Cyber Incident 2019: International Conference on Cyber Incident Response, Coordination, Containment & Control University of Oxford Oxford, UK, June 3-4, 2019 |
Conference website | https://www.c-mric.com/ci2019 |
Submission link | https://easychair.org/conferences/?conf=cyberincident2019 |
Abstract registration deadline | February 28, 2019 |
Submission deadline | February 28, 2019 |
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2019)
University of Oxford, UK
June 3-4, 2019
https://www.c-mric.com/ci2019
Theme: Automating Risk Management for Active Defence.
Call for Papers
EEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2019) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.
The aim of the Cyber Incident 2019 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
Submission Guidelines
Paper Submission
The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2019.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
Full paper submission should be via Easychair Conference Portal.
Online Submission
The online submission process is now open!
Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Please also find here the copyright-form, which must be completed for all accepted papers.
Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system.
Submission Instructions
Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the IEEE templates that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2‐page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.
List of Topics
Cyber Incident Response
- Cyber Incident Analysis
- Cyber Incident Triage
- Cyber Incident Correlation and Assessment
- Coordination
- Containment
- Root Cause Analysis (RCA)
- Timeliness
- Handling and Handling Process
- Reporting
- Escalation
- Cyber Incident Management
Decision Control
- Emergence Services
- Preparedness
- Readiness
- Analysis
- Risk Management
- Conditionality
- Proportionality
- Prioritisation
- Decision Making
- Risk-Based Decision
- Human in the Loop
Preparedness & Readiness
- Training
- Processes and Procedures
- Policy and Standards
- Emergency Services
- Chain of Custody
- Forensic Readiness and Investigations
- Cyber Incident Notification and Announcements
- Cyber Incident Management Tool
- Standardisation
- Framework and Methodology
- Expertise, Skills, Knowledge and Resource
- Maturity Model and Goal Setting
- Certification and Accreditation
- Memberships to Cyber Incident Responders, Incident Response Organisation
Forensic Investigation
- Rule-Based Systems
- Expert Systems
- Adaptive Learning Systems
- Predictive Systems
- The use of Biometrics to aid Forensic Investigations
- Speak, audio and voice Recognition for forensics
- Correlation and cross-correlation for Incident Analysis
- Cross-Domain Analysis
- Cross-Channel Incident Analysis
- Multi-domain Analysis
Digital Forensics
- Digital Forensics Principles, Rules and Standards
- Digital Forensic Investigations
- Speak, audio and voice Recognition for forensics
- Chain of Custody
- Mobile Forensics
- Live data and live stream forensics
- Live Imagery Forensics
- Memory Forensics
- Browser and Cache Memory Forensics
Threat & Adversarial Modelling
- Data-Centric System Threat Modelling
- Attack Tree
- Exploits and Attack Modelling
- Attack Vector and Attack Surface
- Risk, Control and Control Objectives
- Analysing Threat Modelling
- Cyber Incident Management
- Business Continuity Plan and Measures
- Root Cause Analysis
- Security Metrics
- Threat Intelligence
Committees
Program Committee
- Hayretdin Bahsi – Center for Digital Forensics and Cyber Security, Tallin University of Technology, Estonia
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Dimitrios Papamartzivanos – University of the Aegean, Greece
- Jens Myrup Pedersen – University of Aalborg, Denmark
- Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
- Marios Anagnostopoulos – University of the Aegean, Greece
- Ciza Thomas – College of Engineering, India
- Stefanos Gritzalis – University of the Aegean, Greece
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Varun Dutt – Indian Institute of Technology Mandi, India
- Georgios Kambourakis – University of the Aegean, Greece
- Pierre Parrend – ECAM Strasbourg-Europe, France
- Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
- Tim D Williams – Cyber Security, London, UK
- Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
-
More to be added …
Organizing committee
- Arnau Erola – Department of Computer Science, University of Oxford, UK
- Virginia Franqueira – Cyber Security, University of Derby, UK
- Fatih Kurugollu – Cyber Security, University of Derby, UK
- Xavier Bellekens – University of Abertay, Dundee, Scotland, UK
- Zeyad Yousif Al-Shibaany – IEEE UK and Ireland, EAO Chair
- Thaddeus Eze – IEEE UK and Ireland YP & Department of Computer Science, University of Chester, UK
- Nazila Fough – IEEE UK and Ireland Young Professionals (IEEE YP) & Robert Gordon University of Aberdeen, Scotland, UK
Publication
Cyber Incident 2019 proceedings will sent to IEEE for consideration for listing in the IEEE Xplore Digital Library.
Venue
The conference will be held at the University of Oxford, UK
Contact
All questions about submissions should be emailed to submission@c-mric.org