National Cyber Summit Research Track Call for Proposals
Event Begins and Ends Posted 02 Jan 2019 2:41 PM
National Cyber Summit, June 4-6, 2019, Huntsville, AL

The National Cyber Summit is a multi-track cyber security event held annually with an expectation of over 2000 participants and more than 60 exhibitors. The event features tracks dedicated to technical, organizational, and research topics to address the entire cyber threat landscape. The NCS is held in Huntsville, AL. Huntsville is home to the Army’s Redstone Arsenal and NASA’s Marshall Space Flight Center. Army Material Command (AMC) is headquartered at Redstone Army Arsenal as well as the Army Aviation and Missile Research Development and Engineering Center, Missile Defense Agency, Army Space & Missile Defense Command/Army Forces Strategic Command, PEO Aviation and various other government organizations having a strong interest in cybersecurity. Huntsville is also home to the second largest research park in the nation where approximately 400 companies conduct business. This Cyber Security Summit offers an ideal venue for networking with government, industry, and Department of Defense attendees.

Call for Papers - Research Track

This is a call for “original” papers documenting cybersecurity research. Unpublished papers of up to 16 pages (in Springer’s Advances in Intelligent Systems and Computing format) are solicited. Cybersecurity is a multidisciplinary field including information security, fraud examination, forensic science, military science, management science, systems engineering, security engineering, criminology, computer science, and others. The National Cyber Summit Research Track solicits research papers in the following areas (non-exclusive list):

  • Industrial Control System Security
  • Network Security
  • Database Security
  • Digital Forensics
  • Secure Architectures
  • Societal Impacts/Ethics
  • Securing the Internet of Things
  • Interplay of technical and non-technical issues in cybersecurity
  • Supply chain cybersecurity research
  • Cybersecurity standards and guidelines
  • Case studies in cybersecurity
  • CISO challenges/governance
  • Cybersecurity trends
  • Cybersecurity and diversity
  • Cyber operations
  • Data mining for cybersecurity
  • Systems engineering for cybersecurity
  • Risk management
  • Design of secure systems
  • Cloud computing
  • Malware reverse engineering
  • Intrusion and malware detection
  • Cryptography
  • Trusted Systems
  • Provenance
  • Cyber-operations
  • Response and recovery
  • Cybersecurity curriculum design
  • Cybersecurity competitions – e.g., design, results, objectives, structure
  • Emerging needs for cybersecurity curriculum
  • Innovative approaches to faculty development and capacity building

Requirements for Paper Submission

Submissions must contain original material (i.e. they may not be previously published, nor currently submitted elsewhere). Submissions may be up to 16 pages and formatted in accordance with Springer’s Advances in Intelligent Systems and Computing format found at (Word template is available at, and LaTeX template is available at 

All submissions will be refereed, and should be uploaded to Accepted papers will be published in as part of the Advances in Intelligent Systems and Computing book series by Springer-Heidelberg.

Important Dates

Submission Deadline: 28 February 2019
Notification: 30 March 2019
Camera-ready: 30 April 2019
Conference date: 4–6 June 2019

Organizing Committee

General Chair

  • Tommy Morris, The University of Alabama in Huntsville, USA

Program Committee Chairs

  • Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
  • Gilbert L Peterson, Air Force Institute of Technology, USA