Cyber SA 2018: International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), June 11-12, 2018, Scotland, UK Scotland Glasgow, UK, June 11-12, 2018 |
Conference website | http://www.c-mric.org/csa2018 |
Submission link | https://easychair.org/conferences/?conf=cybersa2018 |
Abstract registration deadline | February 26, 2018 |
Submission deadline | February 26, 2018 |
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Extended Abstrats
- Full Paper
- Posters will be presented during the conference.
- Industry track is available for discussing and publishing pilot and proof of concepts.
- Work in Progress track is available for preliminary work.
- Research Ideas track is available for ideas in early stages assessment.
- PhD Seminar track is available for discussing and publishing early PhD thesis research.
International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), June 11-12, 2018, Glasgow, Scotland
Theme – Cyber Situational Awareness as a Tool for Analysis and Insight.
Call for Papers
June 11-12, 2018, Glasgow, Scotland
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2018), an international refereed conference dedicated to the advancement of the principles, methods and applications of situation awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Critical National Infrastructures (CNI), Cyber Physical Systems (CPS) and Internet of Things (IoTs).
The aim of the CyberSA 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
CyberSA 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.
The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.
Details
CyberSA 2018 is co-located with other conferences as part of Cyber Science 2018.
- Posters will be presented during the conference.
- Industry track is available for discussing and publishing pilot and proof of concepts.
- Work in Progress track is available for preliminary work.
- Research Ideas track is available for ideas in early stages assessment.
- PhD Seminar track is available for discussing and publishing early PhD thesis research.
Submission Deadline
Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2018.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
Full paper submission should be via Easychair Conference Portal.
Topics of Interest
Original papers are invited on recent advances in Cyber Situation Awareness, Data Analytics and Assessment. The topics in CyberSA 2018 include but not limited to:
Situation Awareness in Emerging Areas
- Situation Awareness in Software Defined Networks
- Security Monitoring, Scale of Things and Limits to Monitoring
- Block Chain Technology in Security
- IoT Detection and Software Driven Applications Security
- Situation Awareness in Mobile Computing
- Standardisation of Cyber Situation Awareness
- Search, Triage, Examination and Forensics in Cloud Computing
- Cyber SA in Chaotic Computing
- Cyber SA in Large Scale IDS Deployments
Situation Awareness Assessments
- Assessment models and methodologies for Cyber SA
- Cyber Situation Awareness Evaluation Recommendation
- Cyber SA Maturity Models and Frameworks
- Cyber SA for Social Networks
Social Media Analysis
- Social Network Interaction and Intelligence
- Web Analytics & Security Incident Response
- Organised and collaborative Maps and Networks
- Cyber Behavioural Analytics and Profiling
- Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
- Situation Assessment & Decision Making
- Defense Strategy for the Enhancement of Situation Awareness
- Situation Assessment, Resolution and Decision Loop
- Individual vs. Team SA
- Group and Team SA
Risk Management, Governance and Compliance
- Trust, Privacy and Anonymity Issues
- Digital Forensic Information Analysis
- Enterprise Information Security Policies, Standards and Procedures
- Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
Cyber Situation Awareness Tools & Techniques
- Fuzzy Logic
- Rough Set
- Artificial Neural Networks
- Artificial Intelligence
- Genetic Algorithm
- Evidence Theory (DST)
- Bayesian Networks & Set Theory
- Big Data Analytics
- Game Theory
- Graph Theory
Network Situation Awareness
- Cyber Attack Scenarios
- Situation-Aware and Context-Aware Network Applications
- CERTs and CSIRTs
- Security Event and Information Management
- Application Security, Audits and Penetration Testing
Human Factor Cognitive
- Workload
- Perception
- Stress
- Knowledge
- Training and Expertise
- Risk Assessment and Decision Making
- Forecasting and Prediction
- Operator SA & Team SA
National and Critical Infrastructure Security Issues
- Information Security
- Cyber Security
- Database Security
- Application Security
- Law Enforcement and Surveillance
- Border Protection and Controls
- Cyber Warfare and Counter Terrorism
Situation Awareness in Military Operations
- Military Doctrinal in Situation Awareness
- C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
- Computer Network Operations
- Computer Network Defense
- Mission Awareness, Command and Control
Cyber Situation Analytics
- Attack Graphs
- Advanced Security Incident Analysis
- Sensor Correlation and Cross-Correlation
- Implementing Situation Awareness Systems
- Information Security Metrics and Measurements
Cyber Situation Awareness Frameworks
- Proactive Defense Strategies
- Instance-Based Learning
- Adaptive Neural Logic
- Human-Assisted Decision Control
- Human in the Loop
- Automated Self-Responder
Fusion Centres
- Tools for Metric Optimisation
- Visualisation and Digital Analytics
- Data Mining
- Filtration, Selection, and Risk-Based Prioritisation
- Metrics for Evaluation and Assessment
- Usefulness of Multisensor Data Fusion
- Information Data Fusion
- Sensor Fusion for Security Incident Analysis
- Security Incident Analysis
- Data Association & Correlation
- Security Information Visualisation
- Data Analytics
- Security Monitoring
Situation Awareness Applications
- Situation Awareness in C4ISR
- Situation Awareness in Cyber Command and Control Centres
- Situation Awareness in Intrusion Defense
- Situation Awareness in Cyber Physical Systems (CPS)
- Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
- Open Source Applications
Cyber Situation Awareness Designs, Solutions and Services
- Functional Requirements for Situation-aware services
- Non-Functional Requirements for Situation-aware Services and solutions
- Interface Design
- Interoperability
- Dynamism
- Complexity
- Performance
- Automation
- Realtime Processing
Situation Awareness Training
- Research and development in Situation Awareness
- Simulation and Testbeds in Cyber Situation Awareness
- Experimentation & Instrumentation
- Modelling
- Knowledge-base
- Theoretical Underpinnings in Situation Awareness
- Team and Group SA
- Cyber Situation Awareness Methods, Training and Education
Best Papers
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.
Previous Conferences
Cyber SA 2017: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, held at the Ampthill and Holborn Suites, De Vere Grand Connaught Rooms, London, UK on 19-20 June 2017
Cyber SA 2016: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, held at the Stranton Suite, Holiday Inn Mayfair, London, UK on 13-14 June 2016
Cyber SA 2015: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, held at the Hotel Russell, Central London, UK on 7-8 June 2015
Committees
Program Committee
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Frank Wang – IEEE, United Kingdom and Ireland
Steering Committee
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Nick Savage – University of Portsmouth, UK
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
Industry Liaison Chairs
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Andrew Lenaghan – Oxford University, UK
- Xavier Bellekens – University of Abertay, Scotland, UK
Publicity Chairs
- Donna O'Shea – Nimbus Centre, Cork Institute of Technology, Ireland
- Sotiris Ioannidis – the Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Phil Legg – University of the West of England, UK
- Kevin Curran - Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
Conference Chairs
- Xavier Bellekens – University of Abertay, Scotland, UK
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
Programme Committee*
- Mansour Alsaleh – Research Fellow at MIT
- Mahmoud Hashem Eiza – Physical Sciences and Computing, University of Central Lancashire, Preston, UK
- Roman Graf – Austrian Institute of Technology (AIT), Austria
- Andrea Cullen - Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK
- Lynsay Shepherd – Abertay University, Scotland, UK
- Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
- Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
- Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
- Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
- Matija Stevanovic – Department of Electronic Systems, Aalborg University, Denmark
- Donna O'Shea – Nimbus Centre, Cork Institute of Technology, Ireland
- Pooneh Bagheri Zadeh - School of Computing, Creative Technologies & Engineering, Leeds Beckett University, Leeds, UK
