| |||||||||||||||
CSP 2012 : The first International Workshop on Cyber Security and Privacy | |||||||||||||||
Link: http://www.cyberc.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Co-Sponsored by:
IEEE Computer Society, IEEE Technical Committee on Simulation, IEEE CS Task Force on Networked Mobile Systems, Beijing Jiaotong University, and University of Louisville. Patrons: AT&T, Huawei, InfoBeyond and Tech Mahindra Sanya, China, October 10 - 12, 2012 We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Some wireless communications are even covert and prevent to be detected or intercepted by the regular energy detectors. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new vulnerabilities such as ClickBot.A are emerging every day and they are even more stealthy and intelligent. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Clouds bring us new application along with new vulnerabilities that we have to investigate. CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below: • Cryptography and key algorithms • Security modeling and vulnerability analysis • Intrusion detection, traffic analysis and decision making of security • Information integrity, assurