CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Conference Organising Chairs <[log in to unmask]>
Reply To:
Conference Organising Chairs <[log in to unmask]>
Date:
Sat, 28 Feb 2015 19:28:28 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (445 lines)
 

ieee.org http://www.c-mric.org/images/conferencenew/cybersa-2015.jpg

 

(Our apologies if you receive multiple copies of this CFP)

 

Call for Papers

 

 <http://c-mric.org/index.php/csa2015> International Conference on Cyber
Situational Awareness, Data Analytics and Assessment (
<https://easychair.org/conferences/?conf=cybersa2015> CyberSA 2015)

June 8-9, 2015, London, UK

Website: http://c-mric.org/csa-2015home 

 

We are pleased to invite you to submit a paper to the
<http://c-mric.org/index.php/csa2015> International Conference on Cyber
Situational Awareness, Data Analytics and Assessment (
<https://easychair.org/conferences/?conf=cybersa2015> CyberSA 2015). 

 

IEEE is technical co-sponsor (TCS) of the CyberSA 2015 conference, an
international referred conference dedicated to the advancement of the
principles, methods and applications of situational awareness on Cyber
Systems, Business Information Systems (BIS), Computer Network Defence (CND),
Computer Physical Systems (CPS) and Internet of Things (IoTs).

 

Deadline for all paper submissions, that is, both full papers and extended
abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations
is 11th March 2015.

 

The conference proceedings will be submitted for bibliographic indexing and
publishing by the following: IEEE Computer Society Digital Library, IEEE
Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer
Science Index, EI Compendex, Academic Search Complete, CiteULike, Google
Scholar & Microsoft Academic Search.

 

Details

CyberSA 2015 is co-located with the following conferences, which are part of
<http://c-mric.org/index.php/cs2015> CyberScience 2015:

 

.          <http://c-mric.org/cs-2015home> International Conference on Cyber
Security and Protection of Digital Services (
<https://easychair.org/conferences/?conf=cybersecurity2015> Cyber Security
2015) 

 

.          <http://c-mric.org/sm-2015home> International Conference on
Social Media, Wearable and Web Analytics (
<https://easychair.org/conferences/?conf=socialmedia2015> Social Media 2015)

 

.          <http://c-mric.org/ci-2015home> International Conference on Cyber
Incident Response, Coordination, Containment & Control (
<https://easychair.org/conferences/?conf=cyberincident2015> Cyber Incident
2015)

 

All paper submissions are open! 

.         For Proof of Concept, Poster, Research Ideas and PhD Seminar
presentations, please submit a 1-page extended abstract using the
<https://easychair.org/conferences/?conf=cybersa2015> Easychair Conference
Site.

 

.         For Full paper submission, Short paper is 4-page and Long paper is
8-page. All full paper submissions should be via
<https://easychair.org/conferences/?conf=cybersa2015> Easychair Conference
Site.

 

 

Important Dates 


Abstract submissions for Posters, PoC, WIP, Research Ideas & PhD Seminar 

March 11, 2015


Full Paper (Short & Long) Submissions

March 11, 2015


Conference Dates

June 8-9, 2015

 

Topics of Interest

 

Original papers are invited on recent advances in Cyber Situational
Awareness, Data Analytics and Assessment. The topics in CyberSA 2015 include
but not limited to:

 


Situational Awareness for Computer Networks Defense

.       Computer Network Defense

.       Cyber Situation Awareness

.       Correlation & Automation

Collaborative Situation Awareness for Decision Making

.       Collaborative Defense Approach

.       Situation Assessment & Decision Making


Defense Strategy for the Enhancement of Situational Awareness

.       Risk Management, Governance and Compliance

.       Trust, Privacy and Anonymity Issues

.       Digital Forensic Information Analysis

.       Enterprise Information Security Policies, Standards and Procedures

.       Risks posed by Wireless Networks, including through the use of
Mobile Computing, BYOD, Wearable in CND environment

Cyber Situational Awareness Tools & Techniques

.       Fuzzy Logic

.       Rough Set

.       Artificial Neural Networks

.       Artificial Intelligence

.       Genetic Algorithm

.       Evidence Theory (DST)

