posted by organizer: stonesw || 863 views || tracked by 1 users: [display]

MCA - Winter 2019 : Military Cyber Affairs (MCA) Winter 2018-2019 Issue - Command and Control of Cyberspace Operations


When N/A
Where N/A
Submission Deadline Nov 15, 2018
Notification Due Dec 15, 2018
Final Version Due Jan 30, 2019

Call For Papers

Military Cyber Affairs ISSUE ON: Command and Control of Cyberspace Operations


Bobbie Stempfley,
Managing Director, CERT Division
Software Engineering Institute, Carnegie Mellon University

Steve Stone, D. Sc.
Sr. Principal Cyberspace Operations Engineer
The MITRE Corporation


As cyberspace is significantly different from the physical domain in the dimensions of time and space, it presents a much more dynamic and complex operational environment for military operations. This complexity may require the military to examine its long-held doctrine for command and control (C2) and decision-making. The challenges facing modern militaries as they adapt to operations in cyberspace include a nascent understanding of the domain and its characteristics; the complex network of participants responsible for the establishment and sustainment of cyberspace; and insufficient strategies to implement agile C2 and decision-making in the face of the complex dynamics presented by this domain.


In 2015, the Commander of United States Cyber Command stated, “Our traditional command and control and organizational constructs do not enable the speed and agility required to keep pace with change in the cyber domain”.

This issue seeks to present research and analysis of ideas for command and control and organizational constructs that may enable the speed and agility required to keep pace with change in the cyber domain.


• Theories of command and control for cyberspace operations
• Decision making for operations in cyberspace
• How does C2 in the cyberspace domain differ from C2 in other domains (air, land, sea, and space)?
• What are the information requirements for effective C2 and decision making for cyberspace operations?
• How does the private sector and NGO participate in C2 of cyberspace operations?
• What organizational relationships and command authorities best support agile cyberspace operations?
• Is the model of strategic, operational, and tactical levels of warfare and corresponding C2 constructs valid for cyberspace operations?
• How can commanders synchronize operations in cyberspace with operations in the physical domains?
• What are the delineations between intelligence and operations in cyberspace?
• What is the relationship between the structures of the environment and the participants in cyberspace operations?


Researchers and practitioners are invited to submit papers for this issue on Command and Control of Cyberspace Operations on or before October 1st, 2018. All submissions must be original and may not be under review by another publication. All submitted papers will be reviewed using a double-blind, peer review process.

For publication in MCA:

1. Papers should relate to the conduct of military cyber operations and apply universally to the joint defense community in one of the following areas or a related area: strategy, policy, law, or ethics, operations, or advances in science or technology.

2. Papers should articulate a logical analysis based on a convincing hypothesis that provides a lucid and comprehensible argument for the general public and identifies implications for policy and practice.

3. Papers should include a logical or empirical analysis in support of that hypothesis that is grounded in a study of the research literature.

4. The research design and methodology should conform to professional standards and be clearly described in the paper.

Interested authors should consult the Military Cyber Affairs policies located at:

Military Cyber Affairs has no rules about the formatting of articles upon initial submission. There are, however, rules governing the formatting of the final submissions located at:

Papers should be submitted at:

All inquiries should be addressed to the editors listed above.

Military Cyber Affairs (MCA) is the peer-reviewed professional journal published by the Military Cyber Professionals Association. Military Cyber Affairs provides a multi-disciplinary forum for scholarship and discussion of cybersecurity, cyber defense, and cyber operations, and their military implications, drawing from the fields of intelligence, engineering, information technology, law and policy, among others.

Related Resources

MobiCom 2022   The 28th Annual International Conference On Mobile Computing And Networking (Winter Deadline)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
WACV 2022   Winter Conference on Applications of Computer Vision
SIGMETRICS 2022   The 2022 ACM SIGMETRICS/Performance conference (Winter)
MIAM 2022   Miami Winter Symposium 2023 - Molecular Neuroscience: Focus on Sensory Disorders
ARCI 2022   Automation, Robotics & Communications for Industry 4.0: 2nd IFSA Winter Conference
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
SEFM 2022   20th International Conference on Software Engineering and Formal Methods
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi