IEEE International Conference on Cyber Incident Response, Coordination, Containment & Control

Cyber Incident 2019


Forensic Science



**** IEEE Cyber Incident 2019, June 3-4, Oxford University, UK ****
-------------------- DESCRIPTION --------------------------------
The IEEE International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2019) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.
The aim of the Cyber Incident 2019 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.
Cyber Incident 2019 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.
-------------------- KEYNOTE SPEAKERS --------------------------------
* Prof. Aunshul Rege, Associate Professor with the Department of Criminal Justice at Temple University, USA.
* Prof. Mike Hinchey is the Chair of IEEE UK & Ireland Section for 2018-2019.
* Prof. Sadie Creese is a Professor of Cyber Security in the Department of Computer Science at the University of Oxford.
* Prof. Awais Rashid is a Professor of Cyber Security at University of Bristol, UK
* TBA
* TBA
-------------------- IMPORTANT DATES --------------------------------
The Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2019.
All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.
-------------------- TOPICS of INTEREST --------------------------------
Original papers are invited on recent advances in Incident Detection and Mitigation. The topics in Cyber Incident 2019 include but not limited to:
*Cyber Incident Response*
· Cyber Incident Analysis
· Cyber Incident Triage
· Cyber Incident Correlation and Assessment
· Coordination
· Containment
· Root Cause Analysis (RCA)
· Timeliness
· Handling and Handling Process
· Reporting
· Escalation
· Cyber Incident Management
*Decision Control*
· Decision Control
· Emergence Services
· Preparedness
· Readiness
· Analysis
· Risk Management
· Conditionality
· Proportionality
· Prioritisation
· Decision Making
· Risk-Based Decision
· Human in the Loop
*Preparedness & Readiness*
· Training
· Processes and Procedures
· Policy and Standards
· Emergency Services
· Chain of Custody
· Forensic Readiness and Investigations
· Cyber Incident Notification and Announcements
· Cyber Incident Management Tool
· Standardisation
· Framework and Methodology
· Expertise, Skills, Knowledge and Resource
· Maturity Model and Goal Setting
· Certification and Accreditation
· Memberships to Cyber Incident Responders, Incident Response Organisation
*Digital Forensicc*
· Rule-Based Systems
· Expert Systems
· Adaptive Learning Systems
· Predictive Systems
· The use of Biometrics to aid Forensic Investigations
· Speak, audio and voice Recognition for forensics
· Correlation and cross-correlation for Incident Analysis
· Cross-Domain Analysis
· Cross-Channel Incident Analysis
· Multi-domain Analysis
· Digital Forensics Principles, Rules and Standards
· Digital Forensic Investigations
· Speak, audio and voice Recognition for forensics
· Chain of Custody
· Mobile Forensics
· Live data and live stream forensics
· Live Imagery Forensics
· Memory Forensics
· Browser and Cache Memory Forensics
** Threat and Adversarial Modelling **
· Data-Centric System Threat Modelling
· Attack Tree
· Exploits and Attack Modelling
· Attack Vector and Attack Surface
· Risk, Control and Control Objectives
· Analysing Threat Modelling
· Cyber Incident Management
· Business Continuity Plan and Measures
· Root Cause Analysis
· Security Metrics
· Threat Intelligence
-------------------------------- BEST PAPERS --------------------------------
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the ·conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.