征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), an international refereed conference dedicated to the advancement of the principles, methods and applications of situation awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Critical National Infrastructures (CNI), Cyber Physical Systems (CPS) and Internet of Things (IoTs).

The aim of the CyberSA 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

CyberSA 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.

征稿信息

重要日期

2018-01-26
初稿截稿日期

征稿范围

Original papers are invited on recent advances in Cyber Situation Awareness, Data Analytics and Assessment. The topics in Cyber SA 2018 include but not limited to:

Situation Awareness in Emerging Areas

  • Situation Awareness in Software Defined Networks

  • Security Monitoring, Scale of Things and Limits to Monitoring

  • Block Chain Technology in Security

  • IoT Detection and Software Driven Applications Security

  • Situation Awareness in Mobile Computing

  • Standardisation of Cyber Situation Awareness

  • Search, Triage, Examination and Forensics in Cloud Computing

  • Cyber SA in Chaotic Computing

  • Cyber SA in Large Scale IDS Deployments

  • Cyber SA in Deep Learning

  • Deep Analytics

  • Machine Learning for Cyber Situational Awareness

Situation Awareness Assessments

  • Assessment models and methodologies for Cyber SA

  • Cyber Situation Awareness Evaluation Recommendation

  • Cyber SA Maturity Models and Frameworks

  • Cyber SA for Social Networks

Social Media Analysis

  • Social Network Interaction and Intelligence

  • Web Analytics & Security Incident Response

  • Organised and collaborative Maps and Networks

  • Cyber Behavioural Analytics and Profiling

  • Collaborative Situation Awareness for Decision Making

Collaborative Defense Approach

  • Situation Assessment & Decision Making

  • Defense Strategy for the Enhancement of Situation Awareness

  • Situation Assessment, Resolution and Decision Loop

  • Individual vs. Team SA

  • Group and Team SA

Risk Management, Governance and Compliance

  • Trust, Privacy and Anonymity Issues

  • Digital Forensic Information Analysis

  • Enterprise Information Security Policies, Standards and Procedures

  • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

Cyber Situation Awareness Tools & Techniques

  • Fuzzy Logic

  • Rough Set

  • Artificial Neural Networks

  • Artificial Intelligence

  • Genetic Algorithm

  • Evidence Theory (DST)

  • Bayesian Networks & Set Theory

  • Big Data Analytics

  • Game Theory

  • Graph Theory

Network Situation Awareness

  • Cyber Attack Scenarios

  • Situation-Aware and Context-Aware Network Applications

  • CERTs and CSIRTs

  • Security Event and Information Management

  • Application Security, Audits and Penetration Testing

Human Factor Cognitive

  • Workload

  • Perception

  • Stress

  • Knowledge

  • Training and Expertise

  • Risk Assessment and Decision Making

  • Forecasting and Prediction

  • Operator SA & Team SA

National and Critical Infrastructure Security Issues

  • Information Security

  • Cyber Security

  • Database Security

  • Application Security

  • Law Enforcement and Surveillance

  • Border Protection and Controls

  • Cyber Warfare and Counter Terrorism

Situation Awareness in Military Operations

  • Military Doctrinal in Situation Awareness

  • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)

  • Computer Network Operations

  • Computer Network Defense

  • Mission Awareness, Command and Control

Cyber Situation Analytics

  • Attack Graphs

  • Advanced Security Incident Analysis

  • Sensor Correlation and Cross-Correlation

  • Implementing Situation Awareness Systems

  • Information Security Metrics and Measurements

Cyber Situation Awareness Frameworks

  • Proactive Defense Strategies

  • Instance-Based Learning

  • Adaptive Neural Logic

  • Human-Assisted Decision Control

  • Human in the Loop

  • Automated Self-Responder

Fusion Centres

  • Tools for Metric Optimisation

  • Visualisation and Digital Analytics

  • Data Mining

  • Filtration, Selection, and Risk-Based Prioritisation

  • Metrics for Evaluation and Assessment

  • Usefulness of Multisensor Data Fusion

  • Information Data Fusion

  • Sensor Fusion for Security Incident Analysis

  • Security Incident Analysis

  • Data Association & Correlation

  • Security Information Visualisation

  • Data Analytics

  • Security Monitoring

Situation Awareness Applications

  • Situation Awareness in C4ISR

  • Situation Awareness in Cyber Command and Control Centres

  • Situation Awareness in Intrusion Defense

  • Situation Awareness in Cyber Physical Systems (CPS)

  • Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)

  • Open Source Applications

Cyber Situation Awareness Designs, Solutions and Services

  • Functional Requirements for Situation-aware services

  • Non-Functional Requirements for Situation-aware Services and solutions

  • Interface Design

  • Interoperability

  • Dynamism

  • Complexity

  • Performance

  • Automation

  • Realtime Processing

Situation Awareness Training

  • Research and development in Situation Awareness

  • Simulation and Testbeds in Cyber Situation Awareness

  • Experimentation & Instrumentation

  • Modelling

  • Knowledge-base

  • Theoretical Underpinnings in Situation Awareness

  • Team and Group SA

  • Cyber Situation Awareness Methods, Training and Education

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    06月11日

    2018

    06月12日

    2018

  • 01月26日 2018

    初稿截稿日期

  • 06月12日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询