January 29, 2026

Capitalizations Index – B ∞/21M

International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019)

International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019)
Theme: Social-political impacts of cyber security in the face of BREXIT.   Call for Papers IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2019), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services. The aim of the Cyber Security 2019 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture. Cyber Security 2019 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed. The conference proceedings will be submittedfor consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search. The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members. Details Cyber Security 2019,  in conjunction with the International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE 2019), is co-located with other conferences as part of Cyber Science 2019. Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE 2019) will be presented at the conference. Posters & Presentations will be presented at the conference. Industry track is available for discussing and publishing pilot and proof of concepts. Work in Progress track is available for preliminary work. Research Ideas track is available for ideas in early stages assessment. PhD Seminar track is available for discussing and publishing early PhD thesis research. Paper Submission The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2019. All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal. Full paper submission should be via Easychair Conference Portal.   Online Submission The online submission process is now open! Please prepare your paper according to the formatting guidelines (Word document/PDF template/LaTeX). Please also find here the copyright-form, which must be completed for all accepted papers. Authors must use the online submission systems hosted by EasyChair Conference System to submit their papers. If you don’t have an EasyChair account you will need to create one and then login in order to submit your papers. Please read the Submission Instructions before submitting your work in the system. Submission Instructions Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the IEEE templates that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2‐page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings. Topics of Interest CYBER SECURITY Information Security Computer Network Security Application Security Web Services Security Mobile Security Protective Security Software Security Wireless & Sensor Network Security Software Coding Security Barcode Scanner Security Security in Middleware, Interface and Interaction Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation Security Management Security Operations Digital Trust and Reputation Geographical Location (IP Geolocation) and Cyber Travel Geospatial Intelligence Networks (Centralised, Distributed & Hybrid) Policy, Legal, Legislation & Compliance Security Standardisation Law, Legal and Ethics DIGITAL SERVICES Web Services Internet Banking E-Booking Cloud Computing E-Government Electronic Commerce Citizens Public Online Services Mobile Commerce E-Postal Services E-Health Online & Virtual Education E-Learning Web Chats Secure Protocols, Coding and Development Security Principles, Theory and Analysis Security Policy, Standards and Procedures Security in Business Processes Security Enforcing Function (SEF) Gateways Intrusion Detection Systems Intrusion Prevention Systems Firewalls Anti-Virus and Anti-Malware Gateways Data Loss Prevention Encryption Services PROTECTION OF DIGITAL SERVICES Protection of Business Information Systems Protection of Online Services Public Online Services Internet Banking Security, Trust, Privacy Security in Online Gaming Systems Security in e-Government and Electoral Systems Content Security Protection of Public Online Content Distribution Systems Secure practices, processes and procedures in Public Online Services Cryptography  –  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices Digital Forensics and Investigations HoneyPots and Honey Nets Critical National Infrastructures (CNIs) Critical Network Systems (CNS) SECURITY OPERATIONS CENTRE Cyber Security Operations Centre (CSOC) Joint Security Operations Centre (JSOC) Strategic Security Operations Centre (SSOC) Virtual Security Operations Centre (vSOC) Cyber SOC Designs SOC Design Architecture Patterns Threat Intelligence Fusion Centre & Cyber Centre Operations Monitoring Centre Security Monitoring Transaction Monitoring Web Fraud Detection (WFD) Incident Management Cyber Incident Response Anomaly Detection Heuristic Learning Intrusion Detection Computer Misuse and Abuse SECURITY OPERATIONS CENTRE MANAGEMENT Design Requirements Principles and Operations SOC Security Operating Procedures (SOC SyOPs) Architectures and Design Considerations Implementation of SOC Centres Monitoring and Security Analysis Security Information and Event Management (SIEM) Log Analysis & Analytics IDS/IPS & Firewall Administration Alerting and Event Prioritisation Log Management Analysis Tools and Techniques Incident Triage Incident Analysis, Management, Reporting and Escalation Management Reports and Management Information (MI) Reports Coordination and Containment Collaboration and Incident Investigation National CERT Liaison Model of Operations Intelligence Interfaces and Threat Intelligence Feeds Asset Management, Prioritisation and Categorisation Investigation & Forensic Readiness NETWORK OPERATIONS CENTRE Functions of NOCs Design Principles Design Architectures and Design Requirements Monitoring and Analysis Coordination Incident Response & Handling Incident Management Operations Management Models of Operations System Interfaces and Automation Asset Management Data Leak Prevention (DLP) Denial and Distributed Denial of Service (DDoS) VULNERABILITY MANAGEMENT Vulnerability Scanning, Ranking and