posted by user: CCDCOE || 4705 views || tracked by 9 users: [display]

CyCon 2013 : 5th International Conference on Cyber Conflict

FacebookTwitterLinkedInGoogle

Link: http://www.cycon.org
 
When Jun 4, 2013 - Jun 7, 2013
Where Tallinn, Estonia
Submission Deadline Nov 1, 2012
Final Version Due Mar 25, 2013
Categories    computer science   computer security   cyber conflict   automated decision making
 

Call For Papers

CyCon 2013 will focus on the technical, strategic and legal implications of using automatic methods to manage cyber conflicts. The conference will be organized along two tracks: a Strategic Track and a Technical Track. Legal aspects will be incorporated in these two tracks.

Strategic Issues

Conceptual Framework of Cyber Conflicts
• Defining cyber conflict, cyber war, cyber attack, cyber weapon, etc.
• (Non-)essentiality and (non-)feasibility of a common terminology
• Cyber attack as an instrument of policy – limits and opportunities
• Economic, political, military and ideological aspects of cyber conflicts
• Integrating cyber operations with other (military, security) operations
• Cyber offence and defence strategies and their relations to conventional warfare
• Tactical, operational and strategic considerations

Concepts for using automatic methods in cyber conflict
• Decision support
• Situational awareness
• Situation prediction
• Automated defences
• Autonomous offensive capabilities
• Ethical, legal and operational risks
• Automation of legal advice
• Application of the basic principles of the Law of Armed Conflict
• Command responsibility

Actors in cyber conflict
• Military (active, reserve), intelligence, law enforcement, mercenaries, commercial entities, volunteers, terrorists, criminals, hacktivists, etc. and their role in cyber conflict
• Artificial (intelligent) agents
• Organizational models, missions and functions
• Identifying, recruiting, training and retaining the cyber workforce
Technical Issues

Automation of Tactical, Operational and Strategic Procedures in Cyber Conflicts
• Cyber conflicts from military, political and system control science perspectives
• Asymmetric warfare in cyber conflicts
• Cyber attacks and counter-attacks
• Cyber conflict situation awareness
• Contingency planning for mission assurance
• Cooperative mission risk management
• Novel intrusion detection and malware analysis techniques
• Anomaly detection methods for network traffic and system log data
• Botnet detection and mitigation

Case Studies, Experiments and Systems
• Real life examples, analyses
• Experimentation, simulation and test environments
• Evaluation criteria, metrics
• Cyber conflicts in space, ground, airborne, naval and underwater operations

Cyber Conflict Models
• Formal models and theoretical foundations of cyber conflicts
• Game-theoretic models
• Biologically inspired models
• Statistical models
• Policy-based management
• AI models
• Self-organization and adaptability in cyber defence
• Information fusion, situation awareness and decision support in cyber conflicts

Reasoning and Attribution in Cyber Conflict
• Attribution process of complex cyber attacks, cyber conflicts and campaigns
• Novel methods for attribution
• Effectiveness of existing attribution methods
• Extending cyber conflict attribution process beyond the cyber domain, including conventional warfare, and human modelling

Targeting and Cyber Attack Impact Assessment
• Mission-critical assets, targets and processes in cyber space
• Cyber attack modelling (distributed cyber-attacks; coordinated multi-party cyber-attacks recursion attacks, cyber-storm attacks, cyber-pranks, hoaxes, etc.)
• Attacker behavioural modelling, motivation, intensions
• Threat detection and predictive modelling in cyber warfare
• Cyber attack impact propagation and assessment on military missions
• Mission impact assessment
• Attack verification
• Predicting, assessing and managing collateral damage

Related Resources

CyCon 2022   14th International Conference on Cyber Conflict: Keep Moving!
GreeNet Symposium - SGNC 2022   11th Symposium on Green Networking and Computing (SGNC 2020)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
MEN 2022   5th International Conference on Mechanical Engineering
SEFM 2022   20th International Conference on Software Engineering and Formal Methods
ACM-Ei/Scopus-ITNLP 2022   2022 2nd International Conference on Information Technology and Natural Language Processing (ITNLP 2022) -EI Compendex
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications