Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    CYBERSA 2016 - International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016), June 13-14, 2016, London, UK

    View: 525

    Website http://c-mric.org/csa2016 | Want to Edit it Edit Freely

    Category Cyber Situational Awareness; Group Awareness; Fusion Centres; Data Analytics; Situational Assessment; Situation Management;Cyber SA Training;Incident Response; Forensics; Digital Investigations; Incident Reporting and Management; Forensic Readiness;Control and Countermeasures;Computer Security; Cyber Security; Online Security; Cryptography; Digital Service Protection; HSM; Critical National Infrastructure (CNI); Information Assurance;Business Information Systems (BIS)

    Deadline: February 02, 2016 | Date: June 01, 2016-June 02, 2016

    Venue/Country: London, U.K.

    Updated: 2015-12-18 02:44:08 (GMT+9)

    Call For Papers - CFP

    Theme ? Securing a fast paced & fast changing world through the application of Cyber Situational Awareness

    Call for Papers

    June 13-14, 2016, London, UK

    IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016), an international refereed conference dedicated to the advancement of the principles, methods and applications of situational awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS) and Internet of Things (IoTs).

    The aim of the CyberSA 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

    CyberSA 2016 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

    The conference proceedings will be submitted, and published on bibliographic indexes by the following: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

    Details

    CyberSA 2016 is co-located with other conferences as part of Cyber Science 2016.

    Posters will be presented during the conference.

    Industry track is available for discussing and publishing pilot and proof of concepts.

    Work in Progress track is available for preliminary work.

    Research Ideas track is available for ideas in early stages assessment.

    PhD Seminar track is available for discussing and publishing early PhD thesis research.

    Submission Deadline

    Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.

    All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

    Full paper submission should be via Easychair Conference Portal.

    Topics of Interest

    Original papers are invited on recent advances in Cyber Situational Awareness, Data Analytics and Assessment. The topics in CyberSA 2016 include but not limited to:

    Situational Awareness Assessments

    Assessment models and methodologies for Cyber SA

    Cyber Situation Awareness Evaluation Recommendation

    Cyber SA Maturity Models and Frameworks

    Cyber SA for Social Networks

    Social Media Analysis

    Social Network Interaction and Intelligence

    Web Analytics & Security Incident Response

    Organised and collaborative Maps and Networks

    Cyber Behavioural Analytics and Profiling

    Collaborative Situation Awareness for Decision Making

    Collaborative Defense Approach

    Situation Assessment & Decision Making

    Defense Strategy for the Enhancement of Situational Awareness

    Risk Management, Governance and Compliance

    Trust, Privacy and Anonymity Issues

    Digital Forensic Information Analysis

    Enterprise Information Security Policies, Standards and Procedures

    Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

    Cyber Situational Awareness Tools & Techniques

    Fuzzy Logic

    Rough Set

    Artificial Neural Networks

    Artificial Intelligence

    Genetic Algorithm

    Evidence Theory (DST)

    Bayesian Networks & Set Theory

    Big Data Analytics

    Game Theory

    Graph Theory

    Network Situational Awareness

    Cyber Attack Scenarios

    Situation-Aware and Context-Aware Network Applications

    CERTs and CSIRTs

    Security Event and Information Management

    Application Security, Audits and Penetration Testing

    Human Factor Cognitive

    Workload

    Perception

    Stress

    Knowledge

    Training and Expertise

    Risk Assessment and Decision Making

    Forecasting and Prediction

    Operator SA & Team SA

    National and Critical Infrastructure Security Issues

    Information Security

    Cyber Security

    Database Security

    Application Security

    Law Enforcement and Surveillance

    Border Protection and Controls

    Cyber Warfare and Counter Terrorism

    Situation Awareness in Military Operations

    Military Doctrinal in Situation Awareness

    C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)

    Computer Network Operations

    Computer Network Defense

    Mission Awareness, Command and Control

    Cyber Situational Analytics

    Attack Graphs

    Advanced Security Incident Analysis

    Sensor Correlation and Cross-Correlation

    Implementing Situational Awareness Systems

    Information Security Metrics and Measurements

    Cyber Situational Awareness Frameworks

    Proactive Defense Strategies

    Instance-Based Learning

    Adaptive Neural Logic

    Human-Assisted Decision Control

    Human in the Loop

    Automated Self-Responder

    Fusion Centres

    Tools for Metric Optimisation

    Visualisation and Digital Analytics

    Data Mining

    Filtration, Selection, and Risk-Based Prioritisation

    Metrics for Evaluation and Assessment

    Usefulness of Multisensor Data Fusion

    Information Data Fusion

    Sensor Fusion for Security Incident Analysis

    Security Incident Analysis

    Data Association & Correlation

    Security Information Visualisation

    Data Analytics

    Security Monitoring

    Situational Awareness Applications

    Situational Awareness in C4ISR

    Situational Awareness in Cyber Command and Control Centres

    Situational Awareness in Intrusion Defense

    Situational Awareness in Cyber Physical Systems (CPS)

    Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)

    Open Source Applications

    Cyber Situational Awareness Designs, Solutions and Services

    Functional Requirements for Situation-aware services

    Non-Functional Requirements for Situation-aware Services and solutions

    Interface Design

    Interoperability

    Dynamism

    Complexity

    Performance

    Automation

    Realtime Processing

    Situational Awareness Training

    Research and development in Situational Awareness

    Simulation and Testbeds in Cyber Situation Awareness

    Experimentation & Instrumentation

    Modelling

    Knowledge-base

    Theoretical Underpinnings in Situation Awareness

    Team and Group SA

    Cyber Situational Awareness Methods, Training and Education

    Best Papers

    The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.

    SA Journal


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.