posted by user: CCDCOE || 2763 views || tracked by 2 users: [display]

CyCon 2015 : International Conference on Cyber Conflict


When May 25, 2015 - May 29, 2015
Where Tallinn, Estonia
Submission Deadline Oct 1, 2014
Notification Due Oct 31, 2014
Final Version Due May 1, 2015
Categories    cyber   virtualisation   standards   conflict

Call For Papers

The 7th International Conference on Cyber Conflict (CyCon 2015) will focus on the construction of the Internet and its potential future development. 40 years ago, the main principles and foundations for the Internet were laid, and they have been used ever since. The “net” has been a tremendous success story and today it is much more than just a commodity. Looking at the figures (2.5 billion users today, 50 billion devices connected in 2020), one would think of the overwhelming influence that these technologies have and that we are only looking at the beginning of a revolution.
Can the structures that we rely upon support the increasing demand and the different ways in which we want to use it? Human behaviours have changed, international politics has changed and our relationship to machines has changed. Therefore, this year’s topic, “Architectures in Cyberspace,” aims to approach what cyberspace is and will
be in the coming years and to identify its unifying and coherent traits.

Does it promise a shining future?

This Call for Papers lists just a few of the pressing issues that will be within the scope of the conference. We intend to grasp these topics from a technical, legal, political, ethical, sociological and economic standpoint:

Technical challenges/requirements
Cryptographic dogma? (e.g. key security, strength of algorithms, etc.)
Future Connectivity and the Internet of Things (e.g. net neutrality, future backbone, new network technologies, etc.)
Big data (e.g. big data management, interpretation and evaluation, etc.)
Technical protocols (e.g. IPv6, 5G, WWW 3.0, etc.)
Operating systems (e.g. multi-core / virtual-core, distributed OS, etc.)
Development and engagement of cyber assets (e.g. enforcement, military capacities, research and education, etc.)
Doctrine and strategies (e.g. state actors in cyberspace, cyber policy, etc.)
Prevention (e.g. early warning, confidence building measures, etc.)
Crisis management (e.g. contingency planning, resilience, etc.)
Arms race (e.g. cyber arms complex, “code war”, etc.)

Regulation – standards
Privacy and personal data protection (e.g. profiling, “right to be forgotten”, etc.)
Security strategies (e.g. implementation frameworks, metrics, etc.)
Technical implementation standards (e.g. RFCs, IEEE, ISO, etc.)
Intellectual property (e.g. copyright and digital rights management, etc.)
Legal developments (e.g. public international law, “Tallinn Manual 2.0”, “cyber crime act”, etc.)

Social networks and Online Communities (e.g. social network merging, “blog wars”, etc.)
Digital economy (e.g. E-Commerce, automated trade, etc.)
Identities (e.g. “virtual me”, E-IDs, avatars, etc.)
Health (e.g. quantified self, etc.)
Politics (e.g. citizenship, revolutions, democracy, etc.)
Knowledge – culture (e.g. contents vs container, creative industries, education (MOOCs), etc.)
Technical aspects of virtualisation (e.g. cloud computing, VM security, etc.)

International cooperation – International relations
Norms development (international treaties, legal framework, etc.)
Governance (e.g. the role of states, IOs, NGOs, technical boards, ISPs, etc.)
Borders in cyberspace (e.g. territoriality, sovereignty, technical implementation of borders and boundaries, etc.)
Cyber world order (e.g. virtual multilateralism, new communities, etc.)

Important Dates for CyCon 2015:
Abstract submission: 1 October, 2014
Notification of Abstract Acceptance: 31 October, 2014
Full paper: 5 January, 2015
Notification of Authors: 16 February, 2015
Final Paper: 16 March, 2015

Authors are first required to submit an abstract of the planned paper, which should describe the topic and lay out the main aspects and structure of the research (300-500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers meeting high
academic research standards (up to 6000 words, incl. footnotes and references). Submitted papers will be subject to a double-blind peer review.

Submission details, author guidance, the copyright transfer form and other practical information are available on our website at The abstracts and manuscripts must be uploaded electronically to after creating an account.
Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE), transfer to and from the airport, accommodation and lunches for the duration of the conference, an ice-breaker, a conference dinner and a guided tour in Tallinn (early notification of interest required).

Related Resources

CyCon 2018   10th IEEE International Conference on Cyber Conflict (CyCon X)
CloudCom 2018   The 10th IEEE International Conference on Cloud Computing Technology and Science
CSET 2018   11th USENIX Workshop on Cyber Security Experimentation and Test
SciSec 2018   The 1st International Conference on Science of Cyber Security
ICCWS 2019   14th International Conference on Cyber Warfare and Security
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
CSW 2018   The 2nd International Workshop on Cyber Security 2018
CYBER 2018   The Third International Conference on Cyber-Technologies and Cyber-Systems
Business & Cyber Securit 2018   2nd International Conference on Business & Cyber Security (ICBCS)