.       Bayesian Networks & Set Theory

.       Big Data Analytics

.       Game Theory

.       Graph Theory


Network Situational Awareness

.       Cyber Attack Scenarios

.       Situation-Aware and Context-Aware Network Applications

.       CERTs and CSIRTs

.       Security Event and Information Management

.       Application Security, Audits and Penetration Testing

Web Traffic Characterisation

.       Intrusion Detection Systems

.       Traffic Characterisation Techniques

.       Web Analytics

.       Security Incident Response


National and Critical Infrastructure Security Issues

.       Information Security

.       Cyber Security

.       Database Security

.       Application Security

.       Law Enforcement and Surveillance

.       Border Protection and Controls

.       Cyber Warfare and Counter Terrorism

Situation Awareness in Military Operations

.       Military Doctrinal in Situation Awareness

.       C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)

.       Computer Network Operations

.       Computer Network Defense


Analysis of Large-Scale Internet Traffic

.       Attack Graphs

.       Advanced Security Incident Analysis

.       Sensor Correlation and Cross-Correlation

.       Implementing Situational Awareness Systems

.       Information Security Metrics and Measurements

Human Factor Cognitive

.       Workload

.       Perception

.       Stress

.       Knowledge

.       Training and Expertise

.       Risk Assessment and Decision Making

.       Forecasting and Prediction

.       Operator SA

.       Team SA


Usefulness of Multisensor Data Fusion

.       Information Data Fusion

.       Sensor Fusion for Security Incident Analysis

.       Security Incident Analysis

.       Data Association & Correlation

.       Security Information Visualisation

.       Data Analytics

.       Security Monitoring

Fusion Centres

.       Tools for Metric Optimisation

.       Visualisation and Digital Analytics

.       Data Mining

.       Filtration, Selection, and Risk-Based Prioritisation

.       Metrics for Evaluation and Assessment


Cyber Situational Awareness Frameworks

.       Proactive Defense Strategies

.       Instance-Based Learning

.       Adaptive Neural Logic

.       Human-Assisted Decision Control

.       Human in the Loop

.       Automated Self-Responder

Designing Cyber Situational Awareness Solutions and Services

.       Functional Requirements for Situation-aware services

.       Non-Functional Requirements for Situation-aware Services and
solutions

.       Interface Design

.       Interoperability

.       Dynamism

.       Complexity

.       Performance

.       Automation

.       Realtime Processing


Situational Awareness Applications

.       Situational Awareness in C4ISR

.       Situational Awareness in Cyber Command and Control Centres

.       Situational Awareness in Intrusion Defense

.       Situational Awareness in Cyber Physical Systems (CPS)

.       Situational Awareness for Internet of Things (IoTs)

.       Open Source Applications

Situational Awareness Training

.       Research and development in Situational Awareness

.       Simulation and Testbeds in Cyber Situation Awareness

.       Experimentation & Instrumentation

.       Modelling

.       Knowledge-base

.       Theoretical Underpinnings in Situation Awareness

 

 

Best Papers

The best paper of each section will be selected and their author(s) will
receive a corresponding Award Certificate. Authors of the Best 20%-25%
papers presented at the conference will be invited to adapt their papers for
their publication in one of the special issues peer reviewed journals.

 

SA Journal   IJCSET Journal   IJSMVA Journal

 

We look forward to collaborating with you.

 

Best regards,

On behalf of the CyberSA 2015 - Programme Committee

 

The Organising Committee

Centre for Multidisciplinary Research, Innovation and Collaboration
(C-MRiC.ORG)

 

Twitter: @cmricorg

Email:  <mailto:[log in to unmask]> [log in to unmask]

Web:  <http://www.c-mric.org/> http://www.c-mric.org

 

Description: C-MRiC.ORG

 

 

 

The Organising Committee

Centre for Multidisciplinary Research, Innovation and Collaboration
(C-MRiC.ORG)

Email:  <mailto:[log in to unmask]> [log in to unmask]

 

Twitter:  <https://twitter.com/cmricorg> Follow @cmricorg

 

Web:  <http://www.c-mric.org/> http://www.c-mric.org

C-MRiC.ORG

 

 

 



---
This email has been checked for viruses by Avast antivirus software.
http://www.avast.com

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2