CSP 2014 - The 3rd International Workshop on Cyber Security and Privacy
Date2014-10-10 - 2014-10-12
Deadline2014-05-15
VenueShanghai, China
Keywords
Websitehttps://www.cyberc.org
Topics/Call fo Papers
We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
Cyber-crime, which includes any criminal activities related to computers and networks, has kept rising and it is now the third most important crime on FBI's priority list. The traditional attacks to email remain as the biggest intrusion factor people are facing, and new attacks are emerging every year with more widespread and destructive. Blackhole exploit kit is the most prevalent web thread in 2012, and it is further replaced by many new exploit kits that grew out of it in 2013. Andr/BBridge-A, the most widely spread Android malware in Trojan family, has infected thousands of mobile devices in last few years. Data leaks, is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.
CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.
Authors of CSP workshop 2014 are promoted to freely enjoy CyberC 2014 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:
? Access control
? Authorization, identification & authentication
? Accountability and anonymity
? Biometric authentication
? Censorship and censorship-resistance
? Cloud security
? Cryptography and key algorithms
? Distributed systems security
? Embedded systems security and forensics
? Encryption algorithms and analysis
? Hardware, application, and system security
? Information integrity, assurance and trustworthy
? Intrusion detection, traffic analysis and decision making of security
? Language-based security
? Location Privacy and Exposure
? Malware analysis and protection
? Mobile security
? Network security and malware
? Networking protocols and security trace back
? Privacy in pervasive sensing
? Privacy in social media
? Privacy-preserving systems
? Secure distributed data outsourcing (e.g., database as a service)
? Security and privacy policies
? Security architectures, policies, and regulations
? Security and privacy in database systems
? Security modeling and vulnerability analysis
? Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
? Usability/energy/cost/efficiency of security in the network
? Virtual private network (VPN) security
? Web browser security
Important Dates
May 15, 2014 - Conference Paper Submission Deadline
June 15, 2014 - Notification of Acceptance & Registration Starts
August 1, 2014 - Camera-Ready Paper Submission Due & Registration Due
Technical Program Committee
Shared with CyberC 2014
Submissions:
Authors are invited to submit original technical papers to http://edas.info/ by selecting “CSP 2014”.
Electronic submission to papers-AT-cyberc.org with title of “CSP 2014 Submission” is also accepted.
Please DO NOT submit both ways.
Manuscript Guidelines
All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/ Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.
Manuscript submission procedure is available over the Web at http://edas.info/. We encourage you to use EDAS online submission by selecting “CSP 2014”. If you have troubles in using the Web submission, you can also submit your paper to papers-AT-cyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file.
Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.
Paper Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
Publications
All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.
CyberC Facebook
http://www.facebook.com/groups/nasirsyed.utp/
CyberC QQ : 1625638480
Contact
For more information about the conference, please visit www.CyberC.org or contact us at Papers-AT-CyberC.org.
Cyber-crime, which includes any criminal activities related to computers and networks, has kept rising and it is now the third most important crime on FBI's priority list. The traditional attacks to email remain as the biggest intrusion factor people are facing, and new attacks are emerging every year with more widespread and destructive. Blackhole exploit kit is the most prevalent web thread in 2012, and it is further replaced by many new exploit kits that grew out of it in 2013. Andr/BBridge-A, the most widely spread Android malware in Trojan family, has infected thousands of mobile devices in last few years. Data leaks, is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.
CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.
Authors of CSP workshop 2014 are promoted to freely enjoy CyberC 2014 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:
? Access control
? Authorization, identification & authentication
? Accountability and anonymity
? Biometric authentication
? Censorship and censorship-resistance
? Cloud security
? Cryptography and key algorithms
? Distributed systems security
? Embedded systems security and forensics
? Encryption algorithms and analysis
? Hardware, application, and system security
? Information integrity, assurance and trustworthy
? Intrusion detection, traffic analysis and decision making of security
? Language-based security
? Location Privacy and Exposure
? Malware analysis and protection
? Mobile security
? Network security and malware
? Networking protocols and security trace back
? Privacy in pervasive sensing
? Privacy in social media
? Privacy-preserving systems
? Secure distributed data outsourcing (e.g., database as a service)
? Security and privacy policies
? Security architectures, policies, and regulations
? Security and privacy in database systems
? Security modeling and vulnerability analysis
? Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
? Usability/energy/cost/efficiency of security in the network
? Virtual private network (VPN) security
? Web browser security
Important Dates
May 15, 2014 - Conference Paper Submission Deadline
June 15, 2014 - Notification of Acceptance & Registration Starts
August 1, 2014 - Camera-Ready Paper Submission Due & Registration Due
Technical Program Committee
Shared with CyberC 2014
Submissions:
Authors are invited to submit original technical papers to http://edas.info/ by selecting “CSP 2014”.
Electronic submission to papers-AT-cyberc.org with title of “CSP 2014 Submission” is also accepted.
Please DO NOT submit both ways.
Manuscript Guidelines
All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/ Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.
Manuscript submission procedure is available over the Web at http://edas.info/. We encourage you to use EDAS online submission by selecting “CSP 2014”. If you have troubles in using the Web submission, you can also submit your paper to papers-AT-cyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file.
Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.
Paper Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
Publications
All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.
CyberC Facebook
http://www.facebook.com/groups/nasirsyed.utp/
CyberC QQ : 1625638480
Contact
For more information about the conference, please visit www.CyberC.org or contact us at Papers-AT-CyberC.org.
Other CFPs
- The 4th International Workshop on Cognitive-Inspired Networks, Systems and Applications
- 4th Annual International Conference on Computational Mathematics, Computational Geometry & Statistics (CMCGS 2015)
- The 2nd IEEE International Symposium on Telecommunications Technologies (ISTT 2014)
- South Africa International Renewable Energy Conference 2015 (SAIREC)
- Special Issue of Computers and Composition
Last modified: 2014-03-06 07:40:21