IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
CYBER 2019 : The Fourth International Conference on Cyber-Technologies and Cyber-Systems
CYBER 2019 : The Fourth International Conference on Cyber-Technologies and Cyber-Systems

CYBER 2019 : The Fourth International Conference on Cyber-Technologies and Cyber-Systems

Porto, Portugal
Event Date: September 22, 2019 - September 26, 2019
Submission Deadline: June 10, 2019
Notification of Acceptance: July 13, 2019
Camera Ready Version Due: August 07, 2019




Call for Papers

INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to:

- CYBER 2019, The Fourth International Conference on Cyber-Technologies and Cyber-Systems

The submission deadline is June 10, 2019

Proceedings will be submitted for indexing in Web of Science (WoS) (ISI Thompson Reuters)

Authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org

=================


============== CYBER 2019 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS


CYBER 2019, The Fourth International Conference on Cyber-Technologies and Cyber-Systems

General page: http://www.iaria.org/conferences2019/CYBER19.html

Submission page: http://www.iaria.org/conferences2019/SubmitCYBER19.html


Event schedule: September 22, 2019 to September 26, 2019 - Porto, Portugal


Contributions:

- regular papers [in the proceedings, digital library]

- short papers (work in progress) [in the proceedings, digital library]

- ideas: two pages [in the proceedings, digital library]

- extended abstracts: two pages [in the proceedings, digital library]

- posters: two pages [in the proceedings, digital library]

- posters: slide only [slide-deck posted at www.iaria.org]

- presentations: slide only [slide-deck posted at www.iaria.org]

- demos: two pages [posted at www.iaria.org]

- doctoral forum submissions: [in the proceedings, digital library]


Proposals for:

- mini symposia: see http://www.iaria.org/symposium.html

- workshops: see http://www.iaria.org/workshop.html

- tutorials: [slide-deck posed on www.iaria.org]

- panels: [slide-deck posed on www.iaria.org]


Submission deadline: May 13, 2019


Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org


The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the editorial rules: http://www.iaria.org/editorialrules.html


CYBER 2019 Topics (for topics and submission details: see CfP on the site)

Call for Papers: http://www.iaria.org/conferences2019/CfPCYBER19.html

============================================================

Cyber Resilience

Cyber security assessment; Data analytics for Cyber resilience; Organizational security (government, commercial); Resilient smart cities; Resilient Internet of Things (RIOT); Cyber-cities and Cyber-environments; Critical infrastructure security; Back up and recovery for systems of systems; Disaster planning and management from Cyber perspective; Integrated and smarter sensors

Cyber Security

Security management [overall information security management in the sense of 27000 series applied to cyber systems]; Compliance management [verify/check compliance with defined policies, provide corresponding management reports]; Security administration of cyber systems [technical security management of security services]; Security and privacy regulations and laws; Securely interconnected cyber systems [firewalls, cross-domain security solutions]; Self-securing and self-defending cyber systems; Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way]; Security technologies for protecting cyber systems and devices; Identity and access management in cyber systems; Anti-counterfeiting; Secure production and supply chain; Cloud computing security; Big-data security; Advanced persistent threats; Network traffic analysis and trace-back; Cyberspace operations; Incident response, investigation, and evidence handling; Intrusion detection and prevention; Cyberspace protection and anti-malware; Cooperation and sharing for Cyber-defense

Cyber Infrastructure

Cyber-Cities and Cyber-environments; Information technology infrastructure; Telecommunications and networks; Cyber-space and data centers; Cyber-enabled control systems; Cyber-enabled critical infrastructure systems; Cyber-physical systems and Internet of Things; Special application domains (smart grid, traffic management systems, autonomous driving, etc.); Embedded processors and controllers; Mobility in Cyber-space; Virtualization in Cyber-space

Cyber Forensics

Computer and networks forensics; Social networking forensics; Digital forensics tools and applications; Applications of information hiding; Identification, authentication, and collection of digital evidence; Anti-forensic techniques and methods; Watermarking and intellectual property theft; Privacy issues in network forensics; Tools, applications, case studies, best practices

Cyber Crime

Cyber-crimes: Challenges in detection/prevention; Anomalies detection; Advanced Persistent Threats and Cyber-resilience; BotNets and MobiNets; Cyber crime-related investigations; Challenges and detection of Cyber-crimes; Network traffic analysis, traceback; Security information and event management (SIEM); Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.

