ieee.org http://www.c-mric.org/images/conferencenew/cybersa-2015.jpg
(Our apologies if you receive multiple copies of this CFP)
Call for Papers
<http://c-mric.org/index.php/csa2015> International Conference on Cyber
Situational Awareness, Data Analytics and Assessment (
<https://easychair.org/conferences/?conf=cybersa2015> CyberSA 2015)
June 8-9, 2015, London, UK
Website: http://c-mric.org/csa-2015home
We are pleased to invite you to submit a paper to the
<http://c-mric.org/index.php/csa2015> International Conference on Cyber
Situational Awareness, Data Analytics and Assessment (
<https://easychair.org/conferences/?conf=cybersa2015> CyberSA 2015).
IEEE is technical co-sponsor (TCS) of the CyberSA 2015 conference, an
international referred conference dedicated to the advancement of the
principles, methods and applications of situational awareness on Cyber
Systems, Business Information Systems (BIS), Computer Network Defence (CND),
Computer Physical Systems (CPS) and Internet of Things (IoTs).
Deadline for all paper submissions, that is, both full papers and extended
abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations
is 11th March 2015.
The conference proceedings will be submitted for bibliographic indexing and
publishing by the following: IEEE Computer Society Digital Library, IEEE
Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer
Science Index, EI Compendex, Academic Search Complete, CiteULike, Google
Scholar & Microsoft Academic Search.
Details
CyberSA 2015 is co-located with the following conferences, which are part of
<http://c-mric.org/index.php/cs2015> CyberScience 2015:
. <http://c-mric.org/cs-2015home> International Conference on Cyber
Security and Protection of Digital Services (
<https://easychair.org/conferences/?conf=cybersecurity2015> Cyber Security
2015)
. <http://c-mric.org/sm-2015home> International Conference on
Social Media, Wearable and Web Analytics (
<https://easychair.org/conferences/?conf=socialmedia2015> Social Media 2015)
. <http://c-mric.org/ci-2015home> International Conference on Cyber
Incident Response, Coordination, Containment & Control (
<https://easychair.org/conferences/?conf=cyberincident2015> Cyber Incident
2015)
All paper submissions are open!
. For Proof of Concept, Poster, Research Ideas and PhD Seminar
presentations, please submit a 1-page extended abstract using the
<https://easychair.org/conferences/?conf=cybersa2015> Easychair Conference
Site.
. For Full paper submission, Short paper is 4-page and Long paper is
8-page. All full paper submissions should be via
<https://easychair.org/conferences/?conf=cybersa2015> Easychair Conference
Site.
Important Dates
Abstract submissions for Posters, PoC, WIP, Research Ideas & PhD Seminar
March 11, 2015
Full Paper (Short & Long) Submissions
March 11, 2015
Conference Dates
June 8-9, 2015
Topics of Interest
Original papers are invited on recent advances in Cyber Situational
Awareness, Data Analytics and Assessment. The topics in CyberSA 2015 include
but not limited to:
Situational Awareness for Computer Networks Defense
. Computer Network Defense
. Cyber Situation Awareness
. Correlation & Automation
Collaborative Situation Awareness for Decision Making
. Collaborative Defense Approach
. Situation Assessment & Decision Making
Defense Strategy for the Enhancement of Situational Awareness
. Risk Management, Governance and Compliance
. Trust, Privacy and Anonymity Issues
. Digital Forensic Information Analysis
. Enterprise Information Security Policies, Standards and Procedures
. Risks posed by Wireless Networks, including through the use of
Mobile Computing, BYOD, Wearable in CND environment
Cyber Situational Awareness Tools & Techniques
. Fuzzy Logic
. Rough Set
. Artificial Neural Networks
. Artificial Intelligence
. Genetic Algorithm
. Evidence Theory (DST)
. Bayesian Networks & Set Theory
. Big Data Analytics
. Game Theory
. Graph Theory
Network Situational Awareness
. Cyber Attack Scenarios
. Situation-Aware and Context-Aware Network Applications
. CERTs and CSIRTs
. Security Event and Information Management
