CYBER 2020 - The Fifth International Conference on Cyber-Technologies and Cyber-Systems
	October 25, 2020 - October 29, 2020
 CYBER 2020
	ISSN: 2519-8599
	ISBN: 978-1-61208-818-1 
		CYBER 2020 is colocated with the following events as part of NexTech 2020 Congress:
		  - UBICOMM 2020, The Fourteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
- ADVCOMP 2020, The Fourteenth International Conference on Advanced Engineering Computing and Applications in Sciences
- SEMAPRO 2020, The Fourteenth International Conference on Advances in Semantic Processing
- AMBIENT 2020, The Tenth International Conference on Ambient Computing, Applications, Services and Technologies
- EMERGING 2020, The Twelfth International Conference on Emerging Networks and Systems Intelligence
- DATA ANALYTICS 2020, The Ninth International Conference on Data Analytics
- GLOBAL HEALTH 2020, The Ninth International Conference on Global Health Challenges
- CYBER 2020, The Fifth International Conference on Cyber-Technologies and Cyber-Systems
CYBER 2020 General Chair
  
    |  |  | Steve ChanDecision Engineering Analysis Laboratory
 USA
 
 |  |  |   | 
 
CYBER 2020 Steering Committee
  
    |  |  | Carla Merkle WestphallUFSC
 Brazil
 
 |  |  | Barbara ReUniversity of Camerino
 Italy
 
 | 
  
    |  |  | Rainer FalkSiemens AG, Corporate Technology
 Germany
 
 |  |  | Soultana EllinidouCybersecurity Research  Center | University Libre de Bruxelles (ULB)
 Belgium
 
 | 
  
    |  |  | Anne CoullUniversity of New South Wales
 Australia
 
 |  |  | Patrik ÖsterbergMid Sweden University,  Sundsvall
 Sweden
 
 | 
  
    |  |  | Daniel KästnerAbsInt GmbH
 Germany
 
 |  |  | Steffen FriesSiemens
 Germany
 
 | 
 
  Special tracks:
  SCADD: Side Channel Attacks, Detection & Defenses
  Chairs and  Coordinators:
  Dr. Khurram Bhatti, Associate Professor, Information Technology University (ITU), Lahore,  Pakistan khurram.bhatti@itu.edu.pk
  Dr. Maria Mushtaq, Scientific Researcher, LIRMM –CNRS, University of Montpellier, France maria.mushtaq@lirmm.fr
  IoTApp: Applications of IoT Technologies
  Chair and  Coordinator:   Dr. Xing Liu, Kwantlen Polytechnic University, Surrey, B.C., Canada xing.liu@kpu.ca
  SIAS: Security of Intelligent Autonomous Systems
    Chair  and Coordinator: 
  Ramesh  Kumar Rakesh, Researcher, R&D Centre, Hitachi Ltd, India ramesh.rakesh@hitachi.co.in
  Co-Chair: 
  Prof.  Dr. Chiranjib Bhattacharya, Indian Institute of Science, Bangalore, India chiru@iisc.ac.in
 
 
CYBER 2020 conference tracks:
Trends            in Cybersecurity
 Blockchain and machine learning for cybersecurity; Behavioral          biometrics authentication;          Privacy by design; Anonymity of blockchain and cryptocurrencies;          Threat categorization          and threat detection; Threats on critical national          infrastructures; Gift card hacking          techniques; Medical IoT Device-to-Device communication;          Blockchain in          supporting critical infrastructures; Vulnerability on social          media spaces; Internet          of Medical Things (IOMT); Cybersecurity for digital vehicles;          Potential radicalization          on social media; Blockchain and healthcare systems; Risk-based          human behavior profiling;          Forensic recovery of cloud evidence; Hacking pacemakers;          Prediction of cyber attacks;          Ransomware cyberweapon; Liability attribution in smart          workplaces;          Cybersecurity,  laws and          regulations;  Information          from browsers by online advertising          platforms; Predicting social engineering victims; Cybercrime          awareness
Cyber Resilience
 Cyber security assessment;   Data analytics for Cyber resilience;   Organizational security (government, commercial);   Resilient smart cities;   Resilient Internet of Things (RIOT);   Cyber-cities and Cyber-environments;   Critical infrastructure security;   Back up and recovery for systems of systems;   Disaster planning and management from Cyber perspective;   Integrated and smarter sensors
Cyber Security
	  Security management [overall information security management in the sense of 27000 series applied to cyber systems];          Compliance management [verify/check compliance with defined policies, provide corresponding management reports];          Security administration of cyber systems [technical security management of security services];          Security and privacy regulations and laws;          Securely interconnected cyber systems [firewalls, cross-domain security solutions];          Self-securing and self-defending cyber systems;          Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way];          Security technologies for protecting cyber systems and devices;          Identity and access management in cyber systems;          Anti-counterfeiting;          Secure production and supply chain; Cloud computing security;          Big-data security;          Advanced persistent threats;          Network traffic analysis and trace-back;          Cyberspace operations;          Incident response, investigation, and evidence handling;          Intrusion detection and prevention;          Cyberspace protection and anti-malware;          Cooperation and sharing for Cyber-defense
Cyber Infrastructure
	  Cyber-Cities and Cyber-environments;          Information technology infrastructure;          Telecommunications and networks;          Cyber-space and data centers;          Cyber-enabled control systems;          Cyber-enabled critical infrastructure systems;          Cyber-physical systems and Internet of Things;          Special application domains (smart grid, traffic management systems, autonomous driving, etc.);          Embedded processors and controllers;          Mobility in Cyber-space;          Virtualization in Cyber-space
Cyber Forensics
	  Computer and networks forensics;          Social networking forensics;          Digital forensics tools and applications;          Applications of information hiding;          Identification, authentication, and collection of digital evidence;          Anti-forensic techniques and methods;          Watermarking and intellectual property theft;          Privacy issues in network forensics;          Tools, applications, case studies, best practices
Cyber Crime
	  Cyber-crimes: Challenges in detection/prevention;          Anomalies detection;          Advanced Persistent Threats and Cyber-resilience;          BotNets and MobiNets;          Cyber crime-related investigations;          Challenges and detection of Cyber-crimes;          Network traffic analysis, traceback;          Security information and event management (SIEM);          Stealthiness improving techniques: information hiding, steganography/steganalysis, etc. 
Nature-inspired and Bio-inspired Cyber-defense
 Bio-inspired anomaly & intrusion detection;          Autonomic and Adaptive Cyber-Defense;          Adaptive and Evolvable Systems;          Cooperative defense systems;          Network artificial immune systems;          Adaptation algorithms for cyber security;          Biometrics related to cyber defense;          Bio-inspired security and networking algorithms and technologies;            Biomimetics related to cyber security;          Bio-inspired cyber threat intelligence methods and systems;          Bio-inspired algorithms for dependable networks;          Correlations in moving-target techniques;          Neural networks, evolutionary algorithms, and genetic algorithms   for cyber security Prediction techniques for cyber defense;          Information hiding solutions (steganography, watermarking) and   detection 
Social-inspired opportunistic mobile Cyber-systems
	  Design of cyber-physical applications for opportunistic mobile systems based on behavioral models;          Social metrics for networks and systems operations;          Application of mixed physical and online social network sensing;          Social-aware modeling, design and development of routing algorithms in cyber-physical;          Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems;          Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems;          Experiments with cyber-physical opportunistic mobile systems
Deadlines:
	
              | Submission | Jul 20, 2020 | 
              | Notification | Aug 18, 2020 | 
              | Registration | Aug 30, 2020 | 
              | Camera ready | Sep 11, 2020 | 
    
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).