Security

2016-CSP: The 5th International Workshop on Cyber Security and Privacy

Chengdu, China, Oct 13 - 15, 2016

You are welcome to contribute your original research to CPS!

 

Cyber security and privacy protects for data information from adversarial disclosure or usage. Cyber communications intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Data leaks, is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.

 

CSP solicits previously unpublished research papers in any aspect of security data analytics, network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.

Authors of CSP workshop 2016 are promoted to freely enjoy CyberC 2016 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.

Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:

·         Infrastructure Security

·         Access control

·         Authorization, identification & authentication

·         Accountability and anonymity

·         Biometric authentication

·         Big Data and Security

·         Censorship and censorship-resistance

·         Cloud security

·         Cryptography and key algorithms

·         Data-at-rest and Data-on-the-Fly Security

·         Distributed systems security

·         Embedded systems security and forensics

·         Encryption algorithms and analysis

·         Hardware, application, and system security

·         Information integrity, assurance and trustworthy

·         Intrusion detection, traffic analysis and decision making of security

·         Language-based security

·         Location Privacy and Exposure

·         Machine Learning and Security

·         Malware analysis and protection             

·         Mobile security

·         Network security and malware

·         Networking protocols and security trace back

·         Privacy in pervasive sensing

·         Privacy in social media

·         Privacy-preserving systems        

·         Secure distributed data outsourcing (e.g., database as a service)

·         Security and privacy policies

·         Security architectures, policies, and regulations

·         Security and privacy in database systems             

·         Security modeling and vulnerability analysis

·         Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks 

·         Usability/energy/cost/efficiency of security in the network

·         Virtual private network (VPN) security

·         Web browser security

 

Important Dates

 

Submission deadline for full (8 pages) and short (4 pages) papers: July 15 2016

Notification of acceptance: August 15 2016

Camera-ready and registration deadline: September 1 2016

 

Paper Acceptance            

All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively. 

 

Publications

Accepted and presented papers will be included into the IEEE Conference Proceeding for publication via IEEE Computer Society CPS (Conference Publishing Services). All the accepted papers in 2015 are collected in the IEEE Explore, EI Compendex, EI Inspec, and Google Scholar. 

 

Technical Program Committee

 

Workshop Co-Chairs

Xiaolong Xu, Nanjing University of Posts and Telecommunications, China

Jose M. Alcaraz Calero, University of the West of Scotland, United Kingdom

Yang Xiang, Deakin University, Australia

 

Technical Program Committee Members

Nik Bessis, Edge Hill University, United Kingdom

Geng Yang, Nanjing University of Posts and Telecommunications, China

Zhijie Han, University of Henan, China

Luca Foschini, Università di Bologna, Italy

Weifeng Lu, Nanjing University of Posts and Telecommunications, China

Gregorio Martinez Perez, University of Murcia, Spain

Gongxuan Zhang, Nanjing University of Science and Technology, China

Desheng Fu, Nanjing University of Information Science Technology, China

Marcello Trovati, Edge Hill University, Edge Hill University, United Kingdom

Wei Li, Southeast University, China

Huiqun Zhou, Nanjing University, China

Daojing He, East China Normal University, China

Chunming Rong, University of Stavanger, Norway

Zhenjiang Dong, ZTE Corporation, China

Shancang Li, Edinburgh Napier University, United Kingdom

Xianghan Zheng, Fuzhou University, China

Jiguo Li, Hehai University, China

Frank Trethan Johnsen, University of Oslo, Norway

Gene Moo Lee, University of Texas at Arlington, USA

Gyu Myoung Lee, Liverpool John Moores University, United Kingdom

Rodrigo Campos Bortoletto, Federal Univeristy of the ABC, Brazil 

Salah-Eddine BENBRAHIM, Ecole Polytechnique de Montréal, Frence

2015 - 2016 Copyright Cyberc2016 All rights reserved(Best viewed at 1152 X 864,IE 7.0)
Technique Support: Shanghai HUICE ICP:沪ICP备12047207号-2