Prioritisation IT Health Checks (ITHC) Vulnerability Analysis Vulnerability Management Asset Management & Configuration Management Database Business Information Systems Management Asset Classification, Categorisation & Prioritisation REMEDIATION AND OPTIMISATION Remedial Action Plans Risk Management Business Process Optimisation Security Management Policy and Standards Compliance Vulnerability Management Accreditation & Assurance Security Assurance and Certification Process, Procedure and Standardisation Global IT Outsourcing Supplier Management ROBOTICS Autonomous & Self-driving Self-Healing Domestic Assistance Autonomous Healthcare and Assistance Industrial Manufacturing Robotics Search and Rescue Operations BLOCKCHAIN Cryptocurrency bitcoin & Bit-everything Blockchain in Manufacturing Blockchain in Banking & Financial Systems Blockchain in Aviation Blockchain in Pharmaceuticals Blockchain in IoT Blockchain in Defence Blockchain in Cybersecurity Operations Blockchain in Publications STEM & CYBER SECURITY EDUCATION Cyber Security in childhood education Code – Teaching Coding for Kids, Teens and Colleges Secure by Code Secure by Design Secure by Default APPLICATION CONTAINER PLATFORM SECURITY ACP Container Technologies Security Concerns Associated with Container Technologies Apps Cultural and Technical Processes for Managing Containers & Apps Microservices Kubernetes Docker Cloud Computing Virtualisation (Network, OS, Container & Apps) DevOps API HostOS Container Technology Architecture Approaches to Management, Maintenance and Processing of Containers, Apps and HostOS CI/CD Risks & Issues OWASP Open Web Application Security IMPORTANT DATES Industry (Proof of Concept / Pilot) Submission –   January 26, 2019 Extended Abstract (Work in Progress) –  January 26, 2019 PhD Seminar Submissions – January 26, 2019 Research Ideas – January 26, 2019 Poster/Demo Submissions – January 26, 2019 Special Track Submissions – January 26, 2019 Workshops and Tutorials Submission – January 26, 2019 Full Paper Submissions – January 26, 2019 Notification of Full Paper/Abstract / Special Track Acceptance/Rejection –  March 26, 2019  Camera Ready Paper Due – April 14, 2019 Participants Registration – March 26 – May 6, 2019 Conference Date –  June 3 – 4, 2019 Programme Committee STEERING COMMITTEE CHAIRS Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK Frank Wang – IEEE, United Kingdom and Ireland PROGRAMME COMMITTEE Erin Kenneally – Cyber Security Division, Science and Technology Directorate, Department of Homeland Security, USA Ensar Seker – NATO, CCD COE, Estonia Logan Mailloux – European Office of Aerospace Research and Development, US Air Force, USAF, USA Martin Span – Systems Engineering, US Air Force Academy, USAF, USA Sangarapillai Lambotharan – Digital Communications, Loughborough University, Leicestershire, UK Kostas Kyriakopoulos – Digital Communications, Loughborough University, Leicestershire, UK Joe Burton – Political Science and Public Policy Programme, The University of Waikato, New Zealand He (Mary) Hongmei – AI and Cyber Security for Manufacturing, Cranfield University, UK Carolina Nogueira – DISCO | Distributed Computer Systems Lab, Computer Science Department, TU Kaiserslautern, Germany Aunshul Rege – Temple University, Pennsylvania, USA Jason Nurse – University of Kent, UK Per Hakon Meland – SINTEF, Norway Andrea Cullen – Director of Cyber Security Interdisciplinary Centre, University of Bradford, UK Wasim Alhamdani – College of Computer Science & Information Technology, University of Dammam, Saudi Arabia David Brosset –  Naval Academy Research Institute, France Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK Deepthi Ratnayake – London Metropolitan University, London, UK Uwe Glässer –  School of Computing Science, Simon Fraser University, Canada Thomas Owens – Brunel University, London, UK Jens Myrup Pedersen – University of Aalborg, Denmark Marios Anagnostopoulos – University of the Aegean, Greece Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA Ciza Thomas – College of Engineering, India Stefanos Gritzalis – University of the Aegean, Greece Janne Merete Hagen – Norwegian Defence Research Establishment, Norway Varun Dutt – Indian Institute of Technology Mandi, India Georgios Kambourakis – University of the Aegean, Greece Elisavet Konstantinou – University of the Aegean, Greece Pierre Parrend – ECAM Strasbourg-Europe, France Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK Amar K. Seeam – Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius Kevin Curran – Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus Tim D Williams – Cyber Security, London, UK Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK Abdulrahman Alarifi  – Computer Research Institute, King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia Spyros Kokolakis – University of the Aegean, Greece Ioanna Topa – University of the Aegean, Greece Boniface K. Alese – Department of Computer Science, Federal University of Technology, Akure, Nigeria Keeley Crockett – IEEE Women in Engineering & School of Computing, Maths and Digital Technology, Manchester Metropolitan University, UK Eva Papadogiannaki  – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece Zisis Tsiatsikas  – University of the Aegean, Karlovassi, Greece Michalis Diamantaris  – Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece Hamed Taherdoost – Hamta Group, Hamta Business Solution, Kuala Lumpur, Malaysia Jorge Varela Barreras – Oxford Research Staff Society Engineering Science, University of Oxford, UK Edwin K. Kairu – Carnegie Mellon University, CMU Africa Naghmeh Moradpoor – Cybersecurity & Networks, Edinburgh Napier University, Scotland, UK
starting on 2019-06-03 08:30:00

Address:
University of Oxford
Oxford Martin School
Oxford
United Kingdom

Previous Article

Texas Regulators Issue Cease and Desist Order Against My Crypto Mine

Next Article

Customer Success Specialist

You might be interested in …