CSP 2017 - 6th International Workshop on Cyber Security and Privacy
Topics/Call fo Papers
2017-CSP: The 6th International Workshop on Cyber Security and Privacy
Location and Dates: Nanjing, China, October 12 - 14, 2017
Web: http://cyberc.org/page.asp?id=183
Paper Submission: http://edas.info/N23498 or Login EDAS at http://edas.info/ by selecting "2017 Cybersecurity". Electronic submission to Papers-AT-cyberc.org with a title of "2017 Cybersecurity" is also accepted.
Cyber security and privacy protect for data information from adversarial disclosure or usage. Cyber communications involve with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Data leakage is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.
CSP solicits previously unpublished research papers in any aspect of security data analytics, network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.
Authors of CSP workshop 2017 are promoted to freely enjoy CyberC 2017 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:
? Infrastructure Security
? Access control
? Authorization, identification & authentication
? Accountability and anonymity
? Biometric authentication
? Big Data and Security
? Censorship and censorship-resistance
? Machine learning and Artifical intelligence for Cybersecurity detection and response
? Cloud security
? Cryptography and key algorithms
? Data-AT-rest and Data-on-the-Fly Security
? Distributed systems security
? Embedded systems security and forensics
? Encryption algorithms and analysis
? Hardware, application, and system security
? Information integrity, assurance and trustworthy
? Intrusion detection, traffic analysis and decision making of security
? Language-based security
? Location Privacy and Exposure
? Machine Learning and Streaming for Security
? Malware analysis and protection
? Mobile and App security
? Network security and malware
? Networking protocols and security trace back
? Privacy in pervasive sensing
? Privacy in social media
? Privacy-preserving systems
? Secure distributed data outsourcing (e.g., database as a service)
? Security and privacy policies
? Security architectures, policies, and regulations
? Security and privacy in database systems
? Security modeling and vulnerability analysis
? Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
? Usability/energy/cost/efficiency of security in the network
? Virtual private network (VPN) security
? Web browser security
Important Dates
April 15, 2017- Conference Paper Submission Deadline
June 30, 2017- Notification of Acceptance & Registration Starts
August 31, 2017 - Camera-Ready Paper Submission Due & Registration Due
Paper Acceptance
All submitted manuscripts will be reviewed by experts in the fields and will be judged on the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
Publications
Accepted and presented papers will be included in CyberC Processing and EI Journal special issue.
Technical Program Committee
Workshop Co-Chairs
Xiaolong Xu, Nanjing University of Posts and Telecommunications, China
Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom
Yang Xiang, Deakin University, Australia
Technical Program Committee Members
Nik Bessis, Edge Hill University, United Kingdom
Geng Yang, Nanjing University of Posts and Telecommunications, China
Zhijie Han, University of Henan, China
Luca Foschini, Università di Bologna, Italy
Weifeng Lu, Nanjing University of Posts and Telecommunications, China
Gregorio Martinez Perez, University of Murcia, Spain
Gongxuan Zhang, Nanjing University of Science and Technology, China
Desheng Fu, Nanjing University of Information Science Technology, China
Marcello Trovati, Edge Hill University, Edge Hill University, United Kingdom
Wei Li, Southeast University, China
Huiqun Zhou, Nanjing University, China
Daojing He, East China Normal University, China
Chunming Rong, University of Stavanger, Norway
Zhenjiang Dong, ZTE Corporation, China
Shancang Li, Edinburgh Napier University, United Kingdom
Xianghan Zheng, Fuzhou University, China
Jiguo Li, Hehai University, China
Frank Trethan Johnsen, University of Oslo, Norway
Gene Moo Lee, University of Texas at Arlington, USA
Gyu Myoung Lee, Liverpool John Moores University, United Kingdom
Rodrigo Campos Bortoletto, Federal Univeristy of the ABC, Brazil
Salah-Eddine BENBRAHIM, Ecole Polytechnique de Montréal, FrenceCyberC QQ:1625638480
Contact
For more information about the conference, please visit www.CyberC.org, contact us at Papers-AT-CyberC.org.
