SecIoE 2017 - 2nd International Workshop on Security of the Internet of Everything
Topics/Call fo Papers
While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked. The conference will cover research on all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability, trustworthiness, and sustainability of computer networks and systems. The aim of NSS is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. NSS 2017 is the next event in a series of highly successful events of Network and System Security. Previous editions were held in: Taipei (2016), New York City, USA (2015), Xi'an, China (2014), Madrid, Spain (2013); Wu Yi Shan, China (2012); Milan, Italy (2011); Melbourne, Australia; (2010); Gold Coast, Australia (2009); Shanghai, China (2008); and Dalian, China (2007).
Topics of interest include but are not limited to:
-Active Defense Systems
-Adaptive Defense Systems
-Analysis, Benchmark of Security Systems
-Applied Cryptography
-Authentication
-Big Data Trust, Security and Privacy
-Biometric Security
-Blockchain and Bitcoin Security
-Complex Systems Security
-Cyber Hacking and Protection
-Database and System Security
-Data Protection and Integrity
-Digital Forensics
-Distributed Access Control
-Distributed Attack Systems
-Denial-of-Service
-High Performance Network Virtualization
-High Performance Security Systems
-Hardware Security
-Identity Management
-Intelligent Defense Systems
-Insider Threats
-Intellectual Property Rights Protection
-Internet and Network Forensics
-Intrusion Detection and Prevention
-Key Distribution and Management
-Large-scale Attacks and Defense
-Malware Detection
-Network Resiliency
-Network Security
-RFID/NFC Security and Privacy
-Security Architectures
-Security for Critical Infrastructures
-Security for Cyber Physical Systems
-Security in Cloud and Grid Systems
-Security in Pervasive/Ubiquitous Computing
-Security and Privacy in Smart-X Systems
-Security and Privacy in Social Networks
-Security and Privacy in Wireless Networks
-Secure Mobile Agents and Mobile Code
-Security Policy
-Security Protocols
-Security Simulation and Tools
-Security Theory and Tools
-Security, Trust and Privacy in Crowdsourcing, Crowdsensing and CrowdPayment
-Security, Trust and Privacy in Internet of Things
-Standards and Assurance Methods
-Trusted Computing
-Trust Management
-Watermarking and Digital Rights Management
-World Wide Web Security
Topics of interest include but are not limited to:
-Active Defense Systems
-Adaptive Defense Systems
-Analysis, Benchmark of Security Systems
-Applied Cryptography
-Authentication
-Big Data Trust, Security and Privacy
-Biometric Security
-Blockchain and Bitcoin Security
-Complex Systems Security
-Cyber Hacking and Protection
-Database and System Security
-Data Protection and Integrity
-Digital Forensics
-Distributed Access Control
-Distributed Attack Systems
-Denial-of-Service
-High Performance Network Virtualization
-High Performance Security Systems
-Hardware Security
-Identity Management
-Intelligent Defense Systems
-Insider Threats
-Intellectual Property Rights Protection
-Internet and Network Forensics
-Intrusion Detection and Prevention
-Key Distribution and Management
-Large-scale Attacks and Defense
-Malware Detection
-Network Resiliency
-Network Security
-RFID/NFC Security and Privacy
-Security Architectures
-Security for Critical Infrastructures
-Security for Cyber Physical Systems
-Security in Cloud and Grid Systems
-Security in Pervasive/Ubiquitous Computing
-Security and Privacy in Smart-X Systems
-Security and Privacy in Social Networks
-Security and Privacy in Wireless Networks
-Secure Mobile Agents and Mobile Code
-Security Policy
-Security Protocols
-Security Simulation and Tools
-Security Theory and Tools
-Security, Trust and Privacy in Crowdsourcing, Crowdsensing and CrowdPayment
-Security, Trust and Privacy in Internet of Things
-Standards and Assurance Methods
-Trusted Computing
-Trust Management
-Watermarking and Digital Rights Management
-World Wide Web Security
Other CFPs
- 2018 IEEE/ACM International Symposium on Code Generation and Optimization
- 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
- 4th Conference on Optimization Methods and Software
- 2nd International Conference on Railway Engineering
- 9th International Workshop on Software Aging and Rejuvenation
Last modified: 2017-05-14 13:32:33