Call for Papers - Research TrackThe National Cyber Summit is a multi-track cyber security event held annually with an expectation of over 2000 participants and more than 70 exhibitors. The event features tracks dedicated to technical, organizational, and research topics to address the entire cyber threat landscape. The NCS is held in Huntsville, AL. Huntsville is home to the Army’s Redstone Arsenal and NASA’s Marshall Space Flight Center. Army Material Command (AMC) is headquartered at Redstone Army Arsenal as well as the Army Aviation and Missile Research Development and Engineering Center, Missile Defense Agency, Army Space & Missile Defense Command/Army Forces Strategic Command, PEO Aviation and various other government organizations having a strong interest in cybersecurity. Huntsville is also home to the second largest research park in the nation where approximately 400 companies conduct business. This Cyber Security Summit offers an ideal venue for networking with government, industry, and Department of Defense attendees.
Call for Papers - Research TrackThis is a call for “original” papers documenting cybersecurity research. Unpublished papers of up to 16 pages (in Springer’s Advances in Intelligent Systems and Computing format) are solicited. Cybersecurity is a multidisciplinary field including information security, fraud examination, forensic science, military science, management science, systems engineering, security engineering, criminology, computer science, and others. The National Cyber Summit Research Track solicits research papers in the following areas (non-exclusive list):
• Industrial Control System Security
• Network Security
• Database Security
• Digital Forensics
• Secure Architectures
• Societal Impacts/Ethics
• Securing the Internet of Things
• Interplay of technical and non-technical issues in cybersecurity
• Supply chain cybersecurity research
• Cybersecurity standards and guidelines
• Case studies in cybersecurity
• CISO challenges/governance
• Cybersecurity trends
• Cybersecurity and diversity
• Cyber operations
• Data mining for cybersecurity
• Systems engineering for cybersecurity
• Risk management
• Design of secure systems
• Cloud computing
• Malware reverse engineering
• Intrusion and malware detection
• Trusted Systems
• Response and recovery
• Cybersecurity curriculum design
• Cybersecurity competitions – e.g., design, results, objectives, structure
• Emerging needs for cybersecurity curriculum
• Innovative approaches to faculty development and capacity building
Requirements for Paper SubmissionSubmissions must contain original material (i.e. they may not be previously published, nor currently submitted elsewhere). Submissions may be up to 16 pages and formatted in accordance with Springer’s Advances in Intelligent Systems and Computing format found at https://www.springer.com/us/authors-editors/conference-proceedings/conference-proceedings-guidelines. (A MS Word template is available at ftp://ftp.springernature.com/cs-proceeding/llncs/word/splnproc1703.zip, and a LaTeX template is available at ftp://ftp.springernature.com/cs-proceeding/svproc/templates/ProcSci_TeX.zip).
All submissions will be refereed, and should be uploaded to https://easychair.org/conferences/?conf=ncs22.
Accepted papers will be published as part of the Lecture Notes in Networks and Systems book series by Springer-Heidelberg.
Previous year’s proceedings:
- The research track submissions for the 2022 Summit will close on June 30, 2022.
- Status notifications for track and panel speakers will be sent by July 22, 2022.
- Accepted Speakers must confirm participation by August 5, 2022.
- Eric Imsand, The University of Alabama in Huntsville, USA
- Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
- Gilbert L Peterson, Air Force Institute of Technology, USA