CFP extended: Int’l Symposium on Cyber Warfare, Cyber Defense, & Cyber Security

The International Symposium on Cyber Warfare, Cyber Defense,
& Cyber Security (CSCI-ISCW)
December 13-15, 2018, Las Vegas, USA

Most Recent IEEE Xplore entry:

All accepted papers will be published in the proceedings of the 2018
International Conference on Computational Science and Computational
Intelligence (CSCI: )



You are invited to submit a paper for consideration. All accepted papers
will be published by IEEE CPS (refer to for previous
years’ IEEE Xplore inclusion) in the proceedings of The 2018 International
Conference on Computational Science and Computational Intelligence (CSCI).
Extended versions of selected papers of the conference will also appear
in journals and edited research books (Springer, Elsevier, BMC, …) The
published proceedings can be accessed via IEEE CPS and other Digital


Cyber Warfare adds an additional dimension to warfare. Generally, it
involves the battlespace use and targeting of computers and networks in
warfare. Cyber Warfare strategies include both offensive and defensive
operations pertaining to the threat of cyberattacks, espionage, sabotage,
disruptions to infrastructures, theft of critical information, and
publishing deliberate misinformation (fake news and fabricated news)
spread via traditional media and online social media with the intend to
mislead in order to disrupt the political processes of nations. The
methods and technologies utilized in Cyber Warfare can be countered
using Cyber Defense strategies. Cyber Defense strategies involve the
heavy and targeted use of Cyber Security. Topics of interest include:

– Cyber Warfare Technologies and Strategies
– Cyber Defense Technologies and Strategies
– Authorization Infrastructures
– Autonomous Security Methods
– Novel Biometric Methods
– Cloud Security
– Forensic Technologies
– Cryptography and Formal Methods
– Trapping Technologies
– Data Protection Methods
– Security and Reverse Engineering
– Vulnerability Analysis
– Steganography and Steganalysis
– Identity Management
– Security Policies
– Legislation and Regulatory Approaches for Enhancing Security
– Safe Computing
– Identification and Prevention of Online Scams
– Mobile Protection Techniques
– Security Risk Analysis, Management and Trade-offs
– Identity, Privacy and Trust Management
– Security by Design
– Incident Response Methods
– Cybercrime and Underground Economy – Identification and Prevention
– Detection of Malicious Software
– Novel Security Tools
– Lifecycle Security Management and Identification of the Weakest Links
– Internet Security
– Network Security
– Computer Security
– Prevention of Cyber Attacks on Critical Infrastructures
– Methodologies in Reducing National Vulnerability to Cyber Attacks
– Methods for Minimizing Damage and Recovery Time from Cyber Attacks
– Prevention of Fake and Fabricated News – Media Trust Management
– Cyber Warfare and Attack Prevention during Elections
– Secure Voting Systems
– Securing Electric Power Grids + Smart Grids
– Securing Communication Systems
– Cyber Counter-intelligence
– Tools in Cyber Warfare and Cyber Defense Arsenal
– Innovative Tools for Cyber Defense Technologies
– Cyber Weapons
– Cyber Space and Security
– Threats from Social Media
– Crime and Terrorism
– IT and Countering Violent Extremism
– Global Security
– Data Analytics and Cyber Warfare
– Prevention of Bad Data Injection
– Advanced Persistent Threat (APT) and Prevention
– Data Exfiltration
– Tools for Countering Attacks by Viruses, Worms, Malware, Phishing,
SQL Injection Attack, Cross-Site Scripting, Session Hijacking,
Trojan Horses, Rootkits, Botnets, …
– Security and Social Engineering
– Tools for Countering Logic Bomb, Time Bomb, Distributed
Denial-of-Service Attack, …
– Methodologies to Address System and Data Vulnerabilities
– Novel Patching Techniques
– Next Generation Firewalls
– Intrusion Detection Techniques
– Terrorism Databases and Resources
– Terrorist Networks
– Threat Assessment
– Cyber Vandalism and Defense
– Cyber Security and Terrorism
– Counter-terrorism
– Cyber Tools and Identification of Propaganda
– Security Education and Training


All accepted papers will be published by IEEE CPS:
in the proceedings of The 2018 International Conference on
Computational Science and Computational Intelligence (CSCI’18).

