On-Site and Remote: CYBER 2020 || October 25 - 29, 2020 - Nice, France

CYBER 2020


Computer Security & Cryptography



Greetings,



With everyone's health and safety in mind, we are adapting some of the ways in which IARIA conferences are organized:

1. The submission deadlines (and other dates such as notification and camera ready) are rather flexible in order to account for possibly limited author access to the academic/industrial premises where the research work is taking place.

2. During the conference, authors will be able to present their work via pre-recorded videos and/or conference calls (in case they opt to avoid travel).

3. Selection of awarded papers and invitations for expanded versions for IARIA journals are not affected by the presentation method (pre recorded or in person)

We wish you health and safety during these times.


 


--------------



That being said, note that the submission deadline of July 20 is approaching.

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to:

CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems



Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: https://www.iariajournals.org



=================





============== CYBER 2020 | Call for Papers ===============



CALL FOR PAPERS, TUTORIALS, PANELS



CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems



General page: https://www.iaria.org/conferences2020/CYBER20.html



Submission page: https://www.iaria.org/conferences2020/SubmitCYBER20.html



Event schedule: October 25 - 29, 2020 - Nice, France



Contributions:

- regular papers [in the proceedings, digital library]

- short papers (work in progress) [in the proceedings, digital library]

- ideas: two pages [in the proceedings, digital library]

- extended abstracts: two pages [in the proceedings, digital library]

- posters: two pages [in the proceedings, digital library]

- posters: slide only [slide-deck posted at www.iaria.org]

- presentations: slide only [slide-deck posted at www.iaria.org]

- demos: two pages [posted at www.iaria.org]



Submission deadline: July 20, 2020



Extended versions of selected papers will be published in IARIA Journals: https://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: https://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: https://www.thinkmind.org



The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.



All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.



Before submission, please check and comply with the editorial rules: https://www.iaria.org/editorialrules.html





CYBER 2020 Topics (for topics and submission details: see CfP on the site)



Call for Papers: https://www.iaria.org/conferences2020/CfPCYBER20.html



============================================================



Trends in Cybersecurity

Blockchain and machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detection; Threats on critical national infrastructures; Gift card hacking techniques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical Things (IOMT); Cybersecurity for digital vehicles; Potential radicalization on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; Cybersecurity, laws and regulations; Information from browsers by online advertising platforms; Predicting social engineering victims; Cybercrime awareness



Cyber Resilience

Cyber security assessment; Data analytics for Cyber resilience; Organizational security (government, commercial); Resilient smart cities; Resilient Internet of Things (RIOT); Cyber-cities and Cyber-environments; Critical infrastructure security; Back up and recovery for systems of systems; Disaster planning and management from Cyber perspective; Integrated and smarter sensors



Cyber Security

Security management [overall information security management in the sense of 27000 series applied to cyber systems]; Compliance management [verify/check compliance with defined policies, provide corresponding management reports]; Security administration of cyber systems [technical security management of security services]; Security and privacy regulations and laws; Securely interconnected cyber systems [firewalls, cross-domain security solutions]; Self-securing and self-defending cyber systems; Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way]; Security technologies for protecting cyber systems and devices; Identity and access management in cyber systems; Anti-counterfeiting; Secure production and supply chain; Cloud computing security; Big-data security; Advanced persistent threats; Network traffic analysis and trace-back; Cyberspace operations; Incident response, investigation, and evidence handling; Intrusion detection and prevention; Cyberspace protection and anti-malware; Cooperation and sharing for Cyber-defense



Cyber Infrastructure

Cyber-Cities and Cyber-environments; Information technology infrastructure; Telecommunications and networks; Cyber-space and data centers; Cyber-enabled control systems; Cyber-enabled critical infrastructure systems; Cyber-physical systems and Internet of Things; Special application domains (smart grid, traffic management systems, autonomous driving, etc.); Embedded processors and controllers; Mobility in Cyber-space; Virtualization in Cyber-space



Cyber Forensics

Computer and networks forensics; Social networking forensics; Digital forensics tools and applications; Applications of information hiding; Identification, authentication, and collection of digital evidence; Anti-forensic techniques and methods; Watermarking and intellectual property theft; Privacy issues in network forensics; Tools, applications, case studies, best practices



Cyber Crime

Cyber-crimes: Challenges in detection/prevention; Anomalies detection; Advanced Persistent Threats and Cyber-resilience; BotNets and MobiNets; Cyber crime-related investigations; Challenges and detection of Cyber-crimes; Network traffic analysis, traceback; Security information and event management (SIEM); Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.



Nature-inspired and Bio-inspired Cyber-defense

Bio-inspired anomaly & intrusion detection; Autonomic and Adaptive Cyber-Defense; Adaptive and Evolvable Systems; Cooperative defense systems; Network artificial immune systems; Adaptation algorithms for cyber security; Biometrics related to cyber defense; Bio-inspired security and networking algorithms and technologies; Biomimetics related to cyber security; Bio-inspired cyber threat intelligence methods and systems; Bio-inspired algorithms for dependable networks; Correlations in moving-target techniques; Neural networks, evolutionary algorithms, and genetic algorithms for cyber security Prediction techniques for cyber defense; Information hiding solutions (steganography, watermarking) and detection



Social-inspired opportunistic mobile Cyber-systems

Design of cyber-physical applications for opportunistic mobile systems based on behavioral models; Social metrics for networks and systems operations; Application of mixed physical and online social network sensing; Social-aware modeling, design and development of routing algorithms in cyber-physical; Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems; Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems; Experiments with cyber-physical opportunistic mobile systems



------------------------



CYBER Series Committee: https://www.iaria.org/conferences2020/ComCYBER20.html


 



CYBER Series General Chair

Steve Chan, Decision Engineering Analysis Laboratory, USA



CYBER Series Steering Committee

Carla Merkle Westphall, UFSC, Brazil

Barbara Re, University of Camerino, Italy

Rainer Falk, Siemens AG, Corporate Technology, Germany

Soultana Ellinidou, Cybersecurity Research Center | University Libre de Bruxelles (ULB), Belgium

Anne Coull, University of New South Wales, Australia

Patrik Österberg, Mid Sweden University, Sundsvall, Sweden

Daniel Kästner, AbsInt GmbH, Germany

Steffen Fries, Siemens, Germany

 


CYBER 2020 Publicity Chair

Daniel Andoni Basterrechea, Universitat Politecnica de Valencia, Spain