CYBERSA 2016 - International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2016), June 13-14, 2016, London, UK
View: 525
Website http://c-mric.org/csa2016 |
Edit Freely
Category Cyber Situational Awareness; Group Awareness; Fusion Centres; Data Analytics; Situational Assessment; Situation Management;Cyber SA Training;Incident Response; Forensics; Digital Investigations; Incident Reporting and Management; Forensic Readiness;Control and Countermeasures;Computer Security; Cyber Security; Online Security; Cryptography; Digital Service Protection; HSM; Critical National Infrastructure (CNI); Information Assurance;Business Information Systems (BIS)
Deadline: February 02, 2016 | Date: June 01, 2016-June 02, 2016
Venue/Country: London, U.K.
Updated: 2015-12-18 02:44:08 (GMT+9)
Call For Papers - CFP
Theme ? Securing a fast paced & fast changing world through the application of Cyber Situational AwarenessCall for PapersJune 13-14, 2016, London, UKIEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016), an international refereed conference dedicated to the advancement of the principles, methods and applications of situational awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS) and Internet of Things (IoTs).The aim of the CyberSA 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.CyberSA 2016 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.The conference proceedings will be submitted, and published on bibliographic indexes by the following: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.DetailsCyberSA 2016 is co-located with other conferences as part of Cyber Science 2016.Posters will be presented during the conference.Industry track is available for discussing and publishing pilot and proof of concepts.Work in Progress track is available for preliminary work.Research Ideas track is available for ideas in early stages assessment.PhD Seminar track is available for discussing and publishing early PhD thesis research.Submission DeadlineDeadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th February 2016.All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.Full paper submission should be via Easychair Conference Portal.Topics of InterestOriginal papers are invited on recent advances in Cyber Situational Awareness, Data Analytics and Assessment. The topics in CyberSA 2016 include but not limited to:Situational Awareness AssessmentsAssessment models and methodologies for Cyber SACyber Situation Awareness Evaluation RecommendationCyber SA Maturity Models and FrameworksCyber SA for Social NetworksSocial Media AnalysisSocial Network Interaction and IntelligenceWeb Analytics & Security Incident ResponseOrganised and collaborative Maps and NetworksCyber Behavioural Analytics and ProfilingCollaborative Situation Awareness for Decision MakingCollaborative Defense ApproachSituation Assessment & Decision MakingDefense Strategy for the Enhancement of Situational AwarenessRisk Management, Governance and ComplianceTrust, Privacy and Anonymity IssuesDigital Forensic Information AnalysisEnterprise Information Security Policies, Standards and ProceduresRisks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environmentCyber Situational Awareness Tools & TechniquesFuzzy LogicRough SetArtificial Neural NetworksArtificial IntelligenceGenetic AlgorithmEvidence Theory (DST)Bayesian Networks & Set TheoryBig Data AnalyticsGame TheoryGraph TheoryNetwork Situational AwarenessCyber Attack ScenariosSituation-Aware and Context-Aware Network ApplicationsCERTs and CSIRTsSecurity Event and Information ManagementApplication Security, Audits and Penetration TestingHuman Factor CognitiveWorkloadPerceptionStressKnowledgeTraining and ExpertiseRisk Assessment and Decision MakingForecasting and PredictionOperator SA & Team SANational and Critical Infrastructure Security IssuesInformation SecurityCyber SecurityDatabase SecurityApplication SecurityLaw Enforcement and SurveillanceBorder Protection and ControlsCyber Warfare and Counter TerrorismSituation Awareness in Military OperationsMilitary Doctrinal in Situation AwarenessC4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)Computer Network OperationsComputer Network DefenseMission Awareness, Command and ControlCyber Situational AnalyticsAttack GraphsAdvanced Security Incident AnalysisSensor Correlation and Cross-CorrelationImplementing Situational Awareness SystemsInformation Security Metrics and MeasurementsCyber Situational Awareness FrameworksProactive Defense StrategiesInstance-Based LearningAdaptive Neural LogicHuman-Assisted Decision ControlHuman in the LoopAutomated Self-ResponderFusion CentresTools for Metric OptimisationVisualisation and Digital AnalyticsData MiningFiltration, Selection, and Risk-Based PrioritisationMetrics for Evaluation and AssessmentUsefulness of Multisensor Data FusionInformation Data FusionSensor Fusion for Security Incident AnalysisSecurity Incident AnalysisData Association & CorrelationSecurity Information VisualisationData AnalyticsSecurity MonitoringSituational Awareness ApplicationsSituational Awareness in C4ISRSituational Awareness in Cyber Command and Control CentresSituational Awareness in Intrusion DefenseSituational Awareness in Cyber Physical Systems (CPS)Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)Open Source ApplicationsCyber Situational Awareness Designs, Solutions and ServicesFunctional Requirements for Situation-aware servicesNon-Functional Requirements for Situation-aware Services and solutionsInterface DesignInteroperabilityDynamismComplexityPerformanceAutomationRealtime ProcessingSituational Awareness TrainingResearch and development in Situational AwarenessSimulation and Testbeds in Cyber Situation AwarenessExperimentation & InstrumentationModellingKnowledge-baseTheoretical Underpinnings in Situation AwarenessTeam and Group SACyber Situational Awareness Methods, Training and EducationBest PapersThe best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.SA Journal
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.