CyCon 2018 Call for Papers is Now Closed

Call for Papers

In 2018, the International Conference on Cyber Conflict will be 10 years young! To celebrate this milestone, we are offering the cyber security community the opportunity to shape the focus of our anniversary conference. Instead of setting a predefined core topic for this conference, we invite our trusted research community to submit original research papers on their choice of the most topical and current cyber security issues, from technical, legal, policy, strategy or military perspectives. With your valuable contribution we will present the world’s premier cyber defence conference for the tenth time.

Important Dates

Abstract submission  2 Oct. 2017
Notification of abstract acceptance 31 Oct. 2017
Full paper 8 Jan. 2018
Author notification 12 Feb. 2018
Final paper 12 Mar. 2018
Contact address: cfp2018 -at-


CyCon 2018 submissions can address topics such as:
• Cyberspace governance
• The role of international organisations in cyber security
• The changing role of states in cyberspace
• The evolution of the Internet of Things and its implications
• Norms and standards to enhance security in cyberspace
• The new generation of national cyber security strategies
• Cross-border dependencies, trans-border access to data
• The nature of current and future cyber attacks
• Non-state actors
• State-sponsored operations in cyberspace (incl. APTs and proxy actors)
• Military doctrine development, cyberspace as a domain of warfare
• Offence, defence and deterrence in cyberspace; active/responsive cyber defence
• Cyber capabilities, forces and weapons
• Autonomous cyber weapon systems
• Cyber terrorism
• Vulnerability disclosure
• Cyber-physical systems security
• Critical infrastructure protection (incl. data diode, IDS, industrial protocols and smart grids)
• Malware and botnets
• Hardware and software vulnerability mitigation
• Blockchain
• Future applications of quantum computing
• Big data, cloud and mobile computing security
• Artificial intelligence and cognitive cyber security (incl. data mining and machine learning)
• Cyber threat intelligence
• Situational awareness and security metrics (incl. security visualization)
• Attribution and digital forensics
• Digital trust and authentication

Legal aspects of cyber operations and other cyber activities relating to:
• International humanitarian law
• Sovereignty
• Intervention
• Espionage
• Attribution
• International responsibility of states
• Due diligence
• Human rights (in particular the right to privacy, the right to freedom of expression,
the right to protection of personal data)
• Emergence of legal norms
• Grey zones in international and national law.


Download docs:

Authors are asked to submit an abstract of the planned paper, which should describe the topic and set out the main aspects and structure of the study (300–500 words). After a preliminary review and the acceptance of the abstract, the respective authors will be requested to submit original and unpublished papers (up to 6000 words, incl. footnotes and references), meeting high academic research standards. Submitted papers will be subject to a double-blind peer review.

The abstracts and manuscripts must be uploaded electronically to after creating an account.

Authors of papers accepted for publishing in the conference proceedings are requested to make a corresponding presentation at the conference. Speakers will be offered travel (booked by NATO CCD COE) and accommodation for the duration of the conference, as well as social events in Tallinn.


Junior scholar award

The Junior Scholar Session and Best Thesis Award aim to inspire and support young academics. Information will be available soon at