Call for Papers 2017: ‘Defending the Core’
The 9th International Conference on Cyber Conflict (CyCon 2017) will focus on the ‘core’ aspects of cyber security. The Call for Papers invited submissions that increase understanding of the most critical cyber security issues in our digitally connected world. CyCon 2017 was open to submissions addressing topics from technical, legal, policy, strategy and military perspectives.
Digitalisation has transformed, often disrupted, our way of life, bringing innumerable social and economic benefits while technological dependencies have altered security risks. No future conflict is likely to be fought without a cyber element. However, establishing effective defensive measures is difficult. The cross-border and ever-expanding nature of digital technologies complicates our understanding of critical cyber dependencies, threats and vulnerabilities.
The Call for Papers is thus looking to address the following questions: How can the ‘core’ elements of cyber security be defined? How do they relate to the essential assets and principles in the technical, legal and political spheres? How can critical (information) infrastructure be protected? How can critical vulnerabilities be mitigated and the most detrimental threats countered? How can legal frameworks be established and applied in the cyber security realm? What technologies can help nations to counter emerging cyber threats? How can effective cyber security strategies be developed and implemented? What should be the role of the armed forces? How can cyber operations against core (national) assets be deterred?
For details, see the information and documents below.
CyCon 2017 is interested in original research related to topics such as:
- Mitigating hardware and software vulnerabilities (incl. moving target defence, zero days)
- Critical infrastructure protection and resilience (incl. ICS/SCADA, industrial platforms and protocols, undersea cables and smart grids)
- The Internet of Things and cyber-physical systems
- Mobile, cloud and big data security
- Future use of encryption
- Technical protocols and platforms (incl. IPv6)
- Digital trust and authentication
- Situational awareness (incl. visualisation)
- State-sponsored cyber operations (incl. Advanced Persistent Threats, use of proxy actors)
- Attribution and digital forensics
- Military doctrine, cyber as a domain of warfare
- Active/responsive cyber defence
- Hybrid warfare
- Cyber deterrence
- Cyber terrorism
- Public international law and international norms (incl. rights and obligations of states and international organisations, cyber operations by non-state actors (esp. private sector), human rights in cyberspace)
- Autonomous cyber weapon systems
- Personal data protection, surveillance and privacy
- Governance of cyberspace
- National cyber security strategies
- International cooperation models (cross-border dependencies, trans-border access to data)
- Supply chain security
- Crisis management mechanisms
- Public-private dependencies.
Authors are asked to submit an abstract of the planned paper, which should describe the topic and set out the main aspects and structure of the study (300–500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers (up to 6000 words, incl. footnotes and references) meeting high academic research standards. Submitted papers will be subject to a double-blind peer review.
Submission details, author guidance, copyright transfer form and other practical information will be available on our website at www.cycon.org/cfp. The abstracts and manuscripts must be uploaded electronically to https://www.easychair.org/conferences/?conf=cycon2017 after creating an account.
Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE) and accommodation for the duration of the conference, as well as social events in Tallinn.