Cyber Security 2019: International Conference on Cyber Security and Protection of Digital Services University of Oxford Oxford, UK, June 3-4, 2019 |
Conference website | https://www.c-mric.com/cs2019 |
Abstract registration deadline | February 28, 2019 |
Submission deadline | February 28, 2019 |
International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), June 3-4, 2019, University of Oxford, UKhttps://www.c-mric.com/cs2019
Theme:Socio-political impacts of cyber security in the face of BREXIT.
The submission deadline is 26th January 2019
We are pleased to invite you to submit a paper to the IEEE Technically Co-Sponsored (TCS) International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services. The aim of the Cyber Security 2019 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture. Cyber Security 2019 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
Submission Deadline
Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2019.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
Submission Instructions
Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair Conference System. Submission file formats are PDF and Microsoft Word using the C-MRiC Word/PDF templates that can be found at the corresponding C-MRiC website.
Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas & PhD Seminar may submit a 2‐page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Original papers are invited on recent advances in Cyber Security, Online Services, and Protection Mechanisms for Digital Services. The topics in Cyber Security 2019 include but not limited to:
Cyber Security
- Information Security
- Computer Network Security
- Application Security
- Web Services Security
- Mobile Security
- Protective Security
- Software Security
- Wireless & Sensor Network Security
- Software Coding Security
- Barcode Scanner Security
- Security in Middleware, Interface and Interaction
- Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
- Security Management
- Security Operations
- Digital Trust and Reputation
- Geographical Location (IP Geolocation) and Cyber Travel
- Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
- Policy, Legal, Legislation & Compliance
- Security Standardisation
- Law, Legal and Ethics
Digital Services
- Web Services
- Internet Banking
- E-Booking
- Cloud Computing
- E-Government
- Electronic Commerce
- Citizens Public Online Services
- Mobile Commerce
- E-Postal Services
- E-Health
- Online & Virtual Education
- E-Learning
- Web Chats
- Secure Protocols, Coding and Development
- Security Principles, Theory and Analysis
- Security Policy, Standards and Procedures
- Security in Business Processes
- Security Enforcing Function (SEF) Gateways
- Intrusion Detection Systems
- Intrusion Prevention Systems
- Firewalls
- Anti-Virus and Anti-Malware Gateways
- Data Loss Prevention
- Encryption Services
Protection of Digital Services
- Protection of Business Information Systems
- Protection of Online Services
- Public Online Services
- Internet Banking
- Security, Trust, Privacy
- Security in Online Gaming Systems
- Security in e-Government and Electoral Systems
- Content Security
- Protection of Public Online Content Distribution Systems
- Secure practices, processes and procedures in Public Online Services
- Cryptography - PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
- Digital Forensics and Investigations
- HoneyPots and Honey Nets
- Critical National Infrastructures (CNIs)
- Critical Network Systems (CNS)
Security Operations Centre
- Cyber Security Operations Centre (CSOC)
- Joint Security Operations Centre (JSOC)
- Strategic Security Operations Centre (SSOC)
- Virtual Security Operations Centre (vSOC)
- Threat Intelligence
- Fusion Centre
- Cyber Centre
- Operations Monitoring Centre
- Security Monitoring
- Transaction Monitoring
- Web Fraud Detection (WFD)
- Incident Management
- Cyber Incident Response
- Anomaly Detection
- Heuristic Learning
- Intrusion Detection
- Computer Misuse and Abuse
Security Operations Centre Management
- Design Requirements
- Principles and Operations
- SOC Security Operating Procedures (SOC SyOPs)
- Architectures and Design Considerations
- Implementation of SOC Centres
- Monitoring and Security Analysis
- Security Information and Event Management (SIEM)
- Log Analysis & Analytics
- IDS/IPS & Firewall Administration
- Alerting and Event Prioritisation
- Log Management
- Analysis Tools and Techniques
- Incident Triage
- Incident Analysis, Management, Reporting and Escalation
- Management Reports and Management Information (MI) Reports
- Coordination and Containment
- Collaboration and Incident Investigation
- National CERT Liaison
- Model of Operations
- Intelligence Interfaces and Threat Intelligence Feeds
- Asset Management, Prioritisation and Categorisation
- Investigation & Forensic Readiness
Network Operations Centre
- Functions of NOCs
- Design Principles
- Design Architectures and Design Requirements
- Monitoring and Analysis
- Coordination
- Incident Response & Handling
- Incident Management
- Operations Management
- Models of Operations
- System Interfaces and Automation
- Asset Management
- Data Leak Prevention (DLP)
- Denial and Distributed Denial of Service (DDoS)
Blockchain
- Cryptocurrency
- Bitcoin & Bit-everything
- Blockchain in Manufacturing
- Blockchain in Banking & Financial Systems
- Blockchain in Aviation
- Blockchain in Pharmaceuticals
- Blockchain in IoT
- Blockchain in Defence
- Blockchain in Cybersecurity Operations
- Blockchain in Publications
- Blockchain Education Curriculum
Application and Container Platform Security
- Application and Container Platform (ACP)
- Container Technologies
- Security Concerns Associated with Container Technologies
- Apps
- Cultural and Technical Processes for Managing Containers & Apps
- Microservices
- Kubernetes
- Docker
- Cloud Computing
- Virtualisation (Network, OS, Container & Apps)
- DevOps
- API
- HostOS
- Container Technology Architecture
- Approaches to Management, Maintenance and Processing of Containers, Apps and HostOS
- CI/CD
- Risks & Issues
- OWASP
- Open Web Application Security
Program Committee
-
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Frank Wang – IEEE, United Kingdom and Ireland
Steering Committee
- Virginia Franqueira – Cyber Security, University of Derby, UK
- Fatih Kurugollu – Cyber Security, University of Derby, UK
- Nick Savage – University of Portsmouth, UK
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
- Martin Gilje Jaatun – University of Stavanger, Norway
Publicity Chairs
- Joe Burton – Political Science and Public Policy Programme, The University of Waikato, New Zealand
- Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Phil Legg – University of the West of England, UK
- Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
- Carolina Nogueira – DISCO | Distributed Computer Systems Lab, Computer Science Department, TU Kaiserslautern, Germany
Conference Chairs
- Xavier Bellekens – University of Abertay, Scotland, UK
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
Programme Committee
- Andrea Cullen - Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK
- Joe Burton – Political Science and Public Policy Programme, The University of Waikato, New Zealand
- He (Mary) Hongmei – AI and Cyber Security for Manufacturing, Cranfield University, UK
- Carolina Nogueira – DISCO | Distributed Computer Systems Lab, Computer Science Department, TU Kaiserslautern, Germany
- Aunshul Rege – Temple University, Pennsylvania, USA
- Jason Nurse – University of Kent, UK
- Per Hakon Meland – SINTEF, Norway
- Andrea Cullen – Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK
- Wasim Alhamdani – College of Computer Science & Information Technology, University of Dammam, Saudi Arabia
- David Brosset – Naval Academy Research Institute, France
- Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
- Deepthi Ratnayake – London Metropolitan University, London, UK
- Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
- Thomas Owens – Brunel University, London, UK
- Jens Myrup Pedersen – University of Aalborg, Denmark
- Marios Anagnostopoulos – University of the Aegean, Greece
- Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Ciza Thomas – College of Engineering, India
- Stefanos Gritzalis – University of the Aegean, Greece
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Varun Dutt – Indian Institute of Technology Mandi, India
- Georgios Kambourakis – University of the Aegean, Greece
- Elisavet Konstantinou – University of the Aegean, Greece
- Pierre Parrend – ECAM Strasbourg-Europe, France
- Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
- Amar K. Seeam – Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius
- Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
- Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
- Tim D Williams – Cyber Security, London, UK
- Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
- Abdulrahman Alarifi – Computer Research Institute, King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia
- Spyros Kokolakis – University of the Aegean, Greece
- Ioanna Topa – University of the Aegean, Greece
- Boniface K. Alese – Department of Computer Science, Federal University of Technology, Akure, Nigeria
- Keeley Crockett – IEEE Women in Engineering & School of Computing, Maths and Digital Technology, Manchester Metropolitan University, UK
- Eva Papadogiannaki – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Zisis Tsiatsikas – University of the Aegean, Karlovassi, Greece
- Michalis Diamantaris – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
Organizing committee
- Arnau Erola – Department of Computer Science, University of Oxford, UK
- Virginia Franqueira – Cyber Security, University of Derby, UK
- Fatih Kurugollu – Cyber Security, University of Derby, UK
- Xavier Bellekens – University of Abertay, Dundee, Scotland, UK
- Zeyad Yousif Al-Shibaany – IEEE UK and Ireland, EAO Chair
- Thaddeus Eze – IEEE UK and Ireland YP & Department of Computer Science, University of Chester, UK
- Nazila Fough – IEEE UK and Ireland Young Professionals (IEEE YP) & Robert Gordon University of Aberdeen, Scotland, UK
Venue
The conference will be held at the University of Oxford, UK
Contact
All questions about submissions should be emailed to submission@c-mric.org