ISMCICADT 2019 - International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
Date2019-05-29 - 2019-05-31
Deadline2019-05-20
VenueGhana Technology University College, Accra Ghana, Ghana
KeywordsComputing security cyber; iot; Computational Modelling; Applications; forensics; crypp
Websitehttps://icsiot.ghsociety.org
Topics/Call fo Papers
Call for Papers for May 2019: 2019 ISMCICADT International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies
International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 is co-located with ICSIoT. Proceedings of Unclassified full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.
It is an opportunity for academics, military personnel, police, other security agencies, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research developing in the cyber warfare and cyber security area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. New threats brought about by social networking and cloud computing are gaining interest from the research community and the conference is tackling these issues.
The Areas of the symposium are
Electronic warfare
Cyber warfare and information Command, Control and Communications
Modelling and simulation
Security, surveillance and reconnaissance
IT management
Ad hoc, mesh, sensor networks
Cognitive network applications
Cooperative diversity and physical layer network coding
Cross-genre networks; Disruption-tolerant networks
Hybrid optical/RF networks
Mobility management
Next-generation wireless networks
Optical networks
Personal area and body area networks
Protocols: MAC, link-layer, network, transport
Scalability of RF networks, Network control
Smart Technology
Smart grid
Smart home
Smart country
Smart defence technology
Smart military base
Smart sensors.
Military vehicle design
Vehicle performance and survivability
Platform structural design and analysis
Dynamics and controls
Acoustics
Materials and processing
Heat transfers
Weapon system design
Vehicle verification and validation
Flight tests
Aircraft design
Platform aerodynamics
Guidance and navigation
System identification
Simulations
Hardware-in-the-loop simulations
Sensor Explosions
Electromagnetics
Radio
Control systems
Power electronics and power drives
Embedded systems
Internet of Things
Micro Electro Mechanical Systems
Mechatronics; Communication Systems
Wireless technologies
Physical sensors
Sensor networks
Sensor applications
Sensor fusion
Wired and wireless sensors systems
Radar technologies
Surveillance technologies
Radar networking
Cognitive radars
Passive radar
Ground based, shipborne, airborne, and space based radars
Synthetic aperture radars.
Applications of defence technology for noncombatant operations
Anti-terrorism
Technology in counter-drug operations
Risk analysis
Safe city
Military Cybernetics and Robotic Systems
Military Engineering, Geospatial and Meteorological Support
Weapon Systems
Special and Combat Vehicles Systems
civil-military disaster management technologies and systems
Situational Awareness for Computer Networks Defense
Computer Network Defense
Cyber Situation Awareness
Intelligence technologies
Correlation & Automation
Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
Fraud detection
Situation Assessment & Decision Making
Defense Strategy for the Enhancement of Situational Awareness
Risk Management, Governance and Compliance
Trust, Privacy and Anonymity Issues
Financial technologies
Digital Forensic Information Analysis
Enterprise Information Security Policies, Standards and Procedures
Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
Economic predictive and Analytic Technologies
Cyber Situational Awareness Tools & Techniques
Fuzzy Logic
Rough Set
Artificial Neural Networks
Artificial Intelligence
Genetic Algorithm
Evidence Theory (DST)
Bayesian Networks & Set Theory
Big Data Analytics
Game Theory
Graph Theory
Network Situational Awareness
Cyber Attack Scenarios
Situation-Aware and Context-Aware Network Applications
CERTs and CSIRTs
Security Event and Information Management
Application Security, Audits and Penetration Testing
National and Critical Infrastructure Security Issues
Information Security
Cyber Security
Database Security
Application Security
Law Enforcement and Surveillance
Border Protection and Controls
Cyber Warfare and Counter Terrorism
Situation Awareness in Military Operations
Military Doctrinal in Situation Awareness
C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
Computer Network Operations
Computer Network Defense
Mission Awareness, Command and Control
Analysis of Large-Scale Internet Traffic
Attack Graphs
Advanced Security Incident Analysis
Sensor Correlation and Cross-Correlation
Implementing Situational Awareness Systems
Information Security Metrics and Measurements
Web Traffic Characterisation
Intrusion Detection Systems
Traffic Characterisation Techniques
Web Analytics
Security Incident Response
Cyber Situational Awareness Frameworks
Proactive Defense Strategies
Instance-Based Learning
Adaptive Neural Logic
Human-Assisted Decision Control
Human in the Loop