- Eliana Stavrou - Computing Department, UCLan Cyprus, Larnaca, Cyprus
- Pierre Parrend – ECAM Strasbourg-Europe, France
- Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Jens Myrup Pedersen - University of Aalborg, Denmark
- Marios Anagnostopoulos - University of the Aegean, Greeceb
- Uri Blumenthal - MIT Lincoln Laboratory, MIT, USA
- Ciza Thomas – College of Engineering, India
- Stefanos Gritzalis – University of the Aegean, Greece
- Bechara Al Bouna – Science University, Lebenanon
- Varun Dutt – Indian Institute of Technology Mandi, India
- Cleotilde Gonzalez - Carnegie Mellon University, USA
- Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
- Georgios Kambourakis – University of the Aegean, Greece
- Elisavet Konstantinou – University of the Aegean, Greece
- Kristina Soukupova – Aerospace & Defense Practice, I3CAS, UK
- Panagiotis Trimintzios - Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
- Phil Legg – University of the West of England, UK
- Ashish Choudhari – Southern Illinois University, Carbondale, USA
- Xuan Zhao – Cylance, California, USA
- Huiyu Zhou – Queen’s University Belfast, Belfast, UK
- Vida Ghanaei - KCS Group, London, UK
- Keem Siah Yap – Universiti Tenaga Nasional, Malaysia
- Paolo Falcarin – School of Architecture Computing and Engineering (ACE), University of East London, London, UK
- Petra Leimich – Edinburgh Napier University, Edinburgh, Scotland, UK
More to Follow
Organizing committee
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Frank Wang – IEEE, United Kingdom and Ireland
Steering Committee
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Nick Savage – University of Portsmouth, UK
- Stacy J. Prowell – U.S. Department for Energy (DOE-OE) Cybersecurity for Energy, USA
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
Invited Speakers
Professor Ali Hessami FRSA – Chair, IEEE United Kingdom & Ireland
Professor Hessami is the current Chair of the IEEE United Kingdom and Ireland, and Director of R&G and Innovation at Vega Systems, London, UK. He contributed significant original material to CENELEC WGA10 Report TR-50451 on Allocation of Safety Integrity & largely authored TR-50506-1 standard on the Cross-Acceptance of Signalling Systems. He has chaired CENELEC Committees developing the latest EN50128 & EN50129 revisions. He represents UK on CENELEC & IEC safety systems, hardware & software standards committees whilst also an advisor to IEEE Standards Association on European Policy matters. Ali chairs the SMC Chapter in the UK&RI Section of IEEE. During December 2013, he was appointed as the Member of the Institution of Engineering & Technology (IET-UK) Council and as the Vice Chair of the IEEE in the UK and Ireland. Ali is also policy advisor to the IEEE Standards Association on European standardization and strategy related matters. Ali has now assumed the leadership role of the UK & Ireland IEEE Section from January 2016.
Professor Jens Myrup Pedersen – Aalborg University, Denmark
Jens Myrup Pedersen is Associate Professor at Aalborg University, Denmark. After finishing his M.Sc. in Mathematics and Computer science he did his PhD in the field of network planning, and through close collaboration with Danish ISPs the work developed into focusing on cyber security. Today his research is focusing mainly on security from a network point of view, and includes network-based detection of malicious activity using e.g. machine learning and DNS traffic analysis - still carried out in close collaboration with industrial partners. Together with his students he has been exploring the security weaknesses of a number of embedded and IoT devices, including demonstration of poor security in state-of-the art Industry 4.0 production lines. He is an active player in the development of cyber security educations in Denmark, and is currently leading the work of establishing a Danish National Training Platform. He has a strong interest in internationalisation of education and promotion of collaboration between students across countries and disciplines - an interest that has led to coordination of two Erasmus+ Strategic Partnerships. In addition to his employment at Aalborg University he works as external lecturer at Riga Technical University, Latvia, he is board member in companies related to energy and infrastructure, and he also sits on the board of the Society of Telecommunications within the Danish Society of Engineers.
