Cyber Science 2022

 

On-site / Hybrid

Cardiff School of Technologies (CST)
Cardiff Metropolitan University, Wales, UK

 

June 20 – 21, 2022

Call for Paper submission is now open

Call for Papers

The Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2022) is a multidisciplinary conference that brings together academics, researchers, practitioners and participants of different and varied specialties including but not limited to technical, social, political and humanities who are interested in advancing the principles, methods and applications of cybersecurity, situation awareness and social media.

Cyber Science 2022 invites participants to submit original papers that encompass principles, concepts, analysis, design, methods and applications of cybersecurity, situational awareness and social media.

All submitted papers will be independently peer-reviewed, and accepted papers must be registered and presented at the conference.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes:

  • IEEE Computer Society Digital Library
  • IEEE Xplore Digital Library
  • DBLP Computer Science
  • Others – Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The conference will be open to the public, so you can attend the event without presenting a paper. Registration for both authors and attendees (without presenting a paper) opens in March 2022. You are welcome!


Paper Submission

The deadline for all paper submissions, that is, both long and short papers is 28th February 2022.

Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Long & short paper submission should be via Easychair Conference Portal.

 

Online Submission

The online submission process is now open!

Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Use the A4 paper type. Please note that it’ll be IEEE e-copyright, which must be completed for all accepted papers. We’ll send authors’ of accepted papers instruction on how to complete an IEEE e-copyright form.

Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system.

Submission Instructions

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the A4 Paper template that can be found at the corresponding C-MRiC website.



Topics of Interest

    • Web Services
    • Internet Banking
    • E-Booking
    • Cloud Computing
    • E-Government
    • Electronic Commerce
    • Citizens Public Online Services
    • Mobile Commerce
    • E-Postal Services
    • E-Health
    • Online & Virtual Education
    • E-Learning
    • Web Chats
    • Secure Protocols, Coding and Development
    • Security Principles, Theory and Analysis
    • Security Policy, Standards and Procedures
    • Security in Business Processes
    • Security Enforcing Function (SEF) Gateways
    • Intrusion Detection Systems
    • Intrusion Prevention Systems
    • Firewalls
    • Anti-Virus and Anti-Malware Gateways
    • Data Loss Prevention
    • Encryption Services
    • Information Security
    • Computer Network Security
    • Application Security
    • Web Services Security
    • Mobile Security
    • Protective Security
    • Software Security
    • Wireless & Sensor Network Security
    • Software Coding Security
    • Barcode Scanner Security
    • Security in Middleware, Interface and Interaction
    • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
    • Security Management
    • Security Operations
    • Digital Trust and Reputation
    • Geographical Location (IP Geolocation) and Cyber Travel
    • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
    • Policy, Legal, Legislation & Compliance
    • Security Standardisation
    • Law, Legal and Ethics
    • Predictive Data Analytics for Situation Awareness
    • Machine Learning for Cyber Situation Awareness
    • Artificial Intelligence for Cyber Situation Awareness
    • Artificial Intelligence & Machine Learning for Cybersecurity
    • Cyber Attack Scenarios
    • Situation-Aware and Context-Aware Network Applications
    • CERTs and CSIRTs
    • Security Event and Information Management
    • Application Security, Audits and Penetration Testing
    • Protection of Business Information Systems
    • Protection of Online Services
    • Public Online Services
    • Internet Banking
    • Security, Trust, Privacy
    • Security in Online Gaming Systems
    • Security in e-Government and Electoral Systems
    • Content Security
    • Protection of Public Online Content Distribution Systems
    • Secure practices, processes and procedures in Public Online Services
    • Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
    • Digital Forensics and Investigations
    • HoneyPots and Honey Nets
    • Critical National Infrastructures (CNIs)
    • Critical Network Systems (CNS)
    • Situation Awareness in Software Defined Networks
    • Security Monitoring, Scale of Things and Limits to Monitoring
    • Block Chain Technology in Security
    • IoT Detection and Software Driven Applications Security
    • Situation Awareness in Mobile Computing
    • Standardisation of Cyber Situation Awareness
    • Search, Triage, Examination and Forensics in Cloud Computing
    • Cyber SA in Chaotic Computing
    • Cyber SA in Large Scale IDS Deployments
    • Cyber SA in Deep Learning
    • Cyber SA in Deep Analytics
    • Machine Learning for Cyber Situational Awareness
    • Cryptocurrency
    • Bitcoin & Bit-everything
    • Blockchain in Manufacturing
    • Blockchain in Banking & Financial Systems
    • Blockchain in Aviation
    • Blockchain in Pharmaceuticals
    • Blockchain in IoT
    • Blockchain in Defence
    • Blockchain in Cybersecurity Operations
    • Blockchain in Publications
    • Blockchain in Smart Contracts
    • Blockchain in the Energy Sector & Utilities
    • Social Network Interaction and Intelligence
    • Web Analytics & Security Incident Response
    • Organised and collaborative Maps and Networks
    • Cyber Behavioural Analytics and Profiling
    • Collaborative Situation Awareness for Decision Making
    • Trust, Privacy and Anonymity Issues
    • Digital Forensic Information Analysis
    • Enterprise Information Security Policies, Standards and Procedures
    • Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
    • Fuzzy Logic
    • Rough Set
    • Artificial Neural Networks
    • Artificial Intelligence
    • Genetic Algorithm
    • Evidence Theory (DST)
    • Bayesian Networks & Set Theory
    • Big Data Analytics
    • Game Theory
    • Graph Theory
    • Workload
    • Perception
    • Stress
    • Knowledge
    • Training and Expertise
    • Risk Assessment and Decision Making
    • Forecasting and Prediction
    • Operator SA & Team SA
    • Knowledge, Skills and Abilities (KSA)
    • Information Security
    • Cyber Security
    • Database Security
    • Application Security
    • Law Enforcement and Surveillance
    • Border Protection and Controls
    • Cyber Warfare and Counter Terrorism
    • Military Doctrinal in Situation Awareness
    • C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
    • Computer Network Operations
    • Computer Network Defense
    • Mission Awareness, Command and Control
    • Attack Graphs
    • Advanced Security Incident Analysis
    • Sensor Correlation and Cross-Correlation
    • Implementing Situation Awareness Systems
    • Information Security Metrics and Measurements
    • Proactive Defense Strategies
    • Instance-Based Learning
    • Adaptive Neural Logic
    • Human-Assisted Decision Control
    • Human in the Loop
    • Automated Self-Responder
    • Tools for Metric Optimisation
    • Visualisation and Digital Analytics
    • Data Mining
    • Filtration, Selection, and Risk-Based Prioritisation
    • Metrics for Evaluation and Assessment
    • Usefulness of Multisensor Data Fusion
    • Information Data Fusion
    • Sensor Fusion for Security Incident Analysis
    • Security Incident Analysis
    • Data Association & Correlation
    • Security Information Visualisation
    • Data Analytics
    • Security Monitoring
    • Situation Awareness in C4ISR
    • Situation Awareness in Cyber Command and Control Centres
    • Situation Awareness in Intrusion Defense
    • Situation Awareness in Cyber Physical Systems (CPS)
    • Situation Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
    • Open Source Applications
    • Assessment models and methodologies for Cyber SA
    • Cyber Situation Awareness Evaluation Recommendation
    • Cyber SA Maturity Models and Frameworks
    • Cyber SA for Social Networks
    • Functional Requirements for Situation-aware services
    • Non-Functional Requirements for Situation-aware Services and solutions
    • Interface Design
    • Interoperability
    • Dynamism
    • Complexity
    • Performance
    • Automation
    • Responsiveness
    • Architecture
    • Realtime Processing
    • Synchronisation
    • Research and development in Situation Awareness
    • Simulation and Testbeds in Cyber Situation Awareness
    • Experimentation & Instrumentation
    • Modelling
    • Knowledge-base
    • Theoretical Underpinnings in Situation Awareness
    • Team and Group SA
    • Cyber Situation Awareness Methods, Training and Education

Speakers


Important Dates

  • Full (long & short) Paper Submissions – 28 February 2022
  • Notification of Full Paper (Acceptance/Rejection) –  April 26, 2022
  • Camera Ready Paper Due – May 14, 2022
  • Participants Registration – March 26 – May 31, 2022
  • Conference Date –  June 20 – 21, 2022

