IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2019) is an international refereed conference dedicated to the advancement of Cyber Incident Response, Coordination, Containment and Control.

The aim of the Cyber Incident 2019 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Cyber Incident 2019 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.

Cyber Incident 2019 proceedings will sent to IEEE for consideration for listing in the IEEE Xplore Digital Library.

Call for paper

Important Dates

Draft paper submission deadline:2019-02-28

Abstract submission deadline:2019-02-28

Author guidelines

Paper Submission

The deadline for all paper submissions, that is, both full papers and extended abstracts for Poster, WIP, PoC, Research Idea and PhD Seminar presentations is 26th January 2019.

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission system hosted by Easychair Conference Portal.

Full paper submission should be via Easychair Conference Portal.

Both long (8 pages max., roughly 8,000 words) and short (4 pages max., roughly 4,000 words) paper submissions should be written in English and be submitted electronically via the EasyChair conference portal. Submission file formats are PDF and Microsoft Word using the IEEE templates that can be found at the corresponding C-MRiC website. Authors wishing to present a Poster, Industry Proof of Concept (PoC), Work in Progress (WIP), Research Ideas, or PhD Seminar may submit a 2‐page extended abstract using the online submission systems hosted by EasyChair Conference System, which, if accepted, will appear in the conference proceedings.

Topics of submission

Cyber Incident Response

  • Cyber Incident Analysis
  • Cyber Incident Triage
  • Cyber Incident Correlation and Assessment
  • Coordination
  • Containment
  • Root Cause Analysis (RCA)
  • Timeliness
  • Handling and Handling Process
  • Reporting
  • Escalation
  • Cyber Incident Management

Decision Control

  • Emergence Services
  • Preparedness
  • Readiness
  • Analysis
  • Risk Management
  • Conditionality
  • Proportionality
  • Prioritisation
  • Decision Making
  • Risk-Based Decision
  • Human in the Loop

Preparedness & Readiness

  • Training
  • Processes and Procedures
  • Policy and Standards
  • Emergency  Services
  • Chain of Custody
  • Forensic Readiness and Investigations
  • Cyber Incident Notification and Announcements
  • Cyber Incident Management Tool
  • Standardisation
  • Framework and Methodology
  • Expertise, Skills, Knowledge and Resource
  • Maturity Model and Goal Setting
  • Certification and Accreditation
  • Memberships to Cyber Incident Responders, Incident Response Organisation

Forensic Investigation

  • Rule-Based Systems
  • Expert Systems
  • Adaptive Learning Systems
  • Predictive Systems
  • The use of Biometrics to aid Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Correlation and cross-correlation for Incident Analysis
  • Cross-Domain Analysis
  • Cross-Channel Incident Analysis
  • Multi-domain Analysis

Digital Forensics

  • Digital Forensics Principles, Rules and Standards
  • Digital Forensic Investigations
  • Speak, audio and voice Recognition for forensics
  • Chain of Custody
  • Mobile Forensics
  • Live data and live stream forensics
  • Live Imagery Forensics
  • Memory Forensics
  • Browser and Cache Memory Forensics

Threat & Adversarial Modelling

  • Data-Centric System Threat Modelling
  • Attack Tree
  • Exploits and Attack Modelling
  • Attack Vector and Attack Surface
  • Risk, Control and Control Objectives
  • Analysing Threat Modelling
  • Cyber Incident Management
  • Business Continuity Plan and Measures
  • Root Cause Analysis
  • Security Metrics
  • Threat Intelligence


Program Committee

  • Hayretdin Bahsi – Center for Digital Forensics and Cyber Security, Tallin University of Technology, Estonia

  • Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA

  • Dimitrios Papamartzivanos –  University of the Aegean, Greece

  • Jens Myrup Pedersen – University of Aalborg, Denmark

  • Uwe Glässer – School of Computing Science, Simon Fraser University, Canada

  • Marios Anagnostopoulos – University of the Aegean, Greece

  • Ciza Thomas – College of Engineering, India

  • Stefanos Gritzalis – University of the Aegean, Greece

  • Janne Merete Hagen – Norwegian Defence Research Establishment, Norway

  • Varun Dutt – Indian Institute of Technology Mandi, India

  • Georgios Kambourakis – University of the Aegean, Greece

  • Pierre Parrend –  ECAM Strasbourg-Europe, France

  • Eliana Stavrou – Computing Department, UCLan Cyprus, Larnaca, Cyprus

  • Tim D Williams – Cyber Security, London, UK

  • Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK

  • More to be added …

Organizing committee

  • Arnau Erola – Department of Computer Science, University of Oxford, UK

  • Virginia Franqueira – Cyber Security, University of Derby, UK

  • Fatih Kurugollu – Cyber Security, University of Derby, UK

  • Xavier Bellekens – University of Abertay, Dundee, Scotland, UK

  • Zeyad Yousif Al-Shibaany – IEEE UK and Ireland, EAO Chair

  • Thaddeus Eze – IEEE UK and Ireland YP & Department of Computer Science, University of Chester, UK

  • Nazila Fough – IEEE UK and Ireland Young Professionals (IEEE YP) & Robert Gordon University of Aberdeen, Scotland, UK


Leave a message


Contact information


Sponsored By

  • University of Oxford