June 2020

Cyber Situational Awareness

Machine Learning for insight in Cyber Security and Situational Awareness

  • Dublin City University, Ireland

Starting in:

00 d
00 h
00 m
00 s

Call for Papers

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2020), an international refereed conference dedicated to the advancement of the principles, methods and applications of situation awareness on Cyber Systems, Business Information Systems (BIS), Computer Network Defence (CND), Critical National Infrastructures (CNI), Cyber Physical Systems (CPS) and Internet of Things (IoTs).

The aim of the CyberSA 2020 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

CyberSA 2020 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.

Register Here To Stay Up To Date On Cyber Situational Awareness 2020

Enter your email address to receive latest updates about Cyber Situational Awareness 2020 by email.


CyberSA 2020, in conjunction with the International Workshop on Cyber Insurance and Risk Controls (CIRC 2020), is co-located with other conferences as part of Cyber Science 2020.


Workshop on Cyber Insurance and Risk Controls (CIRC 2020) will be presented at the conference.

Posters & Presentations

Posters & Presentations will be presented at the conference.


Industry track is available for discussing and publishing pilot and proof of concepts.

Work in Progress

Work in Progress track is available for preliminary work.

Research Ideas

Research Ideas track is available for ideas in early stages assessment.

PhD Seminar

PhD Seminar track is available for discussing and publishing early PhD thesis research.

Topics of Interest

  • Situation Awareness in Software Defined Networks
  • Security Monitoring, Scale of Things and Limits to Monitoring
  • Block Chain Technology in Security
  • IoT Detection and Software Driven Applications Security
  • Situation Awareness in Mobile Computing
  • Standardisation of Cyber Situation Awareness
  • Search, Triage, Examination and Forensics in Cloud Computing
  • Cyber SA in Chaotic Computing
  • Cyber SA in Large Scale IDS Deployments
  • Cyber SA in Deep Learning
  • Cyber SA in Deep Analytics
  • Machine Learning for Cyber Situational Awareness
  • Assessment models and methodologies for Cyber SA
  • Cyber Situation Awareness Evaluation Recommendation
  • Cyber SA Maturity Models and Frameworks
  • Cyber SA for Social Networks
  • Social Network Interaction and Intelligence
  • Web Analytics & Security Incident Response
  • Organised and collaborative Maps and Networks
  • Cyber Behavioural Analytics and Profiling
  • Collaborative Situation Awareness for Decision Making
  • Situation Assessment & Decision Making
  • Defense Strategy for the Enhancement of
  • Situation Awareness
  • Situation Assessment, Resolution and Decision Loop
  • Individual vs. Team SA
  • Group and Team SA
  • Trust, Privacy and Anonymity Issues
  • Digital Forensic Information Analysis
  • Enterprise Information Security Policies, Standards and Procedures
  • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
  • Fuzzy Logic
  • Rough Set
  • Artificial Neural Networks
  • Artificial Intelligence
  • Genetic Algorithm
  • Evidence Theory (DST)
  • Bayesian Networks & Set Theory
  • Big Data Analytics
  • Game Theory
  • Graph Theory
  • Cyber Attack Scenarios
  • Situation-Aware and Context-Aware Network Applications
  • CERTs and CSIRTs
  • Security Event and Information Management
  • Application Security, Audits and Penetration Testing
  • Workload
  • Perception
  • Stress
  • Knowledge
  • Training and Expertise
  • Risk Assessment and Decision Making
  • Forecasting and Prediction
  • Operator SA & Team SA
  • Knowledge, Skills and Abilities (KSA)
  • Information Security
  • Cyber Security
  • Database Security
  • Application Security
  • Law Enforcement and Surveillance
  • Border Protection and Controls
  • Cyber Warfare and Counter Terrorism
  • Military Doctrinal in Situation Awareness
  • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
  • Computer Network Operations
  • Computer Network Defense
  • Mission Awareness, Command and Control
  • Attack Graphs
  • Advanced Security Incident Analysis
  • Sensor Correlation and Cross-Correlation
  • Implementing Situation Awareness Systems
  • Information Security Metrics and Measurements
  • Proactive Defense Strategies
  • Instance-Based Learning
  • Adaptive Neural Logic
  • Human-Assisted Decision Control
  • Human in the Loop
  • Automated Self-Responder
  • Tools for Metric Optimisation
  • Visualisation and Digital Analytics
  • Data Mining
  • Filtration, Selection, and Risk-Based Prioritisation
  • Metrics for Evaluation and Assessment
  • Usefulness of Multisensor Data Fusion
  • Information Data Fusion
  • Sensor Fusion for Security Incident Analysis
  • Security Incident Analysis
  • Data Association & Correlation
  • Security Information Visualisation
  • Data Analytics
  • Security Monitoring
  • Situation Awareness in C4ISR
  • Situation Awareness in Cyber Command and Control Centres
  • Situation Awareness in Intrusion Defense
  • Situation Awareness in Cyber Physical Systems (CPS)
  • Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
  • Open Source Applications
  • Functional Requirements for Situation-aware services
  • Non-Functional Requirements for Situation-aware Services and solutions
  • Interface Design
  • Interoperability
  • Dynamism
  • Complexity
  • Performance
  • Automation
  • Responsiveness
  • Architecture
  • Realtime Processing
  • Synchronisation
  • Research and development in Situation Awareness
  • Simulation and Testbeds in Cyber Situation Awareness
  • Experimentation & Instrumentation
  • Modelling
  • Knowledge-base
  • Theoretical Underpinnings in Situation Awareness
  • Team and Group SA
  • Cyber Situation Awareness Methods, Training and Education