ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cybersecurity 2018 - 7th International Workshop on Cyber Security and Privacy

Date2018-10-18 - 2018-10-20

Deadline2018-07-21

VenueZhengzhou, China China

Keywords

Websitehttps://cyberc.org

Topics/Call fo Papers

You are welcome to contribute your original research to 2018 Cybersecurity Workshop! Cyber security and privacy protects for data information from adversarial disclosure or usage. Cyber communications intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. New malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
2018 Cybersecurity workshop solicits previously unpublished research papers in any aspect of security data analytics, network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors of Cybersecurity workshop 2018 are free for enjoying CyberC 2018 and Big Data Summit. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below:
Infrastructure Security
Access control
Authorization, identification & authentication
Accountability and anonymity
Biometric authentication
Big Data and Security
Censorship and censorship-resistance
Cloud security
Cryptography and key algorithms
Data-AT-rest and Data-on-the-Fly Security
Distributed systems security
Embedded systems security and forensics
Encryption algorithms and analysis
Hardware, application, and system security
Information integrity, assurance and trustworthy
Intrusion detection, traffic analysis and decision making of security
Language-based security
Location Privacy and Exposure
Machine Learning and Security
Malware analysis and protection
Mobile security
Network security and malware
Networking protocols and security trace back
Privacy in pervasive sensing
Privacy in social media
Privacy-preserving systems
Secure distributed data outsourcing (e.g., database as a service)
Security and privacy policies
Security architectures, policies, and regulations
Security and privacy in database systems
Security modeling and vulnerability analysis
Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
Usability/energy/cost/efficiency of security in the network
Virtual private network (VPN) security
Web browser security

Last modified: 2018-04-06 16:22:37