15

19

June 2020

Cyber Situational Awareness

Machine Learning for insight in Cyber Security and Situational Awareness

Due to COVID-19, the conference will be held online.

Registered attendees will have access to all virtual events & workshops throughout the conference.

Starting in:

00 d
00 h
00 m
00 s

Details

CyberSA 2020, in conjunction with the International Workshop on Cyber Insurance and Risk Controls (CIRC 2020), will take place virtually alongside Social Media 2020Cyber Incident 2020 and Cyber Security 2021 as part of Cyber Science 2020.​​

Workshop

Workshop on Cyber Insurance and Risk Controls (CIRC 2020) will be presented at the conference.

Posters & Presentations

Posters & Presentations will be presented virtually at the conference.

Industry

Industry track is available for discussing and publishing pilot and proof of concepts.

Work in Progress

Work in Progress track is available for preliminary work.

Research Ideas

Research Ideas track is available for ideas in early stages assessment.

PhD Seminar

PhD Seminar track is available for discussing and publishing early PhD thesis research.

Topics of Interest

  • Situation Awareness in Software Defined Networks
  • Security Monitoring, Scale of Things and Limits to Monitoring
  • Block Chain Technology in Security
  • IoT Detection and Software Driven Applications Security
  • Situation Awareness in Mobile Computing
  • Standardisation of Cyber Situation Awareness
  • Search, Triage, Examination and Forensics in Cloud Computing
  • Cyber SA in Chaotic Computing
  • Cyber SA in Large Scale IDS Deployments
  • Cyber SA in Deep Learning
  • Cyber SA in Deep Analytics
  • Machine Learning for Cyber Situational Awareness
  • Assessment models and methodologies for Cyber SA
  • Cyber Situation Awareness Evaluation Recommendation
  • Cyber SA Maturity Models and Frameworks
  • Cyber SA for Social Networks
  • Social Network Interaction and Intelligence
  • Web Analytics & Security Incident Response
  • Organised and collaborative Maps and Networks
  • Cyber Behavioural Analytics and Profiling
  • Collaborative Situation Awareness for Decision Making
  • Situation Assessment & Decision Making
  • Defense Strategy for the Enhancement of
  • Situation Awareness
  • Situation Assessment, Resolution and Decision Loop
  • Individual vs. Team SA
  • Group and Team SA
  • Trust, Privacy and Anonymity Issues
  • Digital Forensic Information Analysis
  • Enterprise Information Security Policies, Standards and Procedures
  • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
  • Fuzzy Logic
  • Rough Set
  • Artificial Neural Networks
  • Artificial Intelligence
  • Genetic Algorithm
  • Evidence Theory (DST)
  • Bayesian Networks & Set Theory
  • Big Data Analytics
  • Game Theory
  • Graph Theory
  • Cyber Attack Scenarios
  • Situation-Aware and Context-Aware Network Applications
  • CERTs and CSIRTs
  • Security Event and Information Management
  • Application Security, Audits and Penetration Testing
  • Workload
  • Perception
  • Stress
  • Knowledge
  • Training and Expertise
  • Risk Assessment and Decision Making
  • Forecasting and Prediction
  • Operator SA & Team SA
  • Knowledge, Skills and Abilities (KSA)
  • Information Security
  • Cyber Security
  • Database Security
  • Application Security
  • Law Enforcement and Surveillance
  • Border Protection and Controls
  • Cyber Warfare and Counter Terrorism
  • Military Doctrinal in Situation Awareness
  • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
  • Computer Network Operations
  • Computer Network Defense
  • Mission Awareness, Command and Control
  • Attack Graphs
  • Advanced Security Incident Analysis
  • Sensor Correlation and Cross-Correlation
  • Implementing Situation Awareness Systems
  • Information Security Metrics and Measurements
  • Proactive Defense Strategies
  • Instance-Based Learning
  • Adaptive Neural Logic
  • Human-Assisted Decision Control
  • Human in the Loop
  • Automated Self-Responder
  • Cyber Attack Scenarios
  • Situation-Aware and Context-Aware Network Applications
  • CERTs and CSIRTs
  • Security Event and Information Management
  • Application Security, Audits and Penetration Testing
  • Proactive Defense Strategies
  • Instance-Based Learning
  • Adaptive Neural Logic
  • Human-Assisted Decision Control
  • Human in the Loop
  • Automated Self-Responder
  • Team and Group SA
  • Tools for Metric Optimisation
  • Visualisation and Digital Analytics
  • Data Mining
  • Filtration, Selection, and Risk-Based Prioritisation
  • Metrics for Evaluation and Assessment
  • Usefulness of Multisensor Data Fusion
  • Information Data Fusion
  • Sensor Fusion for Security Incident Analysis
  • Security Incident Analysis
  • Data Association & Correlation
  • Security Information Visualisation
  • Data Analytics
  • Security Monitoring
  • Situation Awareness in C4ISR
  • Situation Awareness in Cyber Command and Control Centres
  • Situation Awareness in Intrusion Defense
  • Situation Awareness in Cyber Physical Systems (CPS)
  • Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
  • Open Source ApplicationS
  • Functional Requirements for Situation-aware services
  • Non-Functional Requirements for Situation-aware Services and solutions
  • Interface Design
  • Interoperability
  • Dynamism
  • Complexity
  • Performance
  • Automation
  • Responsiveness
  • Architecture
  • Realtime Processing
  • Synchronisation
  • Research and development in Situation Awareness
  • Simulation and Testbeds in Cyber Situation Awareness
  • Experimentation & Instrumentation
  • Modelling
  • Knowledge-base
  • Theoretical Underpinnings in Situation Awareness
  • Team and Group SA
  • Cyber Situation Awareness Methods, Training and Education

