CYBER 2023 - The Eighth International Conference on Cyber-Technologies and Cyber-Systems
	September 25, 2023 - September 29, 2023
 CYBER 2023
Due to multiple requests, the submission deadline has been moved.
Onsite and Online Options: In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
	ISSN: 2519-8599
	ISBN: 978-1-68558-113-8 
		CYBER 2023 is colocated with the following events as part of NexTech 2023 Congress:
		  - UBICOMM 2023, The Seventeenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
 	  - ADVCOMP 2023, The Seventeenth International Conference on Advanced Engineering Computing and Applications in Sciences
 	  - SEMAPRO 2023, The Seventeenth International Conference on Advances in Semantic Processing
 	  - AMBIENT 2023, The Thirteenth International Conference on Ambient Computing, Applications, Services and Technologies
 	  - EMERGING 2023, The Fifteenth International Conference on Emerging Networks and Systems Intelligence
 	  - DATA ANALYTICS 2023, The Twelfth International Conference on Data Analytics
 	  - GLOBAL HEALTH 2023, The Twelfth International Conference on Global Health Challenges
 	  - CYBER 2023, The Eighth International Conference on Cyber-Technologies and Cyber-Systems
 	
CYBER 2023 Steering Committee Chair
  
    |   | 
      | 
    Steve Chan 
      Decision Engineering Analysis Laboratory 
      USA 
        
  | 
      | 
      | 
     | 
  
CYBER 2023 Steering Committee
  
     | 
      | 
    Carla Merkle Westphall 
      UFSC 
      Brazil 
        
  | 
     | 
      | 
    Barbara Re 
      University of Camerino 
      Italy 
        
  | 
  
  
     | 
      | 
    Rainer Falk 
      Siemens AG, Corporate Technology 
      Germany 
        
  | 
     | 
      | 
    Daniel Kästner 
      AbsInt GmbH 
      Germany 
        
  | 
  
  
     | 
      | 
    Anne Coull 
      University of New South Wales 
      Australia 
        
  | 
     | 
      | 
    Steffen Fries 
      Siemens 
      Germany 
        
  | 
  
CYBER 2023 conference tracks:
Trends            in Cybersecurity
 Blockchain and machine learning for cybersecurity; Behavioral          biometrics authentication;          Privacy by design; Anonymity of blockchain and cryptocurrencies;          Threat categorization          and threat detection; Threats on critical national          infrastructures; Gift card hacking          techniques; Medical IoT Device-to-Device communication;          Blockchain in          supporting critical infrastructures; Vulnerability on social          media spaces; Internet          of Medical Things (IOMT); Cybersecurity for digital vehicles;          Potential radicalization          on social media; Blockchain and healthcare systems; Risk-based          human behavior profiling;          Forensic recovery of cloud evidence; Hacking pacemakers;          Prediction of cyber attacks;          Ransomware cyberweapon; Liability attribution in smart          workplaces;          Cybersecurity,  laws and          regulations;  Information          from browsers by online advertising          platforms; Predicting social engineering victims; Cybercrime          awareness
Cyber Resilience
 Cyber security assessment;   Data analytics for Cyber resilience;   Organizational security (government, commercial);   Resilient smart cities;   Resilient Internet of Things (RIOT);   Cyber-cities and Cyber-environments;   Critical infrastructure security;   Back up and recovery for systems of systems;   Disaster planning and management from Cyber perspective;   Integrated and smarter sensors
Resiliency and risks
 Resiliency in smart cities; Reliability and resiliency in wireless      networks; Detecting anomalous activity; Resources constrained      systems/devices; Disruption-tolerant systems; Resiliency and access      in restricted areas; Monitoring maritime critical disasters;      Critical supply networks; Risk assessment
   
    Technologies for resiliency
 Self-organized disaster management systems; Technological      catastrophes and crises management; Deep-learning & Big Data and      disaster recovery; Disaster management in 5G uRLLC-based systems; 5G      and IoT in disaster management; Aerial Systems for Disaster      Management; IoT sensing platforms for public safety
Cyber Security
	  Security management [overall information security management in the sense of 27000 series applied to cyber systems];          Compliance management [verify/check compliance with defined policies, provide corresponding management reports];          Security administration of cyber systems [technical security management of security services];          Security and privacy regulations and laws;          Securely interconnected cyber systems [firewalls, cross-domain security solutions];          Self-securing and self-defending cyber systems;          Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way];          Security technologies for protecting cyber systems and devices;          Identity and access management in cyber systems;          Anti-counterfeiting;          Secure production and supply chain; Cloud computing security;          Big-data security;          Advanced persistent threats;          Network traffic analysis and trace-back;          Cyberspace operations;          Incident response, investigation, and evidence handling;          Intrusion detection and prevention;          Cyberspace protection and anti-malware;          Cooperation and sharing for Cyber-defense
Cyber Infrastructure
	  Cyber-Cities and Cyber-environments;          Information technology infrastructure;          Telecommunications and networks;          Cyber-space and data centers;          Cyber-enabled control systems;          Cyber-enabled critical infrastructure systems;          Cyber-physical systems and Internet of Things;          Special application domains (smart grid, traffic management systems, autonomous driving, etc.);          Embedded processors and controllers;          Mobility in Cyber-space;          Virtualization in Cyber-space
Cyber Forensics
	  Computer and networks forensics;          Social networking forensics;          Digital forensics tools and applications;          Applications of information hiding;          Identification, authentication, and collection of digital evidence;          Anti-forensic techniques and methods;          Watermarking and intellectual property theft;          Privacy issues in network forensics;          Tools, applications, case studies, best practices
Cyber Crime
	  Cyber-crimes: Challenges in detection/prevention;          Anomalies detection;          Advanced Persistent Threats and Cyber-resilience;          BotNets and MobiNets;          Cyber crime-related investigations;          Challenges and detection of Cyber-crimes;          Network traffic analysis, traceback;          Security information and event management (SIEM);          Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.
Nature-inspired and Bio-inspired Cyber-defense
 Bio-inspired anomaly & intrusion detection;          Autonomic and Adaptive Cyber-Defense;          Adaptive and Evolvable Systems;          Cooperative defense systems;          Network artificial immune systems;          Adaptation algorithms for cyber security;          Biometrics related to cyber defense;          Bio-inspired security and networking algorithms and technologies;            Biomimetics related to cyber security;          Bio-inspired cyber threat intelligence methods and systems;          Bio-inspired algorithms for dependable networks;          Correlations in moving-target techniques;          Neural networks, evolutionary algorithms, and genetic algorithms   for cyber security Prediction techniques for cyber defense;          Information hiding solutions (steganography, watermarking) and   detection
Social-inspired opportunistic mobile Cyber-systems
	  Design of cyber-physical applications for opportunistic mobile systems based on behavioral models;          Social metrics for networks and systems operations;          Application of mixed physical and online social network sensing;          Social-aware modeling, design and development of routing algorithms in cyber-physical;          Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems;          Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems;          Experiments with cyber-physical opportunistic mobile systems
Deadlines:
	
              Submission  |         Aug 01, 2023  |       
              Notification  |         Aug 20, 2023  |       
              Registration  |         Sep 05, 2023  |       
              Camera ready  |         Sep 05, 2023  |       
    
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).