analytics for Situation Awareness Machine Learning for Cyber Situation Awareness Artificial Intelligence for Cyber Situation Awareness Artificial Intelligence & Machine Learning for Cybersecurity Autonomous & Self-driving Self-Healing, Domestic Assistance Autonomous Healthcare and Assistance Industrial Manufacturing Robotics Search and Rescue Operations Human Factor Cognition Workload Perception Stress Knowledge Training and Expertise Risk Assessment and Decision Making, Forecasting and Prediction Operator SA & Team SA Knowledge, Skills and Abilities (KSA) Blockchain Technologies Regulation of Cryptocurrencies Social and Governance (ESG) concerns with Blockchain Technologies Blockchain Applications, in Manufacturing, Banking & Financial Systems, Aviation, Pharmaceuticals, IoT & Publications Blockchain in Defence & Cybersecurity Operations Blockchain & Smart Contracts Blockchain in the Energy Sector & Utilities STEM & Cyber Security Education Cyber Security in childhood education, Code – Teaching Coding for Kids, Teens and Colleges Secure by Code Secure by Design Secure by Default Immersive learning for Cyber Metaverse and Cybersecurity Education Social Media, Wearable and Web Analytics Advances in Social Media Trust and privacy in Social Media Social Medial Big Data Analysis Social Network Analysis Trust and Privacy in Wearable Advances in Web Analytics Web Security, Trust, Privacy Cyber Security App, Web & Mobile Security Wireless & Sensor Network Security Software Coding Security Digital Trust and Reputation Geospatial Intelligence Networks (Centralised, Distributed & Hybrid) Security Standardisation Intrusion Detection Systems Protection of Digital Services Security, Trust, Privacy, Security in Online Gaming Systems Security in e-Government and Electoral Systems Content Security Protection of Public Online Content Distribution Systems Secure practices, processes and procedures in Public Online Services Cryptography & Quantum Computing Cyber Incident Response Cyber Incident Analysis Cyber Incident Correlation and Assessment, Management Forensic Readiness and Investigations Cyber Incident Management Tool, Framework and Methodology Expertise, Skills, Knowledge and Resource Maturity Model and Goal Setting Certification and Accreditation The use of Biometrics to aid Forensic Investigations, speech, audio and voice Recognition for forensics Cross-Domain Analysis, Training, Processes and Procedures, Policy and Standards, Emergency Services Cyber Incident Management Tool, Standardisation, Framework and Methodology. Cyber Operations Security Operations Centre (SOC) Operations Security Operations Centre (SOC) Architecting & Engineering Cyber Threat Detection & Threat hunting Detection Engineering Operational Technology (OT) & Critical Infrastructure Security Green & Sustainable Cyber/IT |
|