posted by organizer: stonesw || 610 views || tracked by 1 users: [display]

MCA - Winter 2019 : Military Cyber Affairs (MCA) Winter 2018-2019 Issue - Command and Control of Cyberspace Operations


When N/A
Where N/A
Submission Deadline Nov 15, 2018
Notification Due Dec 15, 2018
Final Version Due Jan 30, 2019

Call For Papers

Military Cyber Affairs ISSUE ON: Command and Control of Cyberspace Operations


Bobbie Stempfley,
Managing Director, CERT Division
Software Engineering Institute, Carnegie Mellon University

Steve Stone, D. Sc.
Sr. Principal Cyberspace Operations Engineer
The MITRE Corporation


As cyberspace is significantly different from the physical domain in the dimensions of time and space, it presents a much more dynamic and complex operational environment for military operations. This complexity may require the military to examine its long-held doctrine for command and control (C2) and decision-making. The challenges facing modern militaries as they adapt to operations in cyberspace include a nascent understanding of the domain and its characteristics; the complex network of participants responsible for the establishment and sustainment of cyberspace; and insufficient strategies to implement agile C2 and decision-making in the face of the complex dynamics presented by this domain.


In 2015, the Commander of United States Cyber Command stated, “Our traditional command and control and organizational constructs do not enable the speed and agility required to keep pace with change in the cyber domain”.

This issue seeks to present research and analysis of ideas for command and control and organizational constructs that may enable the speed and agility required to keep pace with change in the cyber domain.


• Theories of command and control for cyberspace operations
• Decision making for operations in cyberspace
• How does C2 in the cyberspace domain differ from C2 in other domains (air, land, sea, and space)?
• What are the information requirements for effective C2 and decision making for cyberspace operations?
• How does the private sector and NGO participate in C2 of cyberspace operations?
• What organizational relationships and command authorities best support agile cyberspace operations?
• Is the model of strategic, operational, and tactical levels of warfare and corresponding C2 constructs valid for cyberspace operations?
• How can commanders synchronize operations in cyberspace with operations in the physical domains?
• What are the delineations between intelligence and operations in cyberspace?
• What is the relationship between the structures of the environment and the participants in cyberspace operations?


Researchers and practitioners are invited to submit papers for this issue on Command and Control of Cyberspace Operations on or before October 1st, 2018. All submissions must be original and may not be under review by another publication. All submitted papers will be reviewed using a double-blind, peer review process.

For publication in MCA:

1. Papers should relate to the conduct of military cyber operations and apply universally to the joint defense community in one of the following areas or a related area: strategy, policy, law, or ethics, operations, or advances in science or technology.

2. Papers should articulate a logical analysis based on a convincing hypothesis that provides a lucid and comprehensible argument for the general public and identifies implications for policy and practice.

3. Papers should include a logical or empirical analysis in support of that hypothesis that is grounded in a study of the research literature.

4. The research design and methodology should conform to professional standards and be clearly described in the paper.

Interested authors should consult the Military Cyber Affairs policies located at:

Military Cyber Affairs has no rules about the formatting of articles upon initial submission. There are, however, rules governing the formatting of the final submissions located at:

Papers should be submitted at:

All inquiries should be addressed to the editors listed above.

Military Cyber Affairs (MCA) is the peer-reviewed professional journal published by the Military Cyber Professionals Association. Military Cyber Affairs provides a multi-disciplinary forum for scholarship and discussion of cybersecurity, cyber defense, and cyber operations, and their military implications, drawing from the fields of intelligence, engineering, information technology, law and policy, among others.

Related Resources

ARCI 2021   Automation, Robotics & Communications for Industry 4.0: 1st IFSA Winter Conference
CFW WACV 2020   Call for Workshops - 2020 IEEE Winter Conference of Applications on Computer Vision (WACV 2020)
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
WACV 2020   Workshop on Applications of Computer Vision
TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
EAI IC4S 2020   (Virtual) EAI International Conference on Cognitive Computing and Cyber Physical Systems
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
IEEE--ICISPP--Ei Compendex, Scopus 2020   IEEE--2020 International Conference on Information Security and Privacy Protection (ICISPP 2020)--Ei Compendex, Scopus
IEEE TDSC - XAI-CTI 2020   IEEE Transactions on Dependable and Secure Computing Special Issue on Explainable AI for Cyber Threat Intelligence (XAI-CTI) Applications