Home
 

Cyber Defense - Methodologies and Techniques for Evaluation

Call For Papers

Journal of Defense Modeling and Simulation (JDMS)

Special Issue: Cyber Defense - Methodologies and Techniques for Evaluation


Introduction

Cyber has emerged as a strategic national domain of interest to both military and civilian sectors. The overlap between military and commercial networking resources and infrastructure complicates issues of protection, defense, and offense. The defense community is tasked not only with protecting our military information systems commercially procured, but also in protecting our nation's strategically vital enterprises. Homeland defense rests squarely on our ability to guard critical infrastructure control systems that have a wide range of exploitable vulnerabilities.

This special issue is devoted to publishing practical and theoretic approaches to measuring and evaluating cyber protection and defensive methodologies, with the specific focus on integration of simulation techniques for the purpose of verification, validation, or testing. Of particular interest are practical applications of modeling and simulation to hard problems of interest such as digital forensics, network defense, botnet-detection, malware analysis, denial of service, and situational awareness. Topics of interest to the special issue include, but are not limited to, the following:

  • Analysis frameworks and theoretical models of cyber defense
  • Case studies of practical application of theoretical security foundations
  • Models of cyber situational awareness and applicability to defensive operations
  • Modeling of offensive, e.g., vulnerability discovery and exploitation, and counter offensive processes for cyber operations, to include education and training
  • Methodologies for evaluating cyber defense tools and architectures' effectiveness and contributions in support of decision makers
  • Domain models that map mission/organizational level goals to cyber defensive tasks

Papers submitted should not be concurrently under review at another conference, journal or similar venue.

Instructions for Manuscript Preparation

For manuscript formatting and other guidelines, please visit the Author Guidelines for JDMS.

Note: Manuscripts must not have been previously published or be submitted for publication elsewhere. Each submitted manuscript must include title, names, authors' affiliations, postal and e-mail addresses, and a list of keywords. For multiple author submissions, please identify the corresponding author.

Due Dates

Submission of Abstracts Deadline August 15, 2010
Notification of Acceptance October 15, 2010
Submission of Final (revised) Paper December 15, 2010
Publication Expected Winter 2012

Submissions for abstract / full paper review

All manuscripts must be submitted electronically through the paper submission system to the JDMS Manuscript Submission System. Manuscripts must be formatted in single-column pdf format, double-spaced, and use 12pt fonts. In the title page, author(s) must specifically mark that the paper is intended for this special issue as follows: "Submission for the Special Issue of JDMS: Cyber Defense - Methodologies and Techniques for Evaluation."

Final paper submissions

Each final submission must be prepared based on the Simulation journal requirements (see Author Guidelines for JDMS page).

For questions contact the editors at: