ATCS 2014 - 2014 International Workshop on Applications and Technologies in Cyber Security (ATCS)
Topics/Call fo Papers
The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014.
Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation &Security Certification
- Database Security
- Security for Cyber
-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Smartphone Security
Important Dates:
Deadline for submission: May 31, 2014.
Notification: July 1, 2014
Final submission: July 15, 2014.
Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation &Security Certification
- Database Security
- Security for Cyber
-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Smartphone Security
Important Dates:
Deadline for submission: May 31, 2014.
Notification: July 1, 2014
Final submission: July 15, 2014.
Other CFPs
- 2014 International conference on Electrical Engineering and Architectural Engineering(ICEEAE-2014)
- Special Issue on "Integrating Big Social Data, Computing, and Modeling for a Synthesized Spatial Social Science"
- Second International Conference on CyberGIS and Geodesign (CyberGIS'14)
- International Colloquium on Business Innovation 2014 (ICOBI 2014)
- 2014年?气工程与建筑工程国?会?
Last modified: 2014-04-22 22:19:31