posted by user: Xavier || 2439 views || tracked by 3 users: [display]

IJCSA 2017 : International Journal On Cyber Situational Awareness


When N/A
Where N/A
Submission Deadline Mar 31, 2017
Categories    cyber situational awareness   critical infrastructure   networks defense   privacy

Call For Papers

The International Journal on Cyber Situational Awareness (IJCSA) is a comprehensive reference journal, dedicated to disseminating the most innovative, systematic, topical and emerging theory, methods and applications on Situational Awareness (SA) across Cyber Systems, Cyber Security, Cyber Physical Systems, Computer Network Defence, Enterprise Internet of Things (EIoT), Security Analytics and Intelligence to students, scholars, and academia, as well as industry practitioners, engineers and professionals.

**Overall Scope**
The International Journal of Cyber Situational Awareness (IJCSA) covers innovative research on theoretical and practical aspects of Situational Awareness on Cyber Systems. The journal focuses on the advancement of the principles, methods and applications of situational awareness to support, enable and facilitate advances in Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Computer Physical Systems (CPS), Enterprise Internet of Things (IoTs), Social Media, Cyber Incident Responses, Control, Containment and Countermeasures (CIRC3).

Recommended topics include, but are not limited to, the following:

**Situational Awareness for Computer Networks Defense
Computer Network Defense
Cyber Situation Awareness
Correlation & Automation
Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
Situation Assessment & Decision Making

**Defense Strategy for the Enhancement of Situational Awareness
Risk Management, Governance and Compliance
Trust, Privacy and Anonymity Issues
Digital Forensic Information Analysis
Enterprise Information Security Policies, Standards and Procedures
Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment

**Cyber Situational Awareness Tools & Techniques
Fuzzy Logic
Rough Set
Artificial Neural Networks
Artificial Intelligence
Genetic Algorithm
Evidence Theory (DST)
Bayesian Networks & Set Theory
Big Data Analytics
Game Theory
Graph Theory

**Network Situational Awareness
Cyber Attack Scenarios
Situation-Aware and Context-Aware Network Applications
Security Event and Information Management
Application Security, Audits and Penetration Testing

**Human Factor Cognitive
Training and Expertise
Risk Assessment and Decision Making
Forecasting and Prediction
Operator SA & Team SA

**National and Critical Infrastructure Security Issues
Information Security
Cyber Security
Database Security
Application Security
Law Enforcement and Surveillance
Border Protection and Controls
Cyber Warfare and Counter Terrorism

**Situation Awareness in Military Operations
Military Doctrinal in Situation Awareness
C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
Computer Network Operations
Computer Network Defense
Mission Awareness, Command and Control

**Analysis of Large-Scale Internet Traffic
Attack Graphs
Advanced Security Incident Analysis
Sensor Correlation and Cross-Correlation
Implementing Situational Awareness Systems
Information Security Metrics and Measurements

**Web Traffic Characterisation
Intrusion Detection Systems
Traffic Characterisation Techniques
Web Analytics
Security Incident Response

**Cyber Situational Awareness Frameworks
Proactive Defense Strategies
Instance-Based Learning
Adaptive Neural Logic
Human-Assisted Decision Control
Human in the Loop
Automated Self-Responder

**Fusion Centres
Tools for Metric Optimisation
Visualisation and Digital Analytics
Data Mining
Filtration, Selection, and Risk-Based Prioritisation
Metrics for Evaluation and Assessment

**Situational Awareness Applications
Situational Awareness in C4ISR
Situational Awareness in Cyber Command and Control Centres
Situational Awareness in Intrusion Defense
Situational Awareness in Cyber Physical Systems (CPS)
Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
Open Source Applications

**Designing Cyber Situational Awareness Solutions and Services
Functional Requirements for Situation-aware services
Non-Functional Requirements for Situation-aware Services and solutions
Interface Design
Realtime Processing

**Usefulness of Multisensor Data Fusion
Information Data Fusion
Sensor Fusion for Security Incident Analysis
Security Incident Analysis
Data Association & Correlation
Security Information Visualisation
Data Analytics
Security Monitoring

Situational Awareness Training
Research and development in Situational Awareness
Simulation and Testbeds in Cyber Situation Awareness
Experimentation & Instrumentation
Theoretical Underpinnings in Situation Awareness

** Readership/Audience**

The primary audience for this journal are industry professionals, scholars, researchers and academia working in this fast evolving and emerging field of discipline. Practitioners and managers working in information technology and information security across all industries would vastly improve their knowledge and understanding of critical human and social aspects of situational awareness and computer network defence, and information security in general. Air space controllers and defence agencies will also find this journal a very helpful and practical resource.

**Competing Journals (list of current competition publication)**

There are no competing journals in this unique and specialist area, especially those focusing on the application of situation awareness to Cyber Security (CS), Cyber Physical Systems (CPS), and Cyber Anything (CA).


Academic Search Complete
ACM Digital Library
Compendex (Elsevier Engineering Index)
Computer Science Index
DBLP Computer Science
Google Scholar
Microsoft Academic Search

**Frequency of Publication**
Bi-annual Journal


All our journals are Open Access. This means they are abide by open access policy.


We are always receiving article submissions for future volumes and numbers, please check the submission guidelines on our website.

**EDITOR INFORMATION – Academics & Practitioners**

**Editor in Chief**

Dr. Cyril Onwubiko
Chair, Intelligence and Security Assurance
E-Security Group, Research Series, London, UK

**Associate Editors**

Dr. Thomas Owens
Senior Lecturer & Director of Quality, Department of Electronic and Computer Engineering, Brunel University, London, UK

Professor Frank Wang
Head of School / Professor of Future Computing, School of Computing, University of Kent, Canterbury, UK
Chair - IEEE Computer Society, IEEE UK & Ireland

**Editorial Board Members**

Dr. Janne Merete Hagen
Norwegian Defence Research Establishment (FFI), NORWAY

Dr. Nick Savage
Communication Networks and Security Department, University of Portsmouth, UK

Dr. Xavier Bellekens
Computer Security & Privacy, University of Abertay, Scotland

Dr. Matija Stevanovic
Wireless Communication Networks (WCN) Section, Department of Electronic Systems, Aalborg University, Denmark

Dr. Ciza Thomas
Electronics and Communication Department, College of Engineering Trivandrum, INDIA

Dr. Subrata Acharya
CIS Department, Towson University, USA

Professor Stefanos Gritzalis
Professor at the Department of Information and Communication Systems, Engineering, University of the Aegean, GREECE

Dr. Xinyu Yang
Department of Computer Science and Technology, Xi’an Jiaotong University, CHINA

Dr Andrew Lenaghan
OxCERT, University of Oxford, Oxford, UK

Related Resources

IJCSA 2022   International Journal on Computational Science & Applications
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
Electronics SI 2022   Electronics: Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi