Cyber SA 2017: International Conference on Cyber Situational Awareness, Data Analytics and Assessment Grand Connaught Rooms London, UK, June 19-20, 2017 |
Conference website | http://www.c-mric.org/csa2017 |
Submission link | https://easychair.org/conferences/?conf=cybersa2017 |
Abstract registration deadline | February 28, 2017 |
Submission deadline | April 10, 2017 |
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers describing ...
- Posters describing ...
List of Topics
Theme – Cyber Situation Awareness as a Prism to Understanding Situations in a fast-paced CyberWorld
Call for Papers
June 19-20, 2017, London, UK
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2017), an international refereed conference dedicated to the advancement of the principles, methods and applications of situation awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Critical National Infrastructures (CNI), Cyber Physical Systems (CPS) and Internet of Things (IoTs).
The aim of the CyberSA 2017 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
CyberSA 2017 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.
The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.
Details
CyberSA 2017 is co-located with other conferences as part of Cyber Science 2017.
- Posters will be presented during the conference.
- Industry track is available for discussing and publishing pilot and proof of concepts.
- Work in Progress track is available for preliminary work.
- Research Ideas track is available for ideas in early stages assessment.
- PhD Seminar track is available for discussing and publishing early PhD thesis research.
Submission Deadline
Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 14th January 2017.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
Full paper submission should be via Easychair Conference Portal.
Topics of Interest
Original papers are invited on recent advances in Cyber Situation Awareness, Data Analytics and Assessment. The topics in CyberSA 2017 include but not limited to:
Situation Awareness in Emerging Areas
- Situation Awareness in Software Defined Networks
- Security Monitoring, Scale of Things and Limits to Monitoring
- Block Chain Technology in Security
- IoT Detection and Software Driven Applications Security
- Situation Awareness in Mobile Computing
- Standardisation of Cyber Situation Awareness
- Search, Triage, Examination and Forensics in Cloud Computing
- Cyber SA in Chaotic Computing
- Cyber SA in Large Scale IDS Deployments
Situation Awareness Assessments
- Assessment models and methodologies for Cyber SA
- Cyber Situation Awareness Evaluation Recommendation
- Cyber SA Maturity Models and Frameworks
- Cyber SA for Social Networks
Social Media Analysis
- Social Network Interaction and Intelligence
- Web Analytics & Security Incident Response
- Organised and collaborative Maps and Networks
- Cyber Behavioural Analytics and Profiling
- Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
- Situation Assessment & Decision Making
- Defense Strategy for the Enhancement of Situation Awareness
- Situation Assessment, Resolution and Decision Loop
- Individual vs. Team SA
- Group and Team SA
Risk Management, Governance and Compliance
- Trust, Privacy and Anonymity Issues
- Digital Forensic Information Analysis
- Enterprise Information Security Policies, Standards and Procedures
- Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
Cyber Situation Awareness Tools & Techniques
- Fuzzy Logic
- Rough Set
- Artificial Neural Networks
- Artificial Intelligence
- Genetic Algorithm
- Evidence Theory (DST)
- Bayesian Networks & Set Theory
- Big Data Analytics
- Game Theory
- Graph Theory
Network Situation Awareness
- Cyber Attack Scenarios
- Situation-Aware and Context-Aware Network Applications
- CERTs and CSIRTs
- Security Event and Information Management
- Application Security, Audits and Penetration Testing
Human Factor Cognitive
- Workload
- Perception
- Stress
- Knowledge
- Training and Expertise
- Risk Assessment and Decision Making
- Forecasting and Prediction
- Operator SA & Team SA
National and Critical Infrastructure Security Issues
- Information Security
- Cyber Security
- Database Security
- Application Security
- Law Enforcement and Surveillance
- Border Protection and Controls
- Cyber Warfare and Counter Terrorism
Situation Awareness in Military Operations
- Military Doctrinal in Situation Awareness
- C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
- Computer Network Operations
- Computer Network Defense
- Mission Awareness, Command and Control
Cyber Situation Analytics
- Attack Graphs
- Advanced Security Incident Analysis
- Sensor Correlation and Cross-Correlation
- Implementing Situation Awareness Systems
- Information Security Metrics and Measurements
Cyber Situation Awareness Frameworks
- Proactive Defense Strategies
- Instance-Based Learning
- Adaptive Neural Logic
- Human-Assisted Decision Control
- Human in the Loop
- Automated Self-Responder
Fusion Centres
- Tools for Metric Optimisation
- Visualisation and Digital Analytics
- Data Mining
- Filtration, Selection, and Risk-Based Prioritisation
- Metrics for Evaluation and Assessment
- Usefulness of Multisensor Data Fusion
- Information Data Fusion
- Sensor Fusion for Security Incident Analysis
- Security Incident Analysis
- Data Association & Correlation
- Security Information Visualisation
- Data Analytics
- Security Monitoring
Situation Awareness Applications
- Situation Awareness in C4ISR
- Situation Awareness in Cyber Command and Control Centres
- Situation Awareness in Intrusion Defense
- Situation Awareness in Cyber Physical Systems (CPS)
- Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
- Open Source Applications
Cyber Situation Awareness Designs, Solutions and Services
- Functional Requirements for Situation-aware services
- Non-Functional Requirements for Situation-aware Services and solutions
- Interface Design
- Interoperability
- Dynamism
- Complexity
- Performance
- Automation
- Realtime Processing
Situation Awareness Training
- Research and development in Situation Awareness
- Simulation and Testbeds in Cyber Situation Awareness
- Experimentation & Instrumentation
- Modelling
- Knowledge-base
- Theoretical Underpinnings in Situation Awareness
- Team and Group SA
- Cyber Situation Awareness Methods, Training and Education
Best Papers
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.
Previous Conferences
Cyber SA 2016: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, held at the Stranton Suite, Holiday Inn Mayfair, London, UK on 13-14 June 2016
Cyber SA 2015: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, held at the Hotel Russell, Central London, UK on 7-8 June 2015
Committees
Program Committee
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Thomas Owens – Brunel University, London, UK
Steering Committee
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Nick Savage – University of Portsmouth, UK
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
Industry Liaison Chairs
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
- Andrew Lenaghan – Oxford University, UK
- Xavier Bellekens – University of Abertay, Scotland, UK
Publicity Chairs
- Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
- Daniel Zeng – University of Arizona, USA
- Donna O'Shea – Nimbus Centre, Cork Institute of Technology, Ireland
- Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Phil Legg – University of the West of England, UK
- Kevin Curran - Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
Conference Chairs
- Xavier Bellekens – University of Abertay, Scotland, UK
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
Programme Committee*
- Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
- Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
- Lai Bun Lok – IEEE UK & Ireland, IEEE
- Matthew Gream – IEEE UK & Ireland, IEEE
- Richard Hill – Department of Computing and Mathematics, University of Derby, Derby, UK
- Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
- Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
- Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
- Matija Stevanovic – Department of Electronic Systems, Aalborg University, Denmark
- Donna O'Shea – Nimbus Centre, Cork Institute of Technology, Ireland
- Pooneh Bagheri Zadeh - School of Computing, Creative Technologies & Engineering, Leeds Beckett University, Leeds, UK
- Peter Komisarczuk – Royal Holloway, University of London, London, UK
- Mona Ghassemian – IEEE UK and Ireland, London, UK
- Eliana Stavrou - Computing Department, UCLan Cyprus, Larnaca, Cyprus
- Reza Montasari - Computing and Mathematics, University of Derby, Derby, UK
- Pierre Parrend – ECAM Strasbourg-Europe, France
- Abdullahi Arabo – University of the West of England (UWE), Bristol, UK
- Veena Desai – Gogte Institute of Technology, Belgaum, India
- Azah Norman – University of Malaya, Kuala Lumpur, Malaysia
- Theo Dimitrakos – Security Futures Practice, BT Research & Technology, UK
- Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
- Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
- Sen Soori – VSB-The Technical University of Ostrava, The Czech Republic
- Liam Meany – School of Electronic Engineering, Dublin City University, Ireland
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Anthony Davies – Life Member, IEEE UK & Republic of Ireland, IEEE
- Thomas Owens – Brunel University, London, UK
- Jens Myrup Pedersen - University of Aalborg, Denmark
- Reza Tadayoni – University of Aalborg, Denmark
- Andrew Lenaghan – Oxford University, UK
- Subrata Acharya - Towson University, USA
- Marios Anagnostopoulos - University of the Aegean, Greeceb
- Yi Luo - Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA
- Erik Blasch - Fusion Evaluation & Air Force Research Laboratory, USA
- Genshe Chen - Fusion, USA
- Wei Yu – Towson University, USA
- Uri Blumenthal - MIT Lincoln Laboratory, MIT, USA
- Ciza Thomas – College of Engineering, India
- Stefanos Gritzalis – University of the Aegean, Greece
- Bechara Al Bouna – Science University, Lebenanon
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Varun Dutt – Indian Institute of Technology Mandi, India
- Cleotilde Gonzalez - Carnegie Mellon University, USA
- Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
- Xinyu Yang - Xi’an Jiaotong University, China
- Jie Lin – Xi’an Jiaotong University, China
- Georgios Kambourakis – University of the Aegean, Greece
- Elisavet Konstantinou – University of the Aegean, Greece
- Jeffrey Voas – National Institute of Standards and Technology (NIST), Gaithersburg, USA
- Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
- Manish Gupta – State University of New York, Buffalo, NY, USA
- Yuan Gu – Cloakware Advanced Research Center, Irdeto, China
- Kristina Soukupova – Aerospace & Defense Practice, I3CAS, UK
- Panagiotis Trimintzios - Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
- Phil Legg – University of the West of England, UK
- Nilay Mistry – Gujarat Forensic Sciences University, India
- Laribi Boualem – University of Djillali Bounaama, Algeria
- Ashish Choudhari – Southern Illinois University, Carbondale, USA
- Moi Hoon Yap – Manchester Metropolitan University, Manchester, UK
- Xuan Zhao – Cylance, California, USA
- Huiyu Zhou – Queen’s University Belfast, Belfast, UK
- Vida Ghanaei - KCS Group, London, UK
- Keem Siah Yap – Universiti Tenaga Nasional, Malaysia
- Paolo Falcarin – School of Architecture Computing and Engineering (ACE), University of East London, London, UK
- Petra Leimich – Edinburgh Napier University, Edinburgh, Scotland, UK
Organizing committee
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Thomas Owens – Brunel University, London, UK
Steering Committee
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Nick Savage – University of Portsmouth, UK
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
Invited Speakers
Professor Ali Hessami FRSA – Chair, IEEE United Kingdom & Ireland
Professor Hessami is the current Chair of the IEEE United Kingdom and Ireland, and Director of R&G and Innovation at Vega Systems, London, UK. He contributed significant original material to CENELEC WGA10 Report TR-50451 on Allocation of Safety Integrity & largely authored TR-50506-1 standard on the Cross-Acceptance of Signalling Systems. He has chaired CENELEC Committees developing the latest EN50128 & EN50129 revisions. He represents UK on CENELEC & IEC safety systems, hardware & software standards committees whilst also an advisor to IEEE Standards Association on European Policy matters. Ali chairs the SMC Chapter in the UK&RI Section of IEEE. During December 2013, he was appointed as the Member of the Institution of Engineering & Technology (IET-UK) Council and as the Vice Chair of the IEEE in the UK and Ireland. Ali is also policy advisor to the IEEE Standards Association on European standardization and strategy related matters. Ali has now assumed the leadership role of the UK & Ireland IEEE Section from January 2016.
Dr. Kevin Curran – Computer Science, Ulster University, Northern Ireland, UK
Dr. Curran BSc (Hons), PhD, SMIEEE, FBCS CITP, FHEA is a Reader in Computer Science at Ulster University and group leader for the Ambient Intelligence & Virtual Worlds Research Group. His achievements include winning and managing UK & European Framework projects and Technology Transfer Schemes. Dr Curran has made significant contributions to advancing the knowledge and understanding of computer networking and systems, evidenced by over 800 published works. He is perhaps most well-known for his work on location positioning within indoor environments and Internet security. His expertise has been acknowledged by invitations to present his work at international conferences, overseas universities and research laboratories. He is a regular contributor to print, online, radio & TV news on computing & security issues. He was the recipient of an Engineering and Technology Board Visiting Lectureship for Exceptional Engineers and is an IEEE Technical Expert for Internet/Security matters since 2008. He currently holds a Royal Academy of Engineering/Leverhulme Trust Senior Research Fellowship awarded in 2016. Dr. Curran’s stature and authority in the international community is demonstrated by his influence, particularly in relation to the direction of research in computer science. He has chaired sessions and participated in the organising committees for many highly-respected international conferences and workshops. He was the founding Editor in Chief of the International Journal of Ambient Computing and Intelligence and is also a member of numerous Journal Editorial boards and international conference organising committees. He has authored a number of books and is the recipient of various patents. He has served as an advisor to the British Computer Society in regard to the computer industry standards and is a member of BCS and IEEE Technology Specialist Groups and various other professional bodies.
