IEEE International Conference on Cyber Incident Response, Coordination, Containment & Control

Cyber Incident 2020


Forensic Science



Theme: Tactics, Techniques and Procedures (TTPs) for Cyber Incident Response in a fast paced Digital World
-------------------- DESCRIPTION --------------------------------
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2020) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.
The aim of the Cyber Incident 2020 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
Cyber Incident 2020 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.
The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.
Details
Cyber Incident 2020 is co-located with other conferences as part of Cyber Science 2020
Posters will be presented during the conference.
Industry track is available for discussing and publishing pilot and proof of concepts.
Work in Progress track is available for preliminary work.
Research Ideas track is available for ideas in early stages assessment.
PhD Seminar track is available for discussing and publishing early PhD thesis research.
-------------------- KEYNOTE SPEAKERS --------------------------------
* TBA
* TBA
* TBA
* TBA
* TBA
* TBA
-------------------- IMPORTANT DATES --------------------------------
The Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2020.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
-------------------- TOPICS of INTEREST --------------------------------
Original papers are invited on recent advances in Incident Detection and Mitigation. The topics in Cyber Incident 2019 include but not limited to:
*Cyber Incident Response*
· Cyber Incident Analysis
· Cyber Incident Triage
· Cyber Incident Correlation and Assessment
· Coordination
· Containment
· Root Cause Analysis (RCA)
· Timeliness
· Handling and Handling Process
· Reporting
· Escalation
· Cyber Incident Management
*Decision Control*
· Decision Control
· Emergence Services
· Preparedness
· Readiness
· Analysis
· Risk Management
· Conditionality
· Proportionality
· Prioritisation
· Decision Making
· Risk-Based Decision
· Human in the Loop
*Preparedness & Readiness*
· Training
· Processes and Procedures
· Policy and Standards
· Emergency Services
· Chain of Custody
· Forensic Readiness and Investigations
· Cyber Incident Notification and Announcements
· Cyber Incident Management Tool
· Standardisation
· Framework and Methodology
· Expertise, Skills, Knowledge and Resource
· Maturity Model and Goal Setting
· Certification and Accreditation
· Memberships to Cyber Incident Responders, Incident Response Organisation
*Digital Forensicc*
· Rule-Based Systems
· Expert Systems
· Adaptive Learning Systems
· Predictive Systems
· The use of Biometrics to aid Forensic Investigations
· Speak, audio and voice Recognition for forensics
· Correlation and cross-correlation for Incident Analysis
· Cross-Domain Analysis
· Cross-Channel Incident Analysis
· Multi-domain Analysis
· Digital Forensics Principles, Rules and Standards
· Digital Forensic Investigations
· Speak, audio and voice Recognition for forensics
· Chain of Custody
· Mobile Forensics
· Live data and live stream forensics
· Live Imagery Forensics
· Memory Forensics
· Browser and Cache Memory Forensics
** Threat and Adversarial Modelling **
· Data-Centric System Threat Modelling
· Attack Tree
· Exploits and Attack Modelling
· Attack Vector and Attack Surface
· Risk, Control and Control Objectives
· Analysing Threat Modelling
· Cyber Incident Management
· Business Continuity Plan and Measures
· Root Cause Analysis
· Security Metrics
· Threat Intelligence
-------------------------------- BEST PAPERS --------------------------------
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the ·conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.
-------------------- ---------SOCIAL MEDIA --------------------------------
Twitter: https://twitter.com/cmricorg
Facebook : https://www.facebook.com/CMRiCCyberScience/