ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing

Date2018-12-10 - 2018-12-13

Deadline2018-05-12

VenueKaohsiung, Taiwan Taiwan

Keywords

Websitehttps://dsc2018.nsysu.edu.tw

Topics/Call fo Papers

The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics.
Regular Track: Computer Systems, Networks and Software/Hardware
Advanced Persistent Threat (APT)
Network Attack and Defense Techniques
Botnet and Intrusion Detection
Cryptographic Methods and Toolkits
Cyber attacks
Software Vulnerabilities and Security
Database Security and Privacy
Embedded Systems and IoT Devices
Mobile and Cloud Computing security
AI and Big Data Analysis for security
Malware Mutation
Deep Learning for Attack and Defense
Block Chain and Finance Security
Security Hardware and Circuits
Authentication and Authorization
Soft-Error Analysis and Models
CAD Algorithms and Tools
Electronic Circuits and Systems
Fault-Tolerance and Reliability
Industrial Design Experiences
Noise- and Power-Aware Designs
Stochastic Circuits and Systems
Temperature-Aware Designs
Variable-Latency Designs
Experience and Practice
The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:
Attacks on Information Systems and Digital Storage
CSIRTs, Incident Analysis and Response
Hacking Techniques and Countermeasures
Honeypots/Honeynets
Malware Analysis and Reversing
Mobile Communications Security and Vulnerabilities
Newly discovered vulnerabilities
Offensive Information Technology
Reverse Engineering, Forensics, and Anti-Forensics
Spyware, Phishing and Distributed Attacks
VLSI/CAD Design Knowhow

Last modified: 2018-02-17 17:14:32