Automated Self-Responder
Fusion Centres
Tools for Metric Optimisation
Visualisation and Digital Analytics
Data Mining
Filtration, Selection, and Risk-Based Prioritisation
Metrics for Evaluation and Assessment
Situational Awareness Applications
Situational Awareness in C4ISR
Situational Awareness in Cyber Command and Control Centres
Situational Awareness in Intrusion Defense
Situational Awareness in Cyber Physical Systems (CPS)
Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
Open Source Applications
Designing Cyber Situational Awareness Solutions and Services
Functional Requirements for Situation-aware services
Non-Functional Requirements for Situation-aware Services and solutions
Interface Design
Interoperability
Dynamism
Complexity
Performance
Automation
Realtime Processing
Usefulness of Multisensor Data Fusion
Information Data Fusion
Sensor Fusion for Security Incident Analysis
Security Incident Analysis
Data Association & Correlation
Security Information Visualisation
Data Analytics
Security Monitoring
Situational Awareness Training
Research and development in Situational Awareness
Simulation and Testbeds in Cyber Situation Awareness
Experimentation & Instrumentation
Modelling
Knowledge-base
Theoretical Underpinnings in Situation Awareness
Computational Intelligence as applied to defense and security problems
weapon system technology
cyber defense technology
system engineering for weapon system
system assurance for weapon system
test and evaluation techniques for weapon system
defense industrial security
defense scientific and technical information security
law, policy and strategy related with defense technology and security
System randomization
Artificial diversity
Cyber maneuver and agility
Software diversity
Dynamic network configuration
Moving target in the cloud
System diversification techniques
Dynamic compilation techniques
Adaptive defenses
Intelligent countermeasure selection
MTD strategies and planning
Deep learning for MTD
MTD quantification methods and models
MTD evaluation and assessment frameworks
Large-scale MTD (using multiple techniques)
Moving target in software coding, application API virtualization
Autonomous technologies for MTD
Theoretic study on modeling trade-offs of using MTD approaches
Human, social, and usability aspects of MTD
Measurement studies
Cyber warfare attacks and defense
Social cyber-attacks and defense
Memory exploitation
Applied cryptography
Network protocol vulnerability analysis
Blockchain attacks
Reverse engineering, and reverse engineering Automation
Operational experience and case studies
Malware infection vectors (drivebys, worms, mobile exploits, etc.)
Phishing
Applied decryption techniques
Eavesdropping
SPAM
Attacks and Defense of emerging technologies
Carding and identity theft
Hardware vulnerabilities
Insider threat detection and prevention
Application of data science to cyber attacks and defense
Attacks against distributed cloud storage
Target and Background Signatures
Electro-Optical and Infrared Systems: Technology and Applications
Electro-Optical Remote Sensing
Technologies for Optical Countermeasures
High Power Lasers: Technology and Systems, Platforms, Effects
Advanced Free-Space Optical Communication Techniques and Applications
Emerging Technologies
Millimetre Wave and Terahertz Sensors and Technology
Optical Materials and Biomaterials in Security and Defence Systems Technology
Counterterrorism, Crime Fighting, Forensics, and Surveillance
Quantum Technologies and Quantum Information Science
Unmanned Sensors and Systems and Countermeasures
Advanced Manufacturing Technologies for Micro- and Nanosystems in Security and Defence
NEW - Artificial Intelligence and Machine Learning in Defence Applications
Social media and related regime conflicts
Social media and the Occupy movement
Social media and student protests / austerity protests
Social media and riots / social unrest in urban areas
Social media and political protests and activism
Social media and marginal political groups
Social media, right-wing extremism, and fascism
Social media and religious violence
Social media and organized crime
Social media and policing
Social media and police violence
Social media and the state-industrial surveillance complex
Social media and Anonymous
Social media and WikiLeaks
Extraction and geocoding (address resolution) of event locations from unstructured text
Extraction and normalization of event times from unstructured text
Extraction of person/group names and sentiment from unstructured text
Extraction of other useful information from unstructured text
Processing of “noisy” sources of unstructured text (e.g., Twitter and weblogs)
Fusion of the above (or other) textual information with criminal incident data
Etc.
There will be closed door round table Technical Program Session for security personnel only.
Proceedings of Unclassified Paper full papers of the International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 is co-located with ICSIoT. Proceedings of Unclassified full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.