Dr Onwubiko is Director, Cyber Security Intelligence at Research Series Limited, where he is responsible for directing strategy, IA governance and cyber security. Prior to Research Series, he had worked in the Financial Services, Telecommunication, Health & Government and Public services Sectors. He is experienced in Cyber Security, Security Information and Event Management, Data Fusion, Intrusion Detection Systems and Computer Network Security; and vastly knowledgeable in Information Assurance, Risk Assessment & Management. He holds a PhD in Computer Network Security from Kingston University, London, UK; MSc in Internet Engineering, from University of East London, London, UK, and BSc, first class honours, in Computer Science & Mathematics. He has authored several books including "Security Framework for Attack Detection in Computer Networks" and "Concepts in Numerical Methods.", and edited books such as "Situational Awareness in Computer Network Defense: Principles, Methods & Applications", and Cyber Science 2015 – International Conference on Cyber Situational Awareness, Data Analytics and Assessment. He has over 30 articles published in leading and most prestigious academic journals and conferences.
Professor Frank Wang – School of Computing, University of Kent, UK
Wang is a Professor of Future Computing, and a Fellow of British Computer Society. He serves the High End Computing Panel for Science Foundation Ireland (SFI) and the UK Government EPSRC e-Science Panel. Frank has attracted a number of EC/EPSRC/DTI/Industrial grants, totaling a few million euros. He has been invited to present keynote speeches and other invited talks at Princeton University (USA), Carnegie Mellon University (USA), Oxford University (UK), Edinburgh University (UK), CERN (the European Organization for Nuclear Research, Geneva), Hong Kong University of Science & Technology (Hong Kong), Tsinghua University (Taiwan), Jawaharlal Nehru University (India), Aristotle University (Greece), Helsinki Technology University (Finland), Turkish Government The Ministry of Industry and Commerce, University of Johannesburg (South Africa), Central Philippine University (Philippine), and Princess Sumaya University for Technology (Jordan), etc. Prof Frank Wang is Co-Editor-in-Chief of Encyclopedia of Grid Computing and Co-Editor-in-Chief of International Journal of Grid and High Performance Computing.
Publication
Cyber SA 2018 proceedings will be published in the IEEE Xplore Digital Library
Venue
The conference will be held in Glasgow, Scotland, UK
Central Reservations
email: submission@c-mric.org
All questions about submissions should be emailed to submission@c-mric.org
Sponsors
The conference organisers seek sponsors, patrons and industrial support for the upcoming conference. We have limited and unlimited patronage opportunities available and it is first-come, first-served, your sponsorship will be greatly appreciated! When you sponsor the event, you will:
- Reach out to new and far-reaching audiences of attendees
- Increase worldwide awareness of your organisation, products and services
- Promote your brand and branding image
- Gain access to decision-makers from government, industry and academia
The conference organisers offer a large spectrum of sponsorship and associated benefits:
Levels of Sponsorship and Benefits
PLATINUM
Amount: £15,000
Sponsor benefits:
- Logo at conference web site and link to the sponsor site
- Logo on the cover page of conference proceedings
- Company information, brochures, or other materials distributed to attendees
- Conference banner at the registration desk and session rooms
- Recognition of corporate support role in official pre-Conference Guide
- Half-page ad in the official Conference Proceedings in addition to inclusion of company abstract
- One presentation of choice from a sponsor representative
- Recognition of support on the official conference website
- Conference awards in the name of the sponsor
GOLD
Amount: £10,000
Sponsor benefits:
- Logo at conference web site and link to the sponsor site
- Logo on the cover page of conference proceedings
- Company information, brochures, or other materials distributed to attendees
- Conference banner at the registration desk
- Two waived conference registration fees for sponsor’s representatives
SILVER
Amount: £5,000
Sponsor benefits:
- Logo placement at conference web site
- Logo appearance on cover page of conference proceedings, cover page of conference programme, conference banner, etc.
- Company information, brochures, or other materials distributed to attendees
- One waived conference registration fees for sponsor’s representative
BRONZE
Amount: £1,000
Sponsor benefits:
- Logo placement at conference web site
- One waived conference registration fees for sponsor’s representative
Should your company or organisation be interested in a sponsorship, please feel free to contact us at sponsorship@c-mric.org