. Application Security, Audits and Penetration Testing
Web Traffic Characterisation
. Intrusion Detection Systems
. Traffic Characterisation Techniques
. Web Analytics
. Security Incident Response
National and Critical Infrastructure Security Issues
. Information Security
. Cyber Security
. Database Security
. Application Security
. Law Enforcement and Surveillance
. Border Protection and Controls
. Cyber Warfare and Counter Terrorism
Situation Awareness in Military Operations
. Military Doctrinal in Situation Awareness
. C4ISR (Command, Control, Communications, Computers, Intelligence,
Surveillance and Reconnaissance)
. Computer Network Operations
. Computer Network Defense
Analysis of Large-Scale Internet Traffic
. Attack Graphs
. Advanced Security Incident Analysis
. Sensor Correlation and Cross-Correlation
. Implementing Situational Awareness Systems
. Information Security Metrics and Measurements
Human Factor Cognitive
. Workload
. Perception
. Stress
. Knowledge
. Training and Expertise
. Risk Assessment and Decision Making
. Forecasting and Prediction
. Operator SA
. Team SA
Usefulness of Multisensor Data Fusion
. Information Data Fusion
. Sensor Fusion for Security Incident Analysis
. Security Incident Analysis
. Data Association & Correlation
. Security Information Visualisation
. Data Analytics
. Security Monitoring
Fusion Centres
. Tools for Metric Optimisation
. Visualisation and Digital Analytics
. Data Mining
. Filtration, Selection, and Risk-Based Prioritisation
. Metrics for Evaluation and Assessment
Cyber Situational Awareness Frameworks
. Proactive Defense Strategies
. Instance-Based Learning
. Adaptive Neural Logic
. Human-Assisted Decision Control
. Human in the Loop
. Automated Self-Responder
Designing Cyber Situational Awareness Solutions and Services
. Functional Requirements for Situation-aware services
. Non-Functional Requirements for Situation-aware Services and
solutions
. Interface Design
. Interoperability
. Dynamism
. Complexity
. Performance
. Automation
. Realtime Processing
Situational Awareness Applications
. Situational Awareness in C4ISR
. Situational Awareness in Cyber Command and Control Centres
. Situational Awareness in Intrusion Defense
. Situational Awareness in Cyber Physical Systems (CPS)
. Situational Awareness for Internet of Things (IoTs)
. Open Source Applications
Situational Awareness Training
. Research and development in Situational Awareness
. Simulation and Testbeds in Cyber Situation Awareness
. Experimentation & Instrumentation
. Modelling
. Knowledge-base
. Theoretical Underpinnings in Situation Awareness
Best Papers
The best paper of each section will be selected and their author(s) will
receive a corresponding Award Certificate. Authors of the Best 20%-25%
papers presented at the conference will be invited to adapt their papers for
their publication in one of the special issues peer reviewed journals.
SA Journal IJCSET Journal IJSMVA Journal
We look forward to collaborating with you.
Best regards,
On behalf of the CyberSA 2015 - Programme Committee
The Organising Committee
Centre for Multidisciplinary Research, Innovation and Collaboration
(C-MRiC.ORG)
Twitter: @cmricorg
Email: <mailto:[log in to unmask]> [log in to unmask]
Web: <http://www.c-mric.org/> http://www.c-mric.org
Description: C-MRiC.ORG
The Organising Committee
Centre for Multidisciplinary Research, Innovation and Collaboration
(C-MRiC.ORG)
Email: <mailto:[log in to unmask]> [log in to unmask]
Twitter: <https://twitter.com/cmricorg> Follow @cmricorg
Web: <http://www.c-mric.org/> http://www.c-mric.org
C-MRiC.ORG
---
This email has been checked for viruses by Avast antivirus software.
http://www.avast.com
---------------------------------------------------------------
For news of CHI books, courses & software, join CHI-RESOURCES
mailto: [log in to unmask]
To unsubscribe from CHI-ANNOUNCEMENTS send an email to
mailto:[log in to unmask]
For further details of CHI lists see http://listserv.acm.org
---------------------------------------------------------------
|