Dr. Eckhard Pfluegel – Science, Engineering & Computing, Kingston University, London, UK
Dr Pfluegel obtained a Ph.D. in Computer Science at Université Joseph Fourier, Grenoble (France) in 1999 after graduating with a First Class degree ("Diplom") in Computer Science (Equivalent of UK Honours and Master's degree) in 1999 at Universität Karlsruhe (now known as KIT), Karlsruhe (Germany). An experienced Senior Lecturer with 3 years of industrial practice in software engineering and over 13 years of research expertise, teaching responsibilities and professional practice, his current main area of specialism is network and cyber security. He has an active and continuous portfolio of over 40 peer-reviewed international journal and conference publications, serves as member of several technical programme committees and regularly reviews for international journals. Dr Pfluegel is leading an educational programme in cyber and network security at postgraduate level and frequently gives public lectures and talks on the topic of cyber and computer security awareness. He particularly enjoys research-informed teaching in order to bring in cutting-edge knowledge from his research into his lectures.
Dr. Cyril Onwubiko – Cyber Security Intelligence, Research Series Limited, London, UK
Dr Onwubiko is Director, Cyber Security Intelligence at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. Prior to Research Series, he had worked in the Financial Services, Telecommunication, Health & Government and Public services Sectors. He is experienced in Cyber Security, Security Information and Event Management, Data Fusion, Intrusion Detection Systems and Computer Network Security; and vastly knowledgeable in Information Assurance, Risk Assessment & Management. He holds a PhD in Computer Network Security from Kingston University, London, UK; MSc in Internet Engineering, from University of East London, London, UK, and BSc, first class honours, in Computer Science & Mathematics. He has authored several books including "Security Framework for Attack Detection in Computer Networks" and "Concepts in Numerical Methods.", and edited books such as "Situational Awareness in Computer Network Defense: Principles, Methods & Applications", and Cyber Science 2015 – International Conference on Cyber Situational Awareness, Data Analytics and Assessment. He has over 30 articles published in leading and most prestigious academic journals and conferences.
Professor Frank Wang – School of Computing, University of Kent, UK
Prof Wang is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.
Dr. Andrew Lenaghan – The Oxford University CERT (OxCERT), Oxford, UK
Dr Lenaghan is a Computer Security Specialist at OxCERT (the Oxford University CERT), a member of the Information Systems Audit and Control Association (ISACA). Andrew holds degrees in Computer Science, Human computer interaction (Lond.) and has a doctorate in computer vision and pattern recognition from Kingston University.
Dr. Janne Hagen – Norwegian Water Resources and Energy Directorate (NVE), Norway
Dr. Janne Hagen, from April employed at the Norwegian Water Resources and Energy Directorate (NVE), has worked as researcher and consultant, most of the time employed at the Norwegian Defence Research Establishment (FFI) conducting research on societal security and protection of critical infrastructures. Since 2005 her scientific work turned towards cybersecurity, the last years covering information operations, strategic communication and the vulnerability of the digital society. She holds an associate professor position at the University of Stavanger. She has been member of several expert groups in Norway, including the Norwegian Governmental Committee of Digital Vulnerabilities in Society that delivered an Official Norwegian Report (NOU) to the Ministry of Justice and Public Security in November 2015.
Publication
Cyber SA 2017 proceedings will be published in the IEEE Xplore Digital Library
Venue
The conference will be held at
The Cyber Security 2017 will be held at the Grand Connaught Rooms, London, UK.
Address
Ampthill Suite
De Vere Grand Connaught Rooms
Central London
61-65 Great Queen Street
London WC2B 5DA
United Kingdom
Central Reservations
Telephone: +44 (0) 20 7269 1854
Web: http://www.phcompany.com/de-vere/grand-connaught-rooms
Event Manager Contact
Alexandra Otto
Conference & Events Co-ordinator
De Vere Grand Connaught Rooms
Tel: +44 (0) 20 7269 1854 Fax: +44 (0) 20 7831 1851
61-65 Great Queen Street, London WC2B 5DA
W: www.phcompany.com/de-vere/grand-connaught-rooms
Contact
All questions about submissions should be emailed to submission@c-mric.org