Location and Dates: Nanjing, China, October 12 - 14, 2017
Web: http://cyberc.org/page.asp?id=183
Paper Submission: http://edas.info/N23498 or Login EDAS at http://edas.info/ by selecting "2017 Cybersecurity". Electronic submission to Papers-AT-cyberc.org with a title of "2017 Cybersecurity" is also accepted.
Cyber security and privacy protect for data information from adversarial disclosure or usage. Cyber communications involve with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Data leakage is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.
CSP solicits previously unpublished research papers in any aspect of security data analytics, network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.
Authors of CSP workshop 2017 are promoted to freely enjoy CyberC 2017 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:
? Infrastructure Security
? Access control
? Authorization, identification & authentication
? Accountability and anonymity
? Biometric authentication
? Big Data and Security
? Censorship and censorship-resistance
? Machine learning and Artifical intelligence for Cybersecurity detection and response
? Cloud security
? Cryptography and key algorithms
? Data-AT-rest and Data-on-the-Fly Security
? Distributed systems security
? Embedded systems security and forensics
? Encryption algorithms and analysis
? Hardware, application, and system security
? Information integrity, assurance and trustworthy
? Intrusion detection, traffic analysis and decision making of security
? Language-based security
? Location Privacy and Exposure
? Machine Learning and Streaming for Security
? Malware analysis and protection
? Mobile and App security
? Network security and malware
? Networking protocols and security trace back
? Privacy in pervasive sensing
? Privacy in social media
? Privacy-preserving systems
? Secure distributed data outsourcing (e.g., database as a service)
? Security and privacy policies
? Security architectures, policies, and regulations
? Security and privacy in database systems
? Security modeling and vulnerability analysis
? Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
? Usability/energy/cost/efficiency of security in the network
? Virtual private network (VPN) security
? Web browser security
Important Dates
April 15, 2017- Conference Paper Submission Deadline
June 30, 2017- Notification of Acceptance & Registration Starts
August 31, 2017 - Camera-Ready Paper Submission Due & Registration Due
Paper Acceptance
All submitted manuscripts will be reviewed by experts in the fields and will be judged on the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
Publications
Accepted and presented papers will be included in CyberC Processing and EI Journal special issue.
Technical Program Committee
Workshop Co-Chairs
Xiaolong Xu, Nanjing University of Posts and Telecommunications, China
Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom
Yang Xiang, Deakin University, Australia
Technical Program Committee Members
Nik Bessis, Edge Hill University, United Kingdom
Geng Yang, Nanjing University of Posts and Telecommunications, China
Zhijie Han, University of Henan, China
Luca Foschini, Università di Bologna, Italy
Weifeng Lu, Nanjing University of Posts and Telecommunications, China
Gregorio Martinez Perez, University of Murcia, Spain
Gongxuan Zhang, Nanjing University of Science and Technology, China
Desheng Fu, Nanjing University of Information Science Technology, China
Marcello Trovati, Edge Hill University, Edge Hill University, United Kingdom
Wei Li, Southeast University, China
Huiqun Zhou, Nanjing University, China
Daojing He, East China Normal University, China
Chunming Rong, University of Stavanger, Norway
Zhenjiang Dong, ZTE Corporation, China
Shancang Li, Edinburgh Napier University, United Kingdom
Xianghan Zheng, Fuzhou University, China
Jiguo Li, Hehai University, China
Frank Trethan Johnsen, University of Oslo, Norway
Gene Moo Lee, University of Texas at Arlington, USA
Gyu Myoung Lee, Liverpool John Moores University, United Kingdom
Rodrigo Campos Bortoletto, Federal Univeristy of the ABC, Brazil
Salah-Eddine BENBRAHIM, Ecole Polytechnique de Montréal, FrenceCyberC QQ:1625638480
Contact
For more information about the conference, please visit www.CyberC.org, contact us at Papers-AT-CyberC.org.
Other CFPs
- Understanding Aseptic Technique and Clean room Behavior -By AtoZ Compliance
- MANILA 6th International Conference on Chemical, Agricultural, Biological and Environmental Sciences
- 2017 2nd International Conference on Innovative Engineering Materials (ICIEM 2017)-EI Compendex, Scopus
- 2017 6th International Conference on Chemical Science and Engineering (ICCSE 2017)
- International Field School 2017
Last modified: 2017-03-04 00:08:09