Cyber SA 2018

June 11-12, 2018, Scotland, UK


BOOK NOW


Theme – Cyber Situational Awareness as a Tool for Analysis and Insight

Pioneering research & innovation in Cyber Situational Awareness

Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), an international refereed conference dedicated to the advancement of the principles, methods and applications of situation awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Critical National Infrastructures (CNI), Cyber Physical Systems (CPS) and Internet of Things (IoTs).

The aim of the CyberSA 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

CyberSA 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.

Details

CyberSA 2018 is co-located with other conferences as part of Cyber Science 2018.

  • Workshop on Cyber Insurance (CIRC) will be presented at the conference.
  • Posters will be presented during the conference.
  • Industry track is available for discussing and publishing pilot and proof of concepts.
  • Work in Progress track is available for preliminary work.
  • Research Ideas track is available for ideas in early stages assessment.
  • PhD Seminar track is available for discussing and publishing early PhD thesis research.



Paper Submission

The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2018.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal.

 

Online Submission

The online submission process is now open!

Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Please also find here the copyright-form, which must be completed for all accepted papers.

Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system.

Submission Instructions

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the IEEE templates that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.


SUBMIT NOW


Topics of Interest


    • Situation Awareness in Software Defined Networks
    • Security Monitoring, Scale of Things and Limits to Monitoring
    • Block Chain Technology in Security
    • IoT Detection and Software Driven Applications Security
    • Situation Awareness in Mobile Computing
    • Standardisation of Cyber Situation Awareness
    • Search, Triage, Examination and Forensics in Cloud Computing
    • Cyber SA in Chaotic Computing
    • Cyber SA in Large Scale IDS Deployments
    • Cyber SA in Deep Learning
    • Cyber SA in Deep Analytics
    • Machine Learning for Cyber Situational Awareness

    • Assessment models and methodologies for Cyber SA
    • Cyber Situation Awareness Evaluation Recommendation
    • Cyber SA Maturity Models and Frameworks
    • Cyber SA for Social Networks

    • Social Network Interaction and Intelligence
    • Web Analytics & Security Incident Response
    • Organised and collaborative Maps and Networks
    • Cyber Behavioural Analytics and Profiling
    • Collaborative Situation Awareness for Decision Making

    • Situation Assessment & Decision Making
    • Defense Strategy for the Enhancement of Situation Awareness
    • Situation Assessment, Resolution and Decision Loop
    • Individual vs. Team SA
    • Group and Team SA

    • Trust, Privacy and Anonymity Issues
    • Digital Forensic Information Analysis
    • Enterprise Information Security Policies, Standards and Procedures
    • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

    • Fuzzy Logic
    • Rough Set
    • Artificial Neural Networks
    • Artificial Intelligence
    • Genetic Algorithm
    • Evidence Theory (DST)
    • Bayesian Networks & Set Theory
    • Big Data Analytics
    • Game Theory
    • Graph Theory

    • Cyber Attack Scenarios
    • Situation-Aware and Context-Aware Network Applications
    • CERTs and CSIRTs
    • Security Event and Information Management
    • Application Security, Audits and Penetration Testing

    • Workload
    • Perception
    • Stress
    • Knowledge
    • Training and Expertise
    • Risk Assessment and Decision Making
    • Forecasting and Prediction
    • Operator SA & Team SA

    • Information Security
    • Cyber Security
    • Database Security
    • Application Security
    • Law Enforcement and Surveillance
    • Border Protection and Controls
    • Cyber Warfare and Counter Terrorism

    • Military Doctrinal in Situation Awareness
    • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
    • Computer Network Operations
    • Computer Network Defense
    • Mission Awareness, Command and Control

    • Attack Graphs
    • Advanced Security Incident Analysis
    • Sensor Correlation and Cross-Correlation
    • Implementing Situation Awareness Systems
    • Information Security Metrics and Measurements

    • Proactive Defense Strategies
    • Instance-Based Learning
    • Adaptive Neural Logic
    • Human-Assisted Decision Control
    • Human in the Loop
    • Automated Self-Responder

    • Tools for Metric Optimisation
    • Visualisation and Digital Analytics
    • Data Mining
    • Filtration, Selection, and Risk-Based Prioritisation
    • Metrics for Evaluation and Assessment
    • Usefulness of Multisensor Data Fusion
    • Information Data Fusion
    • Sensor Fusion for Security Incident Analysis
    • Security Incident Analysis
    • Data Association & Correlation
    • Security Information Visualisation
    • Data Analytics
    • Security Monitoring

    • Situation Awareness in C4ISR
    • Situation Awareness in Cyber Command and Control Centres
    • Situation Awareness in Intrusion Defense
    • Situation Awareness in Cyber Physical Systems (CPS)
    • Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
    • Open Source Applications

    • Functional Requirements for Situation-aware services
    • Non-Functional Requirements for Situation-aware Services and solutions
    • Interface Design
    • Interoperability
    • Dynamism
    • Complexity
    • Performance
    • Automation
    • Realtime Processing