Programme Committee

  • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
  • Frank Wang – Computer Society, IEEE, United Kingdom and Ireland
  • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Xavier Bellekens – University of Strathclyde, Glasgow, Scotland, UK
  • Theo Lynn – Dublin City University, Dublin, Ireland
  • Pierangelo Rosati – Dublin City University, Dublin, Ireland
  • Grace Fox – Dublin City University, Dublin, Ireland
  • Patricia Endo – Dublin City University, Dublin, Ireland
  • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
  • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
  • Xavier Bellekens – University of Strathclyde, Scotland, UK
  • Phil Legg – University of the West of England, UK
  • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
  • Arnau Erola – Department of Computer Science, University of Oxford, UK
  • Hanan Yousry Hindy – School of Design and Informatics, Abertay University, Dundee, Scotland
  • Ngoc Tran – Dublin City University, Dublin, Ireland
  • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
  • Xavier Bellekens – University of Strathclyde, Scotland, UK
  • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
  • Bertrand Venard – Audencia, OII, University of Oxford, UK
  • Carlos A. Perez Delgado – School of Computing, University of Kent, UK
  • Philipp Reinecke – Cardiff University, Wales, UK
  • Thomas T Y Win – School of Business & Technology, University of Gloucestershire, UK
  • Suleiman Yerima – Cyber Security, De Montfort University, UK
  • Thomas Pasquier – Department of Computer Science, University of Bristol, UK
  • Francisco J Aparicio Navarro, Cyber Technology Institute, De Montfort University, UK
  • Fabio Roli – Pattern Recognition and Applications Lab, University of Cagliari, Italy
  • Arnau Erola – Cyber Security Centre, University of Oxford, Oxford, UK
  • Aunshul Rege – Temple University, Pennsylvania, USA
  • Lynsay Shepherd – Abertay University, Scotland, UK
  • Amin Hosseinian-Far – Business Systems and Operations , University of Northampton, UK
  • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
  • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
  • Pierre Parrend – ECAM Strasbourg-Europe, France
  • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
  • Jens Myrup Pedersen – University of Aalborg, Denmark
  • Marios Anagnostopoulos – University of the Aegean, Greece
  • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
  • Ciza Thomas – College of Engineering, India
  • Stefanos Gritzalis – University of the Aegean, Greece
  • Varun Dutt – Indian Institute of Technology Mandi, India
  • Elisavet Konstantinou – University of the Aegean, Greece
  • Panagiotis Trimintzios – Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
  • Phil Legg – University of the West of England, UK
  • Huiyu Zhou – Queen’s University Belfast, Belfast, UK
  • Jason Nurse – University of Kent, UK
  • Per Hakon Meland – SINTEF, Norway
  • Martin Gilje Jaatun – University of Stavanger, Norway
  • Petra Leimich – Edinburgh Napier University, Edinburgh, Scotland, UK
  • Boniface K. Alese – Department of Computer Science, Federal University of Technology, Akure, Nigeria
  • Ensar Seker – NATO, CCD COE, Estonia
  • Ulrik Franke – RISE Research Institutes of Sweden, Sweden
  • Michal Chorasm – Telecommunications and Computer Science, University of Science and Technology (UTP), Bydgoszcz, Poland
  • Ryan Heartfield – Cyber Security, University of Greenwich, London, UK
  • Lakshmi Prayaga – Department of Applied Science, Technology and Administration, University of West Florida, USA
  • Harin Sellahewa – School of Computing, The University of Buckingham, UK
  • Thaddeus Eze – Computer Science Department, University of Chester, UK
  • Dimitris Kavallieros – Center for Security Studies (KEMEA), Greece
  • Susan Rea – Nimbus Centre at Cork Institute of Technology, Ireland
  • Samir Puuska – JAMK University of Applied Sciences, Finland
  • Vasil Vassilev – School of Computing, London Metropolitan University, UK
  • Martin Gilje Jaatun – University of Stavanger, Norway
  • Shamal Faily – Cyber Security Research group (BUCSR), Bornemouth University, UK
  • Jingyue Li – Department of Computer Science, Faculty of Information Technology and Electrical Engineering, NTNU, Norway
  • Hasan Yasar – Division of the Software Engineering Institute, Carnegie Mellon University, USA
  • Gerardo I. Simari –  Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina

Previous Conferences