[Air-L] IEEE CyberSecurity 2021 | Dublin City University | Call For Papers

HANAN HINDY 1704847 at abertay.ac.uk
Thu Nov 5 03:41:14 PST 2020


(We apologize if you receive multiple copies of this email)
****  International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2021) June 14-16, 2021 | Virtual - Dublin, Ireland ****
Theme: Advancing Cyber Security Education in a post-COVID World (https://www.c-mric.com/cs2021)

The aim of the Cyber Security 2021 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures. Cyber Security 2021 invites researchers and industry practitioners to submit papers that
encompass principles, analysis, design, methods and applications.

All submitted papers are independently peer-reviewed. All accepted papers must be registered (registrations fees TBD) and presented at the conference to be considered for listing in the IEEE Xplore Digital Library and other reputable bibliographic indexes. Previous conference papers are listed in IEEE Xplore

---------Submission Deadline
Deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2021.

---------Topics of Interest
Original papers are invited on recent advances in Cyber Security, Online Services, Blockchain, Distributed Ledger and Digital Services.
The topics in Cyber Security 2021 include but not limited to:
Cyber Security
* Information Security
* Computer Network Security
* Application Security
* Web Services Security
* Mobile Security
* Protective Security
* Software Security
* Wireless & Sensor Network Security
* Software Coding Security
* Barcode Scanner Security
* Security in Middleware, Interface and Interaction
* Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Non-repudiation
* Security Management
* Security Operations
* Digital Trust and Reputation
* Geographical Location (IP Geo-location) and Cyber Travel
* Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
* Policy, Legal, Legislation & Compliance
* Security Standardisation
* Law, Legal and Ethics

Digital Services
* Web Services
* Internet Banking
* E-Booking
* Cloud Computing
* E-Government
* Electronic Commerce
* Citizens Public Online Services
* Mobile Commerce
* E-Postal Services
* E-Health
* Online & Virtual Education
* E-Learning
* Web Chats
* Secure Protocols, Coding and Development
* Security Principles, Theory and Analysis
* Security Policy, Standards and Procedures
* Security in Business Processes
* Security Enforcing Function (SEF) Gateways
* Intrusion Detection Systems
* Intrusion Prevention Systems
* Firewalls
* Anti-Virus and Anti-Malware Gateways
* Data Loss Prevention & Encryption Services

Protection of Digital Services
* Protection of Business Information Systems
* Protection of Online Services
* Energy Sector Security, Oil and Gas and SCADA Networks
* Protection of E-Currency & E-Money Transactions
* Security, Trust, Privacy
* Security in Online Gaming Systems
* Security in e-Government and Electoral Systems
* Content Security
* Protection of Public Online Content Distribution Systems
* Secure practices, processes and procedures in Public Online Services
* Cryptography - PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
* Digital Forensics and Investigations
* HoneyPots and Honey Nets
* Critical National Infrastructures (CNIs)
* Critical Network Systems (CNS)

Security Operations Centre
* Cyber Security Operations Centre (CSOC)
* Joint Security Operations Centre (JSOC)
* Strategic Security Operations Centre (SSOC)
* Virtual Security Operations Centre (vSOC)
* Cyber SOC Designs
* SOC Design Architecture Patterns
* Threat Intelligence
* Fusion Centre & Cyber Centre
* Operations Monitoring Centre
* Security Monitoring
* Transaction Monitoring
* Web Fraud Detection (WFD)
* Incident Management
* Cyber Incident Response
* Anomaly Detection
* Heuristic Learning
* Intrusion Detection
* Computer Misuse and Abuse

Application and Container Platform Security
* Application and Container Platform (ACP)
* Container Technologies
* Security Concerns Associated with Container Technologies
* Apps
* Cultural and Technical Processes for Managing Containers & Apps
* Microservices
* Kubernetes
* Docker
* Cloud Computing
* Container Technology Architecture
* Approaches to Management, Maintenance and Processing of Containers, Apps and HostOS
* CI/CD
* Risks & Issues
* OWASP
* Open Web Application Security

Remediation and Optimisation
* Remedial Action Plans
* Risk Management
* Business Process Optimisation
* Security Management
* Policy and Standards Compliance
* Vulnerability Management
* Accreditation & Assurance
* Security Assurance and Certification
* Process, Procedure and Standardisation
* Global IT Outsourcing
* Supplier Management

DevSecOps
* Virtualisation (Network, OS, Container & Apps)
* DevOps
* API
* HostOS
* Microservices security
* Agile and Scrum Methodologies
* Issues, practices and challenges

Blockchain
* Cryptocurrency
* Bitcoin & Bit-everything
* Blockchain in Manufacturing
* Blockchain in Banking & Financial Systems
* Blockchain in Aviation
* Blockchain in Pharmaceuticals
* Blockchain in IoT
* Blockchain in Defence
* Blockchain in Cybersecurity Operations
* Blockchain in Publications
* Blockchain Education Curriculum

Security Operations Centre Management
* Design Requirements
* Principles and Operations
* SOC Security Operating Procedures (SOC SyOPs)
* Architectures and Design Considerations
* Implementation of SOC Centres
* Monitoring and Security Analysis
* Security Information and Event Management (SIEM)
* Log Analysis & Analytics
* IDS/IPS & Firewall Administration
* Alerting and Event Prioritisation
* Log Management
* Analysis Tools and Techniques
* Incident Triage
* Incident Analysis, Management, Reporting and Escalation
* Management Reports and Management Information (MI) Reports
* Coordination and Containment
* Collaboration and Incident Investigation
* National CERT Liaison
* Model of Operations
* Intelligence Interfaces and Threat Intelligence Feeds
* Asset Management, Prioritisation and Categorisation
* Investigation & Forensic Readiness

STEM & Cyber Security Education
* Cyber Security in childhood education
* Code - Teaching Education for Kids, Teens and Colleges
* Secure by Code
* Secure by Design
* Secure by Default Automation and Robotics
* Autonomous & Self-driving
* Self-Healing
* Domestic Assistance
* Autonomous Healthcare and Assistance
* Industrial Manufacturing Robotics
* Search and Rescue Operations
* Robotics Process Automation (RPA) Network Operations Centre
* Functions of NOCs
* Design Principles
* Design Architectures and Design Requirements
* Monitoring and Analysis
* Coordination
* Incident Response & Handling
* Incident Management
* Operations Management
* Models of Operations
* System Interfaces and Automation
* Asset Management
* Data Leak Prevention (DLP)
* Denial and Distributed Denial of Service (DDoS) Vulnerability Management
* Vulnerability Scanning, Ranking and Prioritisation
* IT Health Checks (ITHC)
* Vulnerability Analysis
* Vulnerability Management
* Asset Management & Configuration Management Database
* Asset Classification, Categorisation & Prioritisation



---------Social Media

Twitter: https://twitter.com/cmricorg

Facebook: https://www.facebook.com/CMRiCCyberScience/



Kind regards,

Hanan

----------------------------------

Hanan Hindy

CyberScience 2021 Co-Chair

School of Design and Informatics

Abertay University

Dundee, Scotland




More information about the Air-L mailing list