
- Academic Papers
- Case Studies
- Work in-Progress Papers
- PhD Papers
- Masters Papers
- Posters and Presentations
- Non- Academic or Practitioner Contributions
Aims and Scope
ECCWS provides a comprehensive platform for the exploration and discussion of the complex and evolving challenges in the fields of cyber warfare and cybersecurity. It seeks to bridge the gap between academic research, practical applications, and policy-making, fostering interdisciplinary collaboration and the exchange of ideas. The conference focuses on both theoretical and applied aspects of cybersecurity and cyber defence, with an emphasis on the implications for national security, military strategy, and global stability.
Topics Covered
The call for papers for the ECCWS conference asked for contributions that considered the following topics. In addition, the committee welcomed papers on a number of specialist mini-tracks which can be seen at the end of this list.
Cyber Warfare Strategies and Tactics
- Offensive Cyber Operations
- Defensive Cyber Operations
- Cyber Deterrence and Cyber Power.
Cyber Defence and Security
- Threat Detection and Incident Response
- Security Architectures
- Vulnerability Assessment and Management including pentesting
Cyber Threat Intelligence
- Adversary Tactics, Techniques, and Procedures (TTPs)
- Threat Intelligence Sharing
- Advanced Persistent Threats (APTs).
Critical Infrastructure Protection
- Protection of Energy, Water, and Transport Systems
- Financial Sector Security
- Telecommunications Security
Military Applications of Cyber Technologies
- Cyber Command and Control Systems
- Cyber-Physical Systems in Defence
- Information Warfare and Psychological Operations.
Legal and Ethical Issues in Cyber Warfare
- International Law and Cyber Conflict
- Ethical Dilemmas in Cyber Operations
- Cyber Espionage and Sovereignty.
Emerging Technologies and Innovations
- Artificial Intelligence in Cybersecurity
- Quantum Computing and Cybersecurity
- Blockchain for Cybersecurity
Cybersecurity Education and Training
- Military Cyber Training Programs
- Cybersecurity Curriculum Development
- Capacity Building in Cybersecurity
Policy, Governance, and International Cooperation
- National Cybersecurity Strategies
- International Cyber Norms and Agreements
- Public-Private Partnerships in Cybersecurity
Cybercrime and Law Enforcement
- Digital Forensics
- Countering Cybercrime
- Legal Frameworks for Cybercrime
Mini-Tracks
Experts in the field proposed mini tracks on the following topics. Papers accepted on these topics after the double-blind peer review process were presented as mini tracks at the conference and are also published in these proceedings.
Software Supply Chain Security Risks
Mini Track Chair: Arun Mamgai, University of South Carolina, USA
Every organisation now relies on software that it did not create (including open-source and third-party commercial software), but this makes the organisation's software supply chain susceptible to malicious attacks. Because most organisations do not know the extent of their open-source and third-party artefacts, unmanaged dependencies can be a security vulnerability. If not addressed promptly, open-source vulnerabilities can impact the entire project and adversely impact organisations. Additionally, the use of Generative AI for code development has significantly increased risks to the supply chain and must include guardrails for thorough assessment and evaluation. This mini track invites submission that look at all aspects of risks associated with software supply chains.
Topics of interest include, but are not limited to:
- SBOM (Software Bill of Material)
- Securing the Software Supply Chain
- DevSecOps/Secure Software Development Lifecycle (SDLC)
- Zero Trust pipelines
- AI for Software Supply Chains
- Securing AI generated code and models
Mini Track on Smart Systems Under Siege: Analyzing Cybersecurity Risks and Real-World Incidents
Mini Track Chair: Dr. Jawad Hussain Awan, Iqra University, Main Campus, Karachi, Pakistan
According to Global Cybersecurity Outlook Insight Report of 2024 (WEF, 2024), likely risks to be faced over the next ten years include digital power concentration, digital inequality, cyber security failure, the growing ratio of cyber risks and breakdown of Smart infrastructures. The purpose of this mini-track is to bring together experts including academics and industrialists working or interested in the field of cyber security, cyber situational awareness and risk assessment research with interests in modern technologies such as Internet of Vehicles, Internet of Things, Malware/Intruder detection and prevention technologies, Smart environments and cyber physical systems.
- Topics of interest include, but are not limited to:
- Cyber-attack vectors (botnets, autonomous cars, ransomware)
- Cyber risk assessment and impact analysis and Cyber situational awareness
- Cyber-threats (data manipulation, identity theft, cyberwarfare)
- Case studies of cyber-security incidents in Internet of Vehicles and Internet of Things
- Malware and Intrusion detection
Important Dates
Abstract submission deadline | STILL ACCEPTING ABSTRACTS |
Notification of abstract acceptance | 18 December 2024 |
Full paper due for review | 23 January 2025 |
Notification of paper acceptance (with any requested changes) | 03 April 2025 |
Earlybird registration closes | 17 April 2025 |
Final paper due (with any changes) | 01 May 2025 |
Final Author payment date | 22 May 2025 |