    • Research and development in Situation Awareness
    • Simulation and Testbeds in Cyber Situation Awareness
    • Experimentation & Instrumentation
    • Modelling
    • Knowledge-base
    • Theoretical Underpinnings in Situation Awareness
    • Team and Group SA
    • Cyber Situation Awareness Methods, Training and Education


Speakers

Professor Karen Renaud

Professor Karen Renaud

Professor of Cybersecurity, University of Abertay, Dundee, Scotland
Professor Frank Wang

Professor Frank Wang

School of Computing, University of Kent, UK
Professor Jens Myrup Pedersen

Professor Jens Myrup Pedersen

Aalborg University, Denmark
Dr. Cyril Onwubiko

Dr. Cyril Onwubiko

Cyber Security Intelligence, Research Series Limited, London, UK
Stu Hirst

Stu Hirst

Head of Security Systems & Infrastructure Operations, Capital One


Important Dates


    • Industry (Proof of Concept / Pilot) Submission –   January 26, 2018
    • Extended Abstract (Work in Progress) –  January 26, 2018
    • PhD Seminar Submissions – January 26, 2018
    • Research Ideas – January 26, 2018
    • Poster/Demo Submissions – January 26, 2018
    • Special Track Submissions – January 26, 2018
    • Workshops and Tutorials Submission – January 26, 2018
    • Full Paper Submissions – January 26, 2018
    • Notification of Full Paper/Abstract / Special Track Acceptance/Rejection –  March 26, 2018
    • Camera Ready Paper Due – April 14, 2018
    • Participants Registration – March 26 – April 6, 2018
    • Conference Date –  June 11-12, 2018


Location


The Grand Central Hotel, Glasgow

Scotland
United Kingdom



Registration


BOOK NOW

Programme Committee


    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Frank Wang – IEEE, United Kingdom and Ireland

    • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
    • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
    • Nick Savage – University of Portsmouth, UK
    • Stacy J. Prowell  – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
    • Eckhard Pfluegel  –  Faculty of Science, Engineering and Computing, Kingston University, UK

    • Natalie Coull – University of Abertay, Dundee, Scotland, UK
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Andrew Lenaghan – Oxford University, UK
    • Xavier Bellekens – University of Abertay, Scotland, UK

    • Donna O’Shea – Nimbus Centre, Cork Institute of Technology, Ireland
    • Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
    • Phil Legg – University of the West of England, UK
    • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK

    • Lynsay Shepherd – School of Arts, Media and Computer Games, Abertay University, Dundee, Scotland, UK

    • Xavier Bellekens – University of Abertay, Scotland, UK
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK

    • Gavin Hales – Division of Computing and Maths, School of Arts, Media and Computer Games, University of Abertay, Scotland, UK
    • Ethan Bayne – Digital Forensics and Information Visualisation, University of Abertay, Scotland, UK

    • Arnau Erola – Cyber Security Centre, University of Oxford, Oxford, UK
    • Jassim Happa – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
    • Mansour Alsaleh – Research Fellow at MIT
    • Aunshul Rege – Temple University, Pennsylvania, USA
    • Mahmoud Hashem Eiza – Physical Sciences and Computing, University of Central Lancashire, Preston, UK
    • Roman Graf –  Austrian Institute of Technology (AIT), Austria
    • Andrea Cullen – Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK
    • Lynsay Shepherd – Abertay University, Scotland, UK
    • Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
    • Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
    • Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
    • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
    • Matija Stevanovic – Department of Electronic Systems, Aalborg University, Denmark
    • Donna O’Shea – Nimbus Centre, Cork Institute of Technology, Ireland
    • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
    • Pierre Parrend –  ECAM Strasbourg-Europe, France
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Stacy J. Prowell  – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Marios Anagnostopoulos – University of the Aegean, Greeceb
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Bechara Al Bouna – Science University, Lebenanon
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Cleotilde Gonzalez – Carnegie Mellon University, USA
    • Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
    • Georgios Kambourakis – University of the Aegean, Greece
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Panagiotis Trimintzios – Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
    • Phil Legg – University of the West of England, UK
    • Ashish Choudhari – Southern Illinois University, Carbondale, USA
    • Xuan Zhao – Cylance, California, USA
    • Huiyu Zhou – Queen’s University Belfast, Belfast, UK
    • Vida Ghanaei – KCS Group, London, UK
    • Paolo Falcarin – School of Architecture Computing and Engineering (ACE), University of East London, London, UK
    • Petra Leimich – Edinburgh Napier University, Edinburgh, Scotland, UK


Conference Programme


    Accepted papers will be listed here
    Accepted papers will be listed here
    Accepted papers will be listed here
    Accepted papers will be listed here

Related Conferences:

Social Media 2018

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Social Media, Wearable and Web Analytics (Social Media 2018).

View More

Cyber Security 2018

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018).

View More

Cyber Incident 2018

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2018).

View More


Previous Conferences