Location


On-site / Hybrid

Cardiff School of Technologies (CST)
Cardiff Metropolitan University, Wales, UK



Registration

BOOK NOW


Programme Committee

    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Frank Wang – Computer Society, IEEE, United Kingdom and Ireland
    • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
    • Aunshul Rege – Temple University, Pennsylvania, USA
    • Hanan Yousry Hindy – School of Design and Informatics, Abertay University, Dundee, Scotland
    • Xavier Bellekens – University of Strathclyde, Scotland, UK
    • Martin Gilje Jaatun – University of Stavanger, Norway
    • Pierangelo Rosati – Dublin City University, Dublin, Ireland
    • Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
    • Chaminda Hewage – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Elochukwu Ukwandu – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Liqaa Nawaf – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Fiona Carroll – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Abdelrahman Abuarqoub – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Mohammad Safar – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Tahir Sheikh Bakhsh – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Arslan Ahmad – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Thanuja Mallikarachchi – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Arnau Erola – Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, UK
    • Xavier Bellekens – University of Strathclyde, Scotland, UK
    • Chaminda Hewage – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Phil Legg – University of the West of England, UK
    • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
    • Arnau Erola – Department of Computer Science, University of Oxford, UK
    • Hanan Yousry Hindy – School of Design and Informatics, Abertay University, Dundee, Scotland
    • Bertrand Venard – Audencia, OII, University of Oxford, UK
    • Chaminda Hewage – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Elochukwu Ukwandu – Cardiff School of Technologies (CST), Cardiff Metropolitan University, Wales, UK
    • Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
    • Carlos A. Perez Delgado – School of Computing, University of Kent, UK
    • Philipp Reinecke – Cardiff University, Wales, UK
    • Thomas T Y Win – School of Business & Technology, University of Gloucestershire, UK
    • Suleiman Yerima – Cyber Security, De Montfort University, UK
    • Thomas Pasquier – Department of Computer Science, University of Bristol, UK
    • Francisco J Aparicio Navarro, Cyber Technology Institute, De Montfort University, UK
    • Fabio Roli – Pattern Recognition and Applications Lab, University of Cagliari, Italy
    • Arnau Erola – Cyber Security Centre, University of Oxford, Oxford, UK
    • Aunshul Rege – Temple University, Pennsylvania, USA
    • Lynsay Shepherd – Abertay University, Scotland, UK
    • Amin Hosseinian-Far – Business Systems and Operations , University of Northampton, UK
    • Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
    • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus
    • Pierre Parrend – ECAM Strasbourg-Europe, France
    • Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada
    • Jens Myrup Pedersen – University of Aalborg, Denmark
    • Marios Anagnostopoulos – University of the Aegean, Greece
    • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
    • Ciza Thomas – College of Engineering, India
    • Stefanos Gritzalis – University of the Aegean, Greece
    • Varun Dutt – Indian Institute of Technology Mandi, India
    • Elisavet Konstantinou – University of the Aegean, Greece
    • Panagiotis Trimintzios – Cyber Crisis Cooperation & Exercises Team Operational Security, ENISA, Europe
    • Phil Legg – University of the West of England, UK
    • Huiyu Zhou – Queen’s University Belfast, Belfast, UK
    • Jason Nurse – University of Kent, UK
    • Per Hakon Meland – SINTEF, Norway
    • Martin Gilje Jaatun – University of Stavanger, Norway
    • Petra Leimich – Edinburgh Napier University, Edinburgh, Scotland, UK
    • Boniface K. Alese – Department of Computer Science, Federal University of Technology, Akure, Nigeria
    • Ensar Seker – NATO, CCD COE, Estonia
    • Ulrik Franke – Software and Systems Engineering Laboratory (SSE), RI.SE, Sweden
    • Michal Chorasm – Telecommunications and Computer Science, University of Science and Technology (UTP), Bydgoszcz, Poland
    • Ryan Heartfield – Cyber Security, University of Greenwich, London, UK
    • Lakshmi Prayaga – Department of Applied Science, Technology and Administration, University of West Florida, USA
    • Harin Sellahewa – School of Computing, The University of Buckingham, UK
    • Thaddeus Eze – Computer Science Department, University of Chester, UK
    • Dimitris Kavallieros – Center for Security Studies (KEMEA), Greece
    • Susan Rea – Nimbus Centre at Cork Institute of Technology, Ireland
    • Samir Puuska – JAMK University of Applied Sciences, Finland
    • Vasil Vassilev – School of Computing, London Metropolitan University, UK
    • Martin Gilje Jaatun – University of Stavanger, Norway
    • Shamal Faily – Cyber Security Research group (BUCSR), Bornemouth University, UK
    • Jingyue Li – Department of Computer Science, Faculty of Information Technology and Electrical Engineering, NTNU, Norway
    • Hasan Yasar – Division of the Software Engineering Institute, Carnegie Mellon University, USA