ICCWS 2015 10th International Conference on Cyber Warfare and

10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa - 24-25 March 2015
ICCWS
2015
10th International Conference on
Cyber Warfare and Security
The University of Venda and the
Council for Scientific and Industrial Research
Co hosted by
Kruger National Park, South Africa
24-25 March 2015
Conference Chair:
Programme Chair:
Dr Jannie Zaaiman, University of Venda, South Africa
Dr Louise Leenen, Council for Scientific and Industrial Research,
South Africa
CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round
Table Proposals, non-academic Contributions and Product Demonstrations
ICCWS 2015 is an opportunity for academics, practitioners and consultants from around the world who are
involved in the study, management, development and implementation of systems and concepts to combat
cyber/information warfare or to improve information systems security to come together and exchange ideas.
There are several strong strands of research and interest that are developing in the area including the
understanding of threats and risks to information systems, the development of a strong security culture, as well as
incident detection and post incident investigation. This conference is continuing to establish itself as a key event
for individuals working in the field from around the world.
Please consider submitting to this conference. We are interested in the entire range of concepts from theory to
practice, including case studies, works-in-progress, and conceptual explorations.
Topics of particular interest include but are not limited to:

Cyberwarfare practice and
theory


Information security practice


Cyber conflict - Neural
linguistic techniques in
cyberwarfare
Case studies of cyber
attacks in modern conflicts
Human Factors
Physical security

SMEs - Small-to-medium
Size Enterprises Security
model
Security implications of
“virtualised machines and
services
The Resilience and
Susceptibility of "Service
Oriented Architectures"












The politics of
cyberwarfare, including
conceptual cyberarms
agreements
Information security
management
Patriotic hackers as an
extension of state power

Cyber-exploitation
execution and detection

Dual-use technologies

Potential military uses of
cyber attacks
Theoretical cyber conflict
scenarios
Cyber-terrorism
Counter-terrorism security
policies, procedures and
legislation
Critical national
infrastructure protection

Cyber conflict
frameworks
Principles of i-Warfare
Information warfare
policy

Information warfare
theory
e-Health systems as part of
a national critical
infrastructure
Information security
governance and
management

Information warfare
techniques

Information warfare and
security education


For further details see the conference Call for Papers webpage at
http://academic-conferences.org/iccws/iccws2015/iccws15-call-papers.htm
A conference managed by Academic Conferences and Publishing International Limited
Page 1 of 4
10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa - 24-25 March 2015

(SOAs)
Hacking

Biometrics




Information Assurance
Malware
UCE








Cyber-fraud
Risk Management


Cryptography
Wireless Treats
Threat Agents – Insider
threats
Particle swarm data mining
Virtual Intrusion Detection

Collaborative decision
making
Security policy

National security policy

Computers-as-weapons
Electro-magnetic pulse
weapons
Information operations


Strategic leadership






Influence campaigns
Psychological warfare
PSYOP - PSYOPS

Firewalls
Phishing and spam
Current Anti Virus
Technologies
Mobile Virus

Perception management

RFID Virus


Infra-structure warfare

SQL Infections



Data Loss


Military Culture
Topography
Modern conflict

Data Integration


Military approaches

ISO 27001




Gaussian empirical rule
Natural computing



Random numbers
approximation sequence



Traffic classification
Subliminal Channel


Acute situational
awareness
Aircraft Environment
Digital forensics
Network anomaly detection
models
Corporate defence
mechanisms
Security for small to
medium enterprises
Information, computer and
network security
Security of the virtual
worlds
SIMAD what can/should be
done to protect against this
threat?
Unidirectional linguistic
steganography
IT auditing and compliance
Information Security
Architecture
Artificial immune
recognition system security
infrastructure
Public Key Infrastructure
Network Address Translator

Machine Learning Risk

Mathematical-filtering


Context free grammers

SecureMDA

Compromise path
analysis
Defence steganography
Data and service
integration
Legal issues concerned
with information warfare
and e-Crime
Non-traditional enemies
Ethical, political and
social issues relating to
information warfare
Association of Religions
with Warfare
Image-processing












e-Intelligence/counterintelligence
Networked Centric War
Reflector attacks
Art of war
Publication opportunity
Papers accepted for the conference will be published in the conference proceedings, subject to author registration
and payment.
Papers that have been presented at the Conference will be considered for publication in the following:



A special issue of the Journal of Information Warfare: http://www.jinfowar.com
The International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources
Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443).
The International Journal of Electronic Security and Digital Forensics published by Inderscience UK
(ISSN:1751-1911X).
For further details see the conference Call for Papers webpage at
http://academic-conferences.org/iccws/iccws2015/iccws15-call-papers.htm
A conference managed by Academic Conferences and Publishing International Limited
Page 2 of 4
10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa - 24-25 March 2015
Academic Paper submissions
Papers should address one of the topics listed in this call for papers and can describe a wide range of research
including empirical or theoretical studies. In addition, philosophical papers presenting an argument and papers
presenting a process that has been developed and is now ready for wider use are welcome. In all cases concepts
and underlying principles should be emphasised, with enough background information to orient any reader who is
not a specialist in the particular subject area. The work should not have been published elsewhere and should not
be intended to be published elsewhere during the review period. Initially, only a 300-500 word abstract is
required. See the submission guidelines on the website.
Work in Progress/Posters
Researchers are invited to submit current projects which are either at the proposal stage or are work in progress.
In the first instance you should submit an abstract describing the work. If your abstract is selected you will be
given the choice of producing a short paper with poster or abstract only with poster. If you opt for a paper, this
should be a maximum of 2000 words including abstract, keywords and references. The paper will be double-blind
peer reviewed and if accepted will be published in the conference proceedings. Presentation of the work at the
conference will take the form of a Poster. Posters will be on display for the duration of the conference and there
will be a timetabled slot for contributors to stand by their posters so that participants can come and discuss the
research. Participants will be asked to vote for the best poster and a prize will be given for the poster receiving
the highest number of votes.
PhD Research
Doctoral Candidates are invited to submit papers describing their research. To be eligible, it is necessary for the
paper to be produced to a publishable academic standard and papers will be subject to the same criteria and
processes as research papers. However the final results of the research may not have been fully completed and
interpreted. Wherever possible, PhD papers will be grouped together into a Colloquium for presentation at the
conference and there will be a chair person and a discussant to provided constructive feedback on the work. A
prize will be awarded to the best PhD paper presented at the conference.
Case Study Submissions
Case study submissions should be written to publishable standards. Case studies will be subject to the same
criteria and the processes as research papers.
Non-Academic Contributions
The conference committee welcomes contributions from individuals and organisations working in the field. These
contributions can take the form of a presentation or a demonstration. In the first instance and abstract should be
submitted describing the work to be presented. If the abstract is selected you will be asked whether you wish to
produce a paper, a poster or just give a presentation. You will need to register for the conference to have a
confirmed timetabled slot.
Round Table Proposals
The Programme Committee invites topical subjects to be proposed for discussion. In the first instance an
abstract describing the proposed topic should be submitted. If selected the convener will be given a timetabled
slot for the round table and will be expected to register to attend the conference.
Product Demonstrations and Exhibitor Opportunities
If you are contributing to the conference in any of the above categories you can also request the opportunity to
give a product demonstration. If you would like to exhibit and/or demonstrate a product at the conference we
suggest that you apply for one of our exhibitor packages.
Submission details
Abstract
In the first instance ALL submission types require an abstract. The Abstract should be a minimum
details:
of 300 and no more than 500 words including up to five keywords and keyphrases to be received
by 2 September 2014
Submission: Use the online submission form. Please ensure that you complete all relevant sections of the form,
including the conference track the abstract is intended for, the proposed title for the paper, the full
names (first name and surname, not initials), postal addresses and email addresses of all authors
and a telephone number for at least one contact author. Please indicate clearly if the contact
author is not the lead author.
Full paper:
Only required when the abstract has been selected and not to be more than 5,000 words including
abstract, keywords and references (the Harvard referencing rules need to be followed).
Submission date will be no later than 21 October 2014. Papers should be submitted as .doc or .rtf
file attachments by email to Charlotte Hall.
For further details see the conference Call for Papers webpage at
http://academic-conferences.org/iccws/iccws2015/iccws15-call-papers.htm
A conference managed by Academic Conferences and Publishing International Limited
Page 3 of 4
10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa - 24-25 March 2015
Important information
 The selection panel of the conference committee will consider all abstracts received by the submission
deadline to ensure that the proposed paper is relevant to the Conference.
 The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.
 All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate
standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length,
the standard of English is adequate and the paper is appropriately referenced.

For authors whose first language is not English we request that you have your work proof-read prior to
submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a
poor standard of English. We do offer proof-reading services.

Papers that are accepted will be published in the conference proceedings providing at least one author
registers and presents the work at the Conference (see the registration section of the conference website for
more information about registration).

Due to the large number of papers expected for this conference, the committee prefers that an author
presents only one paper. However, if multiple papers are accepted for publication and presentation, each
paper requires a separate registration fee. Author registration and payment must be completed by 17
February 2015.
Important Dates
Abstract submission deadline:
Notification of abstract acceptance:
Full paper due for review (see note):
Notification of paper acceptance(with any requested changes):
Earlybird registration closes:
Final paper submission (with changes):
Final author registration date
2 September 2014
9 September 2014
21 October 2014
30 December 2014
13 January 2015
27 January 2015
17 February 2015
The conference programme committee is currently being updated. Full details will be posted on the conference
website as soon as they are confirmed. A prize will be awarded for the best Poster and the best PhD paper.
Conference and Journal Accreditations
The ICCWS conference proceedings are:








Proceedings of the International Conference on Cyber Warfare are indexed in the
Thomson Reuters ISI Web of Science (WOS) Conference Proceedings Citation
Index
listed in the Thomson Reuters ISI Index to Scientific and Technical
Proceedings (ISTP/ISI Proceedings)
listed in the Thomson Reuters ISI Index to Social Sciences & Humanities
Proceedings (ISSHP)
listed in the Thomson Reuters ISI Index to Social Sciences & Humanities
Proceedings (ISSHP/ISI Proceedings).
indexed by the Institution of Engineering and Technology in the UK.
listed in the EBSCO database of Conference Proceedings
listed on Google Scholar
listed on Google Book Search
Conference proceedings are submitted for accreditation on publication. Please
note that depending on the accreditation body this process can take up to several
months.
The Journal of Information Warfare is:
 classified by the Australian
Research Council
Committee Members:
An updated list of committee members can be found on the conference website at:
http://academic-conferences.org/iccws/iccws2015/iccws15-committee.htm
For further details see the conference Call for Papers webpage at
http://academic-conferences.org/iccws/iccws2015/iccws15-call-papers.htm
A conference managed by Academic Conferences and Publishing International Limited
Page 4 of 4