IEEE CPS – Conference on Cyber Warfare, Cyber Defense, & Cyber Security (CSCI-ISCW: Dec. 14-16, 2017, Las Vegas): Paper deadline: Sept. 30

Paper Submission Deadline: September 30, 2017
(11:59pm US Eastern Time Zone)

The International Symposium on Cyber Warfare, Cyber Defense,
& Cyber Security (CSCI-ISCW)

http://americancse.org/events/csci2017/Symposiums/csci-iscw

December 14-16, 2017, Las Vegas, USA

Last Year’s IEEE Xplore entry:
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541
===================================================================

All accepted papers will be published in the proceedings of the 2017
International Conference on Computational Science and Computational
Intelligence (CSCI: http://americancse.org/events/csci2017 )

PUBLISHER:

CPS: https://www.computer.org/web/cs-cps/

Past conference proceedings can be accessed via IEEE Xplore Digital
Library at:
Volume I (2014):  http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
Volume II (2014): http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
Volume (2015):    http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
Volume (2016):    http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541

INVITATION:

You are invited to submit a paper for consideration. All accepted papers
will be published by IEEE CPS (refer to ieeexplore.ieee.org for previous
years’ IEEE Xplore inclusion) in the proceedings of The 2017 International
Conference on Computational Science and Computational Intelligence (CSCI).
Extended versions of selected papers of the conference will also appear
in journals and edited research books (Springer, Elsevier, BMC, …) The
published proceedings can be accessed via IEEE CPS and other Digital
libraries.

SCOPE AND LIST OF TOPICS:

Prologue:
Cyber Warfare adds an additional dimension to warfare. Generally, it
involves the battlespace use and targeting of computers and networks in
warfare. Cyber Warfare strategies include both offensive and defensive
operations pertaining to the threat of cyberattacks, espionage, sabotage,
disruptions to infrastructures, theft of critical information, and
publishing deliberate misinformation (fake news and fabricated news)
spread via traditional media and online social media with the intend to
mislead in order to disrupt the political processes of nations. The
methods and technologies utilized in Cyber Warfare can be countered
using Cyber Defense strategies. Cyber Defense strategies involve the
heavy and targeted use of Cyber Security. Topics of interest include:

– Cyber Warfare Technologies and Strategies
– Cyber Defense Technologies and Strategies
– Authorization Infrastructures
– Autonomous Security Methods
– Novel Biometric Methods
– Cloud Security
– Forensic Technologies
– Cryptography and Formal Methods
– Trapping Technologies
– Data Protection Methods
– Security and Reverse Engineering
– Vulnerability Analysis
– Steganography and Steganalysis
– Identity Management
– Security Policies
– Legislation and Regulatory Approaches for Enhancing Security
– Safe Computing
– Identification and Prevention of Online Scams
– Mobile Protection Techniques
– Security Risk Analysis, Management and Trade-offs
– Identity, Privacy and Trust Management
– Security by Design
– Incident Response Methods
– Cybercrime and Underground Economy – Identification and Prevention
– Detection of Malicious Software
– Novel Security Tools
– Lifecycle Security Management and Identification of the Weakest Links
– Internet Security
– Network Security
– Computer Security
– Prevention of Cyber Attacks on Critical Infrastructures
– Methodologies in Reducing National Vulnerability to Cyber Attacks
– Methods for Minimizing Damage and Recovery Time from Cyber Attacks
– Prevention of Fake and Fabricated News – Media Trust Management
– Cyber Warfare and Attack Prevention during Elections
– Secure Voting Systems
– Securing Electric Power Grids + Smart Grids
– Securing Communication Systems
– Cyber Counter-intelligence
– Tools in Cyber Warfare and Cyber Defense Arsenal
– Innovative Tools for Cyber Defense Technologies
– Cyber Weapons
– Cyber Space and Security
– Threats from Social Media
– Data Analytics and Cyber Warfare
– Prevention of Bad Data Injection
– Advanced Persistent Threat (APT) and Prevention
– Data Exfiltration
– Tools for Countering Attacks by Viruses, Worms, Malware, Phishing,
SQL Injection Attack, Cross-Site Scripting, Session Hijacking,
Trojan Horses, Rootkits, Botnets, …
– Security and Social Engineering
– Tools for Countering Logic Bomb, Time Bomb, Distributed
Denial-of-Service Attack, …
– Methodologies to Address System and Data Vulnerabilities
– Novel Patching Techniques
– Next Generation Firewalls
– Intrusion Detection Techniques
– Cyber Vandalism and Defense
– Cyber Security and Terrorism
– Cyber Tools and Identification of Propaganda

