posted by organizer: conwubiko || 326 views || tracked by 1 users: [display]

CyberSA 2015 : The International Conference on Cyber Situational Awareness, Data Analytics and Assessment

FacebookTwitterLinkedInGoogle

Link: http://c-mric.org/index.php/conferences
 
When Jun 8, 2015 - Jun 9, 2015
Where London, UK
Abstract Registration Due Jan 15, 2015
Submission Deadline Feb 25, 2015
Notification Due Mar 25, 2015
Final Version Due Apr 10, 2015
Categories    cyber security   cyber situational awareness   computer network defense   internet of things (iot)
 

Call For Papers

The International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2015) is an international referred conference dedicated to the advancement of the principles, methods and applications of situational awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS) and Internet of Things (IoTs).

The aim of the CyberSA 2015 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

CyberSA 2015 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

Details
CyberSA 2015 is co-located with other conferences part of Cyber Science 2015.

Posters will be presented during the conference.
Industry track is available for discussing and publishing pilot and proof of concepts.
Work in Progress track is available for preliminary work.
Research Ideas track is available for ideas in early stages assessment.
PhD Seminar track is available for discussing and publishing early PhD thesis research.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please email your proposal to submission@C-MRIC.org

Full paper submission should be via Easychair Conference Site

Submission Instructions - Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the conference web site. Submission file formats are PDF and Microsoft Word using the C-MRiC Word/PDF templates that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster/Industry track/WIP/PhD Seminar and/or demo may submit a 1‐page extended abstract, which, if accepted, will appear in the conference proceedings.

Topics of Interest
Original papers are invited on recent advances in Cyber Situational Awareness, Data Analytics and Assessment. The topics in CyberSA 2015 include, but are not limited to:

Situational Awareness for Computer Networks Defense
Computer Network Defense
Cyber Situation Awareness
Correlation & Automation

Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
Situation Assessment & Decision Making
Defense Strategy for the Enhancement of Situational Awareness
Risk Management, Governance and Compliance
Trust, Privacy and Anonymity Issues
Digital Forensic Information Analysis
Enterprise Information Security Policies, Standards and Procedures
Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

Cyber Situational Awareness Tools & Techniques
Fuzzy Logic
Rough Set
Artificial Neural Networks
Artificial Intelligence
Genetic Algorithm
Evidence Theory (DST)
Bayesian Networks & Set Theory
Big Data Analytics
Game Theory
Graph Theory

Situation Awareness in Military Operations
Military Doctrinal in Situation Awareness
C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
Computer Network Operations
Computer Network Defense

Web Traffic Characterisation
Intrusion Detection Systems
Traffic Characterisation Techniques
Web Analytics
Security Incident Response

National and Critical Infrastructure Security Issues
Information Security
Cyber Security
Database Security
Application Security
Law Enforcement and Surveillance
Border Protection and Controls
Cyber Warfare and Counter Terrorism

Network Situational Awareness
Cyber Attack Scenarios
Situation-Aware and Context-Aware Network Applications
CERTs and CSIRTs
Security Event and Information Management
Application Security, Audits and Penetration Testing

Analysis of Large-Scale Internet Traffic
Attack Graphs
Advanced Security Incident Analysis
Sensor Correlation and Cross-Correlation
Implementing Situational Awareness Systems
Information Security Metrics and Measurements

Human Factor Cognitive
Workload
Perception
Stress
Knowledge
Training and Expertise
Risk Assessment and Decision Making
Forecasting and Prediction
Operator SA
Team SA

Usefulness of Multisensor Data Fusion
Information Data Fusion
Sensor Fusion for Security Incident Analysis
Security Incident Analysis
Data Association & Correlation
Security Information Visualisation
Data Analytics
Security Monitoring

Fusion Centres
Tools for Metric Optimisation
Visualisation and Digital Analytics
Data Mining
Filtration, Selection, and Risk-Based Prioritisation
Metrics for Evaluation and Assessment

Situational Awareness Applications
Situational Awareness in C4ISR
Situational Awareness in Cyber Command and Control Centres
Situational Awareness in Intrusion Defense
Situational Awareness in Cyber Physical Systems (CPS)
Situational Awareness for Internet of Things (IoTs)
Open Source Applications

Designing Cyber Situational Awareness Solutions and Services
Functional Requirements for Situation-aware services
Non-Functional Requirements for Situation-aware Services and solutions
Interface Design
Interoperability
Dynamism
Complexity
Performance
Automation
Realtime Processing

Cyber Situational Awareness Frameworks
Proactive Defense Strategies
Instance-Based Learning
Adaptive Neural Logic
Human-Assisted Decision Control
Human in the Loop
Automated Self-Responder

Situational Awareness Training
Research and development in Situational Awareness
Simulation and Testbeds in Cyber Situation Awareness
Experimentation & Instrumentation
Modelling
Knowledge-base
Theoretical Underpinnings in Situation Awareness

Best Papers
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate.

Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.


Contact details: submission@c-mric.org
Website: www.c-mric.org

Related Resources

VSI-HFCS 2024   Computer Standards & Interfaces Special Issue 2024 - Human Factors in Cyber Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
AMLDS 2025   2025 International Conference on Advanced Machine Learning and Data Science
IJCI 2024   Call for Conference Proceedings - International Journal on Cybernetics & Informatics
AASDS 2024   Special Issue on Applications and Analysis of Statistics and Data Science
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
DRIJ 2024   Dental Research: An International Journal