2019-06-25

Title: CFP: Cybersecurity Workshop, Guilin, ChinaOct. 17-19


Web: http://cyberc.org/Program/Security

Submissions: Submit your manuscript to [email protected] a title of“Cybersecurity 2019 Submission”


2019

Cybersecurity workshop solicits previously unpublished research

papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic,

risk assessment, network security, data security, blockchain, and computer

security or privacy in the theory, design, implementation, prototype, analysis,

evaluation, testing, verification, or empirical results of secure systems. Authorsare invited to submit original technical papers covering, but not limited tothe topics of interest listed below:

[if !supportLists]·        [endif]Infrastructure Security

[if !supportLists]·        [endif]Network monitoring, riskassessment

[if !supportLists]·        [endif]AI for intrusion detection andintelligence

[if !supportLists]·        [endif]Access control, Authorization, identification &

authentication

[if !supportLists]·        [endif]Accountability and anonymity

[if !supportLists]·        [endif]Biometric authentication

[if !supportLists]·        [endif]Censorship and censorship-resistance

[if !supportLists]·        [endif]Cloud security

[if !supportLists]·        [endif]Cryptography and key algorithms

[if !supportLists]·        [endif]Data-at-rest andData-on-the-Fly Security

[if !supportLists]·        [endif]Distributed systems security

[if !supportLists]·        [endif]Embedded systems security and forensics

[if !supportLists]·        [endif]Encryption algorithms and analysis

[if !supportLists]·        [endif]Hardware, application, and system security

[if !supportLists]·        [endif]Information integrity, assurance and trustworthy

[if !supportLists]·        [endif]Intrusion detection, traffic analysis and decision making of

security

[if !supportLists]·        [endif]Language-based security

[if !supportLists]·        [endif]Location Privacy and Exposure

[if !supportLists]·        [endif]Machine Learning and Security

[if !supportLists]·        [endif]Malware analysis and protection        

[if !supportLists]·        [endif]Mobile security

[if !supportLists]·        [endif]Network security and malware

[if !supportLists]·        [endif]Networking protocols and security trace back

[if !supportLists]·        [endif]Privacy in pervasive sensing

[if !supportLists]·        [endif]Privacy in social media

[if !supportLists]·        [endif]Secure distributed data outsourcing (e.g., database as a

service)

[if !supportLists]·        [endif]Security and privacy policies

[if !supportLists]·        [endif]Security architectures, policies, and regulations

[if !supportLists]·        [endif]Security and privacy in database systems  

[if !supportLists]·        [endif]Security modeling and vulnerability analysis

[if !supportLists]·        [endif]Security protocols and strategies in sensor, cognitive, adhoc, mesh, and satellite networks 

[if !supportLists]·        [endif]Usability/energy/cost/efficiency of security in the network


Important Dates      

Conference

Paper Submission Deadline: July 15, 2019

Notification of

Acceptance & Registration Starts: August 1, 2019

Camera-Ready

Paper Submission & Registration Due: August 20, 2019

 

WORKSHOP CHAIR

Hongwei Li - University of Electronic Science andTechnology of China

Yujue Wang - Guilin University of ElectronicTechnology, China

 

PROGRAM COMMITTEE

 

Hua Deng, Hunan University

Yanbin Zheng, Guilin

University of Electronic Technology

Wanqing Wu, Hebei University

YangYang, Fuzhou University

Zhen Liu, Shanghai Jiao TongUniversity

PinghaiYuan, National University of Singapore

Yilei Wang, Qufu Normal University

Anjia Yang, Jinan University

Letian Sha, Nanjing University ofPosts and Telecommunications

Lin Zhong, Beihang University


Manuscript Template

https://www.ieee.org/conferences/publishing/templates.html

 

Paper Publication               

Papers will be accepted with Regular Papers and ShortPapers with maximal 10 pages and 4 pages in the final versionrespectively.  All papers will bepublished in CyberC 2019 Proceeding by IEEE CPS and collected in IEEE Xplore,EI, and other databases.


Special Issue

Excellent papers withminimal 30% extension will be recommended for a Digital Communications andNetworks CyberC 2019 Special Issue (SCI-E) -http://www.keaipublishing.com/en/journals/digital-communications-and-networks/ 

 

Contact

For more informationabout the conference, please visit www.CyberC.org, contact us [email protected] 

你可能感兴趣的:(2019-06-25)