posted by organizer: CCDCOE || 8580 views || tracked by 13 users: [display]

CyCon 2014 : 6th International Conference on Cyber Conflict


When Jun 3, 2014 - Jun 6, 2014
Where Tallinn, Estonia
Submission Deadline Oct 1, 2013
Notification Due Nov 1, 2013
Final Version Due Mar 1, 2014
Categories    computer science   security   information technology   strategy

Call For Papers

CyCon 2014 will focus on ‘Active Cyber Defence’. Despite lacking a universal definition, active cyber defence is usually seen as entailing proactive measures that are launched to defend against malicious cyber activities or cyber attacks. Due to the growing dependency on information and communication technologies as well as the increasing sophistication of cyber threats, active cyber defence apparently has become an important issue for both public and private entities. During CyCon 2014 the risks and benefits as well as the technical, strategic and legal implications of (applying) active cyber defence will be discussed.

The conference solicits original unpublished research, applications and experience papers on the following or other topics relevant to active cyber defence:

Conceptual framework of active cyber defence
* (Non-)essentiality and (non-)feasibility of a common terminology regarding active cyber defence
* Active cyber defence classification and categorisation
* Levels of activity of active cyber defence
* Active versus passive cyber defence
* Pre-emptive and preventive defence (detecting, tracing and counter-striking, mitigative and retributive counter-actions)
* Self defence, self help, hot pursuit
* Active cyber defence as an instrument of policy – limits and opportunities
* Active cyber defence and different legal regimes: peacetime and armed conflict
* Active cyber defence and aspects of public international law: e.g., sovereignty, non-intervention, use of force
* Political, military, economic and ideological aspects of active cyber defence
* Integrating active cyber defence operations with other (military, security) operations
* Active cyber defence strategies and their relations to conventional warfare
* Active cyber defence and deterrence (overt, obvious and covert cyber operations)
* The position of international and regional organisations in active cyber defence

Actors in active cyber defence
* Military (active, reserve), government, nation states, intelligence, law enforcement, mercenaries, commercial entities, volunteers, terrorists, criminals, hacktivists, etc. and their role in active cyber defence
* Cooperation between stakeholders within the scope of active defence
* Artificial (intelligent) agents
* Identifying, recruiting, training and retaining the cyber workforce

Tactical, operational and strategic aspects of active cyber defence
* Challenges of active cyber defence from political and military perspectives
* Extended situation awareness and mission monitoring within the scope of active cyber defence
* Means of active cyber defence in asymmetric warfare
* Active cyber defence missions and risk management
* Contingency planning for active cyber defence mission assurance
* Active cyber defence in space, ground, airborne, naval and underwater operations
* Arms control for active cyber defence systems

Technical implementation of active cyber defence
* Intrusion detection and malware analysis techniques from the active defence perspective
* Anomaly detection methods for network traffic and system log data focussing on active defence
* Exploitation and malware spreading techniques
* Botnet detection, infiltration and mitigation
* Counter IDS / counter-counter IDS systems and methods
* System resilience

Targeting in active cyber defence operations
* Mission-critical assets, targets and processes in cyber space
* Active cyber defence and cyber attack modelling (distributed cyber-attacks; coordinated multi-party cyber attacks recursion attacks, cyber storm attacks, cyber pranks, hoaxes, etc.)
* Attacker behavioural modelling, motivation, intensions
* Threat detection and predictive modelling in active cyber defence

Impact of using active cyber defence
* Active cyber defence and cyber attack impact propagation and assessment on military missions
* Mission impact assessment
* Active cyber defence and cyber attack verification
* Benefits of employing active cyber defence
* Economic aspects of employing active cyber defence
* Political, ethical, legal and operational risks
* Active cyber defence and issues of international and national criminal law, human rights law, private law, intellectual property, and telecommunication law, ITU regulations
* Consequences of non-state actor actions in international relations and crisis escalation
* Application of the basic principles of the Law of Armed Conflict
* Collateral damage to third party systems
* Rights and duties of Internet Service Providers

Reasoning and attribution requirements for active cyber defence
* Attribution process of complex cyber-attacks, cyber conflicts and campaigns
* Effectiveness of existing attribution methods
* Novel methods for attribution
* Extending cyber attribution process beyond the cyber domain, including conventional warfare and human modelling
* Forensic investigations of active cyber defence activity

Case studies, experiments and prototype active cyber defence systems
* Analysis of prototype active cyber defence systems;
* Experimentation, simulation, mock-ups and test environments for active cyber defence systems
* Evaluation criteria, definitions and metrics within the scope of active cyber defence
* Real-life cases

Active cyber defence models
* Formal models and theoretical foundations of active cyber defence
* Self-organization and adaptability in cyber defence
* Information fusion, big data management and active cyber defence situation awareness
* Automated decision making / decision support in active

Authors are required to first submit an abstract of the planned paper, which should describe the topic and lay out the main aspects as well as the structure of the research (300-500 words). After a preliminary review and acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review.

Accepted papers will be published in the printed conference proceedings with an ISBN and made digitally available through the conference website.

Submission details, author guidance, copyright transfer form and other practical information will be made available on the conference website at a later date. The anonymised abstracts and manuscripts must be uploaded electronically to, for which an account creation at is required.

Authors of papers accepted for publishing in the conference proceedings are required to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer from and to Lennart Meri Tallinn Airport, accommodation and lunches for the duration of the conference, and participation in social and sightseeing activities, depending on the final programme of the conference. Please note that on case of several authors for one paper, only one author will be offered the travel, accommodation and free entrance to the conference.

Important Dates
Abstract submission 01 October 2013
Full paper 10 January 2014
Notification of Authors 3 March 2014
Final Paper 24 March 2014
CyCon on 3-6 June 2014

Related Resources

CyCon 2022   14th International Conference on Cyber Conflict: Keep Moving!
GreeNet Symposium - SGNC 2022   11th Symposium on Green Networking and Computing (SGNC 2020)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
EI-CFAIS 2022   2022 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2022)
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
SCOM 2022   10th International Conference on Soft Computing
SEFM 2022   20th International Conference on Software Engineering and Formal Methods
ACM-Ei/Scopus-ITNLP 2022   2022 2nd International Conference on Information Technology and Natural Language Processing (ITNLP 2022) -EI Compendex
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi