posted by organizer: srobe1166 || 1364 views || tracked by 6 users: [display]

CCOE - CFP 2017 : Cyber Center of Excellence (CCOE) Call For Research Papers

FacebookTwitterLinkedInGoogle

Link: https://www.fbo.gov/index?s=opportunity&mode=form&id=4e7a0785c79724eca9b6bda877805efa&tab=core&_cview=0
 
When Aug 8, 2017 - Aug 10, 2017
Where Augusta, GA
Submission Deadline Jun 26, 2017
Notification Due Jul 21, 2017
Final Version Due Aug 1, 2017
Categories    cyber security   electronic warfare   communication systems   data and content management
 

Call For Papers


General Information
Notice Type: Request for Information
Posted Date: 12 January 2017
Response Date: 1700 EST, 26 JUNE 2017
Archiving Policy: Manual Archive
Archive Date: N/A
Original Set Aside: N/A
Set Aside: N/A
Classification Code: B -- Special studies and analysis - not R&D
NAICS Code: 541 -- Professional, Scientific, and Technical Services/541990 -- All Other Professional, Scientific, and Technical Service

1. Background: HQDA EXORD 057-14 established the CCoE and designated the CCoE CG as the Force Modernization Proponent for Cyberspace Operations, Signal Communications Networks and Information Services (Signal) and Electronic Warfare (EW); and established the Signal and Cyber Schools. The EXORD further established the CCoE as the focal point for Army Force Modernization for Cyberspace Operations, Signal, and EW as well as the coordinating partner with the Intelligence Center of Excellence (ICoE) for institutional intelligence support to Cyberspace Operations. This effort is intended to solicit innovative solution ideas and approaches to specifically close critical capability gaps within Army Warfighting Challenge # 7:

Conduct Space and Cyber Electromagnetic Operations and Maintain Communications – How to assure uninterrupted access to critical communications and information links (satellite communications [SATCOM], positioning, navigation, and timing [PNT], and intelligence, surveillance, and reconnaissance [ISR]) across a multi-domain architecture when operating in a contested, congested, and competitive operating environment.

2. Intent: The Cyber Center of Excellence (CoE) is requesting research papers that address specific areas that answer learning demands or capability gaps that inhibit operational force effectiveness or efficiency. These research papers will be used to assess emerging concepts against documented Army Signal, Cyberspace, and Electronic Warfare capability requirements, inform current capability development and doctrine writing efforts, validate concepts, and better understand DOTMLPF impacts for those concepts under evaluation.

The Army Cyber CoE is looking for government solution providers, commercial vendors, and academic institutions that have interest in presenting research papers to address these signal, cyberspace and electromagnetic spectrum critical capability needs. The respondent papers will be down selected to find the six (6) top papers by a panel of experts in the requisite areas matching paper topics.

The authors of these six selected papers will be provided the opportunity to present an abstract of their paper during a focused panel discussion during TechNet Augusta, (currently scheduled for 8-10 August 2017). The Army intends to issue invitational travel
orders to the authors of the six papers to cover travel expenses. The intended audience and panel will consist of DoD representatives, academic and commercial community stakeholders interested in unique thought, innovative approaches, and/or novel solution approaches to some of the more critical capability gaps and learning demands facing our signal, cyber and electronic warfare community. Furthermore, the intent is to publish these winning papers within the Army Signal Magazine (http://www.afcea.org/content/#) or similar DoD publication.

3. Research Areas of Interest: The following capabilities and concepts are of research interest :

a. Short term capability gaps:
i. Tactical Forensics and Malware Detection, and Analysis
ii. Insider Threat Detection
iii. Defensive Cyber Operations (DCO) and DCO Mission Planning
iv. Tactical Electronic Warfare Sensors data compression and aggregation
v. Tactical Sensor data efficiencies and visualization
vi. Visualization and management of EW effects
vii. Unified Network Operations (NETOPS) Capabilities to manage the network. Common NETOPS platform that can be utilized regardless of echelon from the enterprise down to the upper and lower tactical internet.
viii. Tactical Content Delivery, Storage Infrastructure, File sharing and Knowledge Management
ix. Automated Cybersecurity and Network Defense at the tactical edge
x. Network capacity and reach
xi. Software defined radio security methodologies
xii. Cyber Situational Awareness and Understanding capabilities
xiii. Big Data Analytics at the tactical edge
xiv. Defensive techniques for critical manned and unmanned, aerial and terrestrial, and information collection systems
xv. Improve the defense of critical commanders communication and command and control systems
xvi. Improve the survivability and utility of electronic systems in an EMSO congested and/or positioning, navigation and timing denied environment.
xvii. Improve Army operational data sharing and efficiency between Joint and Coalition partners within a Combined Joint Task Force (CJTF) operational construct.
xviii. Determine means to improve the efficiency of decisions and delivery cycle of Cyberspace effects utilizing Electronic Warfare assets.
xix. Improve the efficiency of sensors and data collection at the Soldier level.
b. Near term capability gaps:
i. Anomalous/malicious insider detection in large scale networks
ii. Autonomous active computer network defense for large scale networks
iii. Intrusion detection/prevention in large scale networks
iv. GPS jamming mitigation for GPS dependent radios and computer systems
c. Long term capability gaps:
i. Quantum computing integration and benefits
ii. Quantum computing based computer network defense
iii. Confidentiality, Integrity, Availability impacts within a Quantum Computing technology landscape
iv. Autonomous/active and cognitive RF techniques - contested RF avoidance/optimization & jamming avoidance
v. Data storage and protection in a quantum computing environment
vi. Crypto alternatives in a quantum computing environment
vii. Cyber Genome approaches to computer network defense
viii. Identity and Access Management

4. Key Events: Those interested in participating should submit white papers in accordance with paragraph 5. All papers submitted by the deadline will undergo a peer review process. The authors of six selected papers will be invited to brief at a focused academic research panel during TechNet Augusta 2017. Those selected will have travel expenses paid and will be officially notified NLT 21 July 2017.

a. Technology Call For Papers published – 6 January 2017;
b. Deadline for White Paper submissions – 26 June 2017;
c. Technology/Paper Down Select Panel – 5 – 14 July 2017
d. Invitation to Academic Panel – 21 July 2017;
e. Academic Panel & Paper Presentation – TechNet, Augusta 8-10 Aug 2017;

5. White Paper Requirements: White papers will be evaluated against the criteria listed below. White paper solution novelty, quality and overall content will be the primary criteria used to select winning authors. White papers can discuss concepts and thought solutions without necessarily having working representative systems or solutions.
a. Respondents should respond to one of the areas listed in sections three (3) in a single whitepaper with a discrete solution description. A single solution can address multiple capability challenges but should be discussed in one white paper.
b. Multiple papers can be submitted, as long as discreet solutions are presented in each paper.
c. Format: The white paper should be a maximum of 5 pages in length, including figures, charts, and tables. It should be single-sided, single line spaced, utilize one (1) inch margins and utilize Times New Roman or Arial 12 pitch font. The cover page shall be excluded from the page count and shall be marked with the BAA number, any required security markings, author’s name(s) and affiliations. All White papers must be unclassified. The white paper shall be prepared in Microsoft Word or Adobe PDF electronic file format. The document must be print-capable and not password protected. White papers submitted via email must not exceed 5MB. White papers longer than 5 pages, larger than 5MB, or not in the above discussed format may be rejected.

6. Author Notification: Selected authors will be notified by 1700 EST 21 Jul 2017 and given follow-on instructions via email. Not all submitters will be invited to brief at TechNet, Augusta.
7. DOD Participation: The Cyber Battle Lab, Army Cyber Command (ARCYBER), Cyber Protection Brigade (CPB), TRADOC Capabilities Manager (TCM) Cyber, TCM Electronic Warfare (EW), TCM Tactical Radio (TR), TCM Network and Services (N&S), Requirements and Integration Division (RID), Capabilities and Analysis Division (CAD), Program Manager (PM) community, and other appropriate organizations may participate in the review of these papers.
8. The US Government is not obligated by this BAA. This notice does not obligate the Government to award a contract or otherwise pay for the preparation or information provided in the white papers. The Government reserves the right to use information provided by respondents for any legal purpose deemed necessary. Any organization responding to this notice should ensure that its response is complete and sufficiently detailed; the information provided will be used to assess the respondent’s ability to address the capabilities called for in this BAA. Respondents are advised that the Government is under no obligation to acknowledge receipt of the information received or provide feedback to respondents with respect to any information submitted. This is not an announcement of an acquisition solicitation.
9. Technology/Paper Down Select Panel: All properly submitted white papers and proposals that conform to the BAA requirements will be evaluated by a review panel as described previously for use by the Army operational, institutional, capabilities development, and acquisition communities. All government personnel are bound by public law to protect proprietary information.
10. The Government may use selected support contractor personnel to provide administrative assistance to federal employees regarding all aspects of any actions ensuing from this announcement, including the evaluation of white papers and subsequent proposals. However, federal employees will be responsible for actual reviews and evaluations. These support contractors will be bound by appropriate non-disclosure agreements (NDA) to protect proprietary and source-selection information and are not permitted to release any source-selection information to third parties, including others in their organization. By submission of a White Paper and/or subsequent Proposal, offerors are hereby consenting access to financial, confidential, proprietary, and/or trade secret markings in the White Paper and/or subsequent Proposal to support contractor personnel.
11. Points of contact: ALL SUBMISSIONS AND ANY QUESTIONS ON THE OBJECTIVES OR PREPARATION OF THE WHITE PAPER SHOULD BE ADDRESSED TO Lieutenant Colonel Stephen Roberts (stephen.a.roberts3.mil@mail.mil), Major Andrew Stannard (andrew.d.stannard.fm@mail.mil) or Mr. Horace Carney (horace.r.carney.ctr@mail.mil), Cyber Battle Lab, Bldg. 19901, 850 East 13th Street, Fort Gordon, GA 30905. Only questions pertaining to the BAA electronic posting are to be directed to Ms. Suzanne Mattingly, Mission and Installation Contracting Command, Fort Gordon GA, Suzanne.e.mattingly.civ@mail.mil (706)791-1833.

Related Resources

IJCI 2017   International Journal on Cybernetics & Informatics
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ISUAVs 2018   Second Call for Book Chapters: IET Imaging and Sensing for Unmanned Aerial Vehicles
eCrime 2018   13th Symposium on Electronic Crime Research
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
KR Workshops & Tutorials CFP 2018   KR18 - Call for Tutorial and Workshop Proposals
CFA/CFP: Call for Papers/Abstracts: Edit 2017   CFA/CFP: Call for Papers/Abstracts: Edited Volume on Anxieties About the Future of Democracy
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
CFACFP Democracy 2017   CFA/CFP: Call for Papers/Abstracts: Edited Volume on Anxieties About the Future of Democracy