Past CSCI proceedings are indexed into IEEE Xplore Digital Library
and can be accessed via:
Volume I (2014):
Volume II (2014):
Volume (2015):
Volume (2016):
Volume (2017):    Pending (end of September 2018 according to IEEE Xplore management)

Papers should be typeset by using the general typesetting
instructions available at:
(i.e., use of regular Times New Roman, font size of 10, single line
spacing, 2-column format). Authors of accepted papers will later
receive more specific typesetting instructions. All submissions must
be original (papers must not have been previously published or
currently being considered by others for publication). 161115

Submissions must be in either MS doc or pdf formats (6 pages for
Regular Research Papers; 4 pages for Short Papers; 2 pages for
Poster Papers – the number of pages include all figures, tables, and
references). The first page should include:

– Title of the paper.
– Name, affiliation, city, country, and email address of each author
(identify the name of the Contact Author).
– Abstract (about 100 words).
– A maximum of 5 topical keywords that would best represent the work
described in the paper (see the list of topics).
– Write the type of the submission as “Full/Regular Research Papers”,
“Short Papers”, or “Poster Papers”.
– Write “CSCI-ISCW”

The actual paper can start from the first page (space permitting).
Submissions are to be uploaded to the submission/evaluation web site
portal at:


– Full/Regular Research Papers (maximum of 6 pages):
Regular Research Papers should provide detail original research
contributions. They must report new research results that represent
a contribution to the field; sufficient details and support for
the results and conclusions should also be provided. The work
presented in regular papers are expected to be at a stage of
maturity that with some additional work can be published as journal

– Short Papers (maximum of 4 pages):
Short papers report on ongoing research projects. They should provide
overall research methodologies with some results. The work presented
in short papers are expected to be at a stage of maturity that with
some additional work can be published as regular papers.

– Poster Papers (maximum of 2 pages):
Poster papers report on ongoing research projects that are still in
their infancy (i.e., at very early stages). Such papers tend to
provide research methodologies without yet concrete results.


Each paper will be peer-reviewed by 2 to 4 peers (except for papers that
are philosophical in nature – such papers would be considered for panel
discussions.) Confidentiality of submitted material will be maintained.
Papers will be evaluated on the basis of originality, impact, significance,
quality of research, quality of writing, and contribution to conference
program and diversity. Papers whose authors include one or more members
of the program committee will be evaluated using the double-blinded
review process. Authors whose papers are not selected for publication
can submit a rebuttal letter; rebuttals will be evaluated by 4 members
of the Program Committee.


October 24, 2018:     Extended Submission of Papers
(11:59pm US Eastern Time Zone)
Paper submission portal (for evaluation):
Note that authors who have submitted papers in response
to the earlier “Call For Papers” will receive decisions
and status reports by the original announced date.
November 1, 2018:     Notification of acceptance (+/- 2 days)
November 8, 2018:     Final papers & Author Registrations
December 13-15, 2018: The International Symposium on Cyber Warfare, Cyber
Defense, & Cyber Security (CSCI-ISCW)
CSCI-ISCW will be held in conjunction with other
affiliated research events; for more information, see

DEMOGRAPHY HISTORY (based on 2014 through 2017 participation data):

In the past, about 40% of the attendees have been from outside
USA; from 58 nations. 51% of registrants have been from academia,
31% from industry; 17% from government agencies and research labs;
and 1% unknown. The conference has had participants, speakers,
authors affiliated with over 142 different universities; including
many from the top 40 ranked institutions; major IT corporations,
including, Microsoft, Accenture, Google, Apple, Facebook, Oracle,
Amazon, Samsung Electronics, IBM, GE, BAE Systems, Hitachi, NTT,
Intel Corp, BTS Software Solutions, NetApp, Algorkorea Co.,
Paris Saclay, ElderSafe Technologies Inc., METRON (France),
Fraunhofer IKTS (Germany), Wipro Technologies, VNIIEF (Russia),
BTU Cottbus-Senftenberg (Germany), Synchrone Technologies (France),
Bosch Software Systems (Germany), Tata Consultancy Services, …;
major corporations, including, Exxon Mobil, JPMorgan Chase,
Raytheon, PetroChina, GlaxoSmithKline, BCL Technologies, CERENA
Petroleum Group, Aerospace Electronic Technology (China), Max
Planck – Genetics (Germany), Tigard Research Institute, ENGIE
(France), Forschungszentrum Juelich (Germany), Secured Smart
Electric Vehicle (Korea), …; government research agencies and
national laboratories, including, NSF, NIH National Institutes of
Health, US Air Force (multiple research labs), NSA National Security
Agency, Pacific Northwest National Lab, NASA, LLNL, Lawrence
Berkeley National Lab, Los Alamos National Lab, Cold Spring Harbor
Lab, US National Cancer Institute, Swedish Defence Research Agency,
NIST US National Institute of Standards and Technology, U.S.
Geological Survey, US National Library of Medicine, US Air Force
(multiple research labs), SPAWAR Systems Center Pacific, China NSF,
Russian Academy of Sciences, US Navy, Hasso Plattner Institute, US
Army, Korea Internet & Security Agency, Suez Canal Research Center,
Okinawa Bureau (Japan), Canadian Medical Protective Association,
Osong Medical Innovation Foundation (Korea), National Institute of
Informatics (Japan), …; and three Venture Capitalists and nine
Intellectual Property attorneys.


Questions and inquiries should be sent to:
Conference Secretariat:

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s