It is an opportunity for academics, military personnel, police, other security agencies, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research developing in the cyber warfare and cyber security area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. New threats brought about by social networking and cloud computing are gaining interest from the research community and the conference is tackling these issues.
The Areas of the symposium are
Electronic warfare
Cyber warfare and information Command, Control and Communications
Modelling and simulation
Security, surveillance and reconnaissance
IT management
Ad hoc, mesh, sensor networks
Cognitive network applications
Cooperative diversity and physical layer network coding
Cross-genre networks; Disruption-tolerant networks
Hybrid optical/RF networks
Mobility management
Next-generation wireless networks
Optical networks
Personal area and body area networks
Protocols: MAC, link-layer, network, transport
Scalability of RF networks, Network control
Smart Technology
Smart grid
Smart home
Smart country
Smart defence technology
Smart military base
Smart sensors.
Military vehicle design
Vehicle performance and survivability
Platform structural design and analysis
Dynamics and controls
Acoustics
Materials and processing
Heat transfers
Weapon system design
Vehicle verification and validation
Flight tests
Aircraft design
Platform aerodynamics
Guidance and navigation
System identification
Simulations
Hardware-in-the-loop simulations
Sensor Explosions
Electromagnetics
Radio
Control systems
Power electronics and power drives
Embedded systems
Internet of Things
Micro Electro Mechanical Systems
Mechatronics; Communication Systems
Wireless technologies
Physical sensors
Sensor networks
Sensor applications
Sensor fusion
Wired and wireless sensors systems
Radar technologies
Surveillance technologies
Radar networking
Cognitive radars
Passive radar
Ground based, shipborne, airborne, and space based radars
Synthetic aperture radars.
Applications of defence technology for noncombatant operations
Anti-terrorism
Technology in counter-drug operations
Risk analysis
Safe city
Military Cybernetics and Robotic Systems
Military Engineering, Geospatial and Meteorological Support
Weapon Systems
Special and Combat Vehicles Systems
civil-military disaster management technologies and systems
Situational Awareness for Computer Networks Defense
Computer Network Defense
Cyber Situation Awareness
Intelligence technologies
Correlation & Automation
Collaborative Situation Awareness for Decision Making
Collaborative Defense Approach
Fraud detection
Situation Assessment & Decision Making
Defense Strategy for the Enhancement of Situational Awareness
Risk Management, Governance and Compliance
Trust, Privacy and Anonymity Issues
Financial technologies
Digital Forensic Information Analysis
Enterprise Information Security Policies, Standards and Procedures
Risks posed by Wireless Networks, including through the use of Mobile Computing, BYOD, Wearable in CND environment
Economic predictive and Analytic Technologies
Cyber Situational Awareness Tools & Techniques
Fuzzy Logic
Rough Set
Artificial Neural Networks
Artificial Intelligence
Genetic Algorithm
Evidence Theory (DST)
Bayesian Networks & Set Theory
Big Data Analytics
Game Theory
Graph Theory
Network Situational Awareness
Cyber Attack Scenarios
Situation-Aware and Context-Aware Network Applications
CERTs and CSIRTs
Security Event and Information Management
Application Security, Audits and Penetration Testing
National and Critical Infrastructure Security Issues
Information Security
Cyber Security
Database Security
Application Security
Law Enforcement and Surveillance
Border Protection and Controls
Cyber Warfare and Counter Terrorism
Situation Awareness in Military Operations
Military Doctrinal in Situation Awareness
C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
Computer Network Operations
Computer Network Defense
Mission Awareness, Command and Control
Analysis of Large-Scale Internet Traffic
Attack Graphs
Advanced Security Incident Analysis
Sensor Correlation and Cross-Correlation
Implementing Situational Awareness Systems
Information Security Metrics and Measurements
Web Traffic Characterisation
Intrusion Detection Systems
Traffic Characterisation Techniques
Web Analytics
Security Incident Response
Cyber Situational Awareness Frameworks
Proactive Defense Strategies
Instance-Based Learning
Adaptive Neural Logic
Human-Assisted Decision Control
Human in the Loop
Automated Self-Responder
Fusion Centres
Tools for Metric Optimisation
Visualisation and Digital Analytics
Data Mining
Filtration, Selection, and Risk-Based Prioritisation
Metrics for Evaluation and Assessment
Situational Awareness Applications
Situational Awareness in C4ISR
Situational Awareness in Cyber Command and Control Centres
Situational Awareness in Intrusion Defense
Situational Awareness in Cyber Physical Systems (CPS)
Situational Awareness for Internet of Things (IoTs), Enterprise Internet of Things (EIoTs)