Nature-inspired and Bio-inspired Cyber-defense

Bio-inspired anomaly & intrusion detection; Autonomic and Adaptive Cyber-Defense; Adaptive and Evolvable Systems; Cooperative defense systems; Network artificial immune systems; Adaptation algorithms for cyber security; Biometrics related to cyber defense; Bio-inspired security and networking algorithms and technologies; Biomimetics related to cyber security; Bio-inspired cyber threat intelligence methods and systems; Bio-inspired algorithms for dependable networks; Correlations in moving-target techniques; Neural networks, evolutionary algorithms, and genetic algorithms for cyber security Prediction techniques for cyber defense; Information hiding solutions (steganography, watermarking) and detection

Social-inspired opportunistic mobile Cyber-systems

Design of cyber-physical applications for opportunistic mobile systems based on behavioral models; Social metrics for networks and systems operations; Application of mixed physical and online social network sensing; Social-aware modeling, design and development of routing algorithms in cyber-physical; Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems; Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems; Experiments with cyber-physical opportunistic mobile systems


------------------------

CYBER 2019 Committee: http://www.iaria.org/conferences2019/ComCYBER19.html



Credits and Sources

[1] CYBER 2019 : The Fourth International Conference on Cyber-Technologies and Cyber-Systems


Check other Conferences, Workshops, Seminars, and Events


OTHER CYBER SECURITY EVENTS

ICCSIE 2024: 9th International Conference on Cyber Security and Information Engineering
Kuala Lumpur, Malaysia
Sep 15, 2024
APWG eCrime 2024: APWG Symposium on Electronic Crime Research - Sept 24-26 - Boston
Boston
Sep 24, 2024
ITADATA 2024: The 3rd Italian Conference on Big Data and Data Science
Pisa, Italy
Sep 17, 2024
ICITEICS 2024: International Conference on Information Technology, Electronics and Intelligent Communication Systems
Bangalore, India
Jun 28, 2024
LCN MarCaS 2024: 2nd IEEE LCN Special Track on Maritime Communication and Security (MarCaS)
Caen, Normandy, France
Oct 8, 2024
SHOW ALL

OTHER FORENSICS EVENTS

IMF 2024: International Conference on IT Security Incident Management & IT Forensics
Saarbrücken, Germany
Sep 17, 2024
IWBF 2025: 13th International Workshop on Biometrics and Forensics 2023
Munich, Germany
Apr 24, 2025
WSDF 2024: 17th International Workshop on Digital Forensics
Vienna, Austria
Jul 30, 2024
IoT-SECFOR 2024: The 8th International Workshop on Security and Forensics of IoT
Vienna, Austria
Jul 30, 2024
IEEE WIFS 2024: 16th IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) 2024
Rome, Italy
Dec 2, 2024
SHOW ALL

OTHER CYBER CRIME EVENTS

CYBER 2023: The Eighth International Conference on Cyber-Technologies and Cyber-Systems
Porto, Portugal
Sep 25, 2023
CYBER 2021: The Sixth International Conference on Cyber-Technologies and Cyber-Systems
Barcelona, Spain
Oct 03, 2021
ICGS3 2021: VIRTUAL 13th International Conference on Global Security, Safety & Sustainability
Virtual Conference
Jan 14, 2021
BDA CCIP 2020: The 4th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
Atlanta, Georgia, USA
Dec 10, 2020
AICDSP 2020: Special Issue on Artificial Intelligence for Cyber Defence and Smart Policing

SHOW ALL