INSTRUCTIONS FOR SUBMISSION OF PAPERS FOR EVALUATION:

All accepted papers will be published by IEEE CPS:
https://www.computer.org/web/cs-cps/
in the proceedings of The 2017 International Conference on
Computational Science and Computational Intelligence (CSCI’17).

Past CSCI proceedings are indexed into IEEE Xplore Digital Library
and can be accessed via:
Volume I (2014):  http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822065
Volume II (2014): http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6822285
Volume (2015):    http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7420813
Volume (2016):    http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7879541

Papers should be typeset by using the general typesetting
instructions available at:
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
(i.e., use of regular Times New Roman, font size of 10, single line
spacing, 2-column format). Authors of accepted papers will later
receive more specific typesetting instructions. All submissions must
be original (papers must not have been previously published or
currently being considered by others for publication).

Submissions must be in either MS doc or pdf formats (6 pages for
Regular Research Papers; 4 pages for Short Papers; 2 pages for
Poster Papers – the number of pages include all figures, tables, and
references). The first page should include:

– Title of the paper.
– Name, affiliation, city, country, and email address of each author
(identify the name of the Contact Author).
– Abstract (about 100 words).
– A maximum of 5 topical keywords that would best represent the work
described in the paper (see the list of topics).
– Write the type of the submission as “Full/Regular Research Papers”,
“Short Papers”, or “Poster Papers”.
– Write “CSCI-ISCW”

The actual paper can start from the first page (space permitting).
Submissions are to be uploaded to the submission/evaluation web site
portal at: http://american-cse.org/

TYPE OF SUBMISSIONS/PAPERS:

– Full/Regular Research Papers (maximum of 6 pages):
Regular Research Papers should provide detail original research
contributions. They must report new research results that represent
a contribution to the field; sufficient details and support for
the results and conclusions should also be provided. The work
presented in regular papers are expected to be at a stage of
maturity that with some additional work can be published as journal
papers.

– Short Papers (maximum of 4 pages):
Short papers report on ongoing research projects. They should provide
overall research methodologies with some results. The work presented
in short papers are expected to be at a stage of maturity that with
some additional work can be published as regular papers.

– Poster Papers (maximum of 2 pages):
Poster papers report on ongoing research projects that are still in
their infancy (i.e., at very early stages). Such papers tend to
provide research methodologies without yet concrete results.

REVIEW PROCESS

Each paper will be peer-reviewed by 2 to 4 peers (except for papers that
are philosophical in nature – such papers would be considered for panel
discussions.) Confidentiality of submitted material will be maintained.
Papers will be evaluated on the basis of originality, impact, significance,
quality of research, quality of writing, and contribution to conference
program and diversity. Papers whose authors include one or more members
of the program committee will be evaluated using the double-blinded
review process. Authors whose papers are not selected for publication
can submit a rebuttal letter; rebuttals will be evaluated by 4 members
of the Program Committee.  161115

DEADLINES – DATES:

September 30, 2017:   (11:59pm US Eastern Time Zone) Submission of Papers
October 19, 2017:     Notification of acceptance (+/- 2 days)
November 01, 2017:    Final papers & Author Registrations
December 14-16, 2017: The International Symposium on Cyber Warfare,
Cyber Defense, & Cyber Security (CSCI-ISCW)
http://americancse.org/events/csci2017/Symposiums/csci-iscw
CSCI-ISCW will be held in conjunction with other
affiliated research events; for more information, see
http://americancse.org/events/csci2017

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s