Open Source Applications
Designing Cyber Situational Awareness Solutions and Services
Functional Requirements for Situation-aware services
Non-Functional Requirements for Situation-aware Services and solutions
Interface Design
Interoperability
Dynamism
Complexity
Performance
Automation
Realtime Processing
Usefulness of Multisensor Data Fusion
Information Data Fusion
Sensor Fusion for Security Incident Analysis
Security Incident Analysis
Data Association & Correlation
Security Information Visualisation
Data Analytics
Security Monitoring
Situational Awareness Training
Research and development in Situational Awareness
Simulation and Testbeds in Cyber Situation Awareness
Experimentation & Instrumentation
Modelling
Knowledge-base
Theoretical Underpinnings in Situation Awareness
Computational Intelligence as applied to defense and security problems
weapon system technology
cyber defense technology
system engineering for weapon system
system assurance for weapon system
test and evaluation techniques for weapon system
defense industrial security
defense scientific and technical information security
law, policy and strategy related with defense technology and security
System randomization
Artificial diversity
Cyber maneuver and agility
Software diversity
Dynamic network configuration
Moving target in the cloud
System diversification techniques
Dynamic compilation techniques
Adaptive defenses
Intelligent countermeasure selection
MTD strategies and planning
Deep learning for MTD
MTD quantification methods and models
MTD evaluation and assessment frameworks
Large-scale MTD (using multiple techniques)
Moving target in software coding, application API virtualization
Autonomous technologies for MTD
Theoretic study on modeling trade-offs of using MTD approaches
Human, social, and usability aspects of MTD
Measurement studies
Cyber warfare attacks and defense
Social cyber-attacks and defense
Memory exploitation
Applied cryptography
Network protocol vulnerability analysis
Blockchain attacks
Reverse engineering, and reverse engineering Automation
Operational experience and case studies
Malware infection vectors (drivebys, worms, mobile exploits, etc.)
Phishing
Applied decryption techniques
Eavesdropping
SPAM
Attacks and Defense of emerging technologies
Carding and identity theft
Hardware vulnerabilities
Insider threat detection and prevention
Application of data science to cyber attacks and defense
Attacks against distributed cloud storage
Target and Background Signatures
Electro-Optical and Infrared Systems: Technology and Applications
Electro-Optical Remote Sensing
Technologies for Optical Countermeasures
High Power Lasers: Technology and Systems, Platforms, Effects
Advanced Free-Space Optical Communication Techniques and Applications
Emerging Technologies
Millimetre Wave and Terahertz Sensors and Technology
Optical Materials and Biomaterials in Security and Defence Systems Technology
Counterterrorism, Crime Fighting, Forensics, and Surveillance
Quantum Technologies and Quantum Information Science
Unmanned Sensors and Systems and Countermeasures
Advanced Manufacturing Technologies for Micro- and Nanosystems in Security and Defence
NEW - Artificial Intelligence and Machine Learning in Defence Applications
Social media and related regime conflicts
Social media and the Occupy movement
Social media and student protests / austerity protests
Social media and riots / social unrest in urban areas
Social media and political protests and activism
Social media and marginal political groups
Social media, right-wing extremism, and fascism
Social media and religious violence
Social media and organized crime
Social media and policing
Social media and police violence
Social media and the state-industrial surveillance complex
Social media and Anonymous
Social media and WikiLeaks
Extraction and geocoding (address resolution) of event locations from unstructured text
Extraction and normalization of event times from unstructured text
Extraction of person/group names and sentiment from unstructured text
Extraction of other useful information from unstructured text
Processing of “noisy” sources of unstructured text (e.g., Twitter and weblogs)
Fusion of the above (or other) textual information with criminal incident data
Etc.
There will be closed door round table Technical Program Session for security personnel only.
Proceedings of Unclassified Paper full papers of the International Symposium on Military Communications, Intelligence, Crime Analysis and Defense Technologies ISMCICADT 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
Other CFPs
- International Symposium on Cryptology, Watermarking , Steganography and their Applications
- International Symposium on Privacy and Security
- International Symposium on Internet of Things and Systems
- International Symposium on Blockchain and Cryptocurrencies
- International Symposium on Ethical Hacking and Digital Forensics
Last modified: 2019-04-28 17:30:00