
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2020) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.
The aim of the Cyber Incident 2020 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
Cyber Incident 2020 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed. The conference is open to the public, so you can attend the event without presenting a paper. Registration for both authors and attendees (without presenting a paper) opens in March 2020. You are welcome!
The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes:
The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.
Details
Cyber Incident 2020 is co-located with other conferences as part of Cyber Science 2020
The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations was 26th January 2020, but now the deadline has been extended to 6th March 2020.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
Full paper submission should be via Easychair Conference Portal.
The online submission process is now open!
Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Use the IEEE A4 paper type. Please note that it’ll be IEEE e-copyright, which must be completed for all accepted papers. We’ll send authors’ of accepted papers instruction on how to complete an IEEE e-copyright form.
Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. Please use/download the IEEE A4 paper template, and specify which conference your submission is to. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system.
Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the IEEE A4 Paper template that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2‐page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.
An Empirical Study of CERT Capacity in the North Sea
Developing a security behavioural assessment approach for cyber rating UK MSBs
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements
Restricting Data Flows to Secure Against Remote Attack
An Overview of Web Robots Detection Techniques
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques – An Experiment
“What did you say?”: Extracting unintentional secrets from predictive text learning systems
Privacy Policy – “I agree”?! – Do alternatives to text-based policies increase the awareness of the users?
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants
Forensic Considerations for the High Efficiency Image File Format (HEIF)
Using Amazon Alexa APIs as a Source of Digital Evidence
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers
A Security Perspective on Unikernels
A Taxonomy of Approaches for Integrating Attack Awareness in Applications
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection
Memory Forensics Against Ransomware
An Empirical Study of Key Generation in Cryptographic Ransomware
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks
AI Crimes: A Classification
Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
Evaluation of Machine Learning Algorithms for Anomaly Detection
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care
Towards Security Attack and Risk Assessment during Early System Design
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests
Introducing & Evaluating `Nutrition Facts’ for Online Content
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Epistemological Questions for Cybersecurity
Technical codes’ potentialities in cybersecurity
A contextual approach on the ethics of small digital organizations in France
Privacy Protection Behaviours: a diversity of individual strategies
Insider Threat Detection: A Solution in Search of a Problem
Platform for monitoring and clinical diagnosis of arboviruses using computational models
Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing
Automated Vulnerability Testing via Executable Attack Graphs
Testing And Hardening IoT Devices Against the Mirai Botnet
ethVote: Towards secure voting with distributed ledgers
A DLT-based Trust Framework for IoT Ecosystems
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2020).
View MoreIEEE is the Technical Co-Sponsor (TCS) of the International Conference on Social Media, Wearable and Web Analytics (Social Media 2020).
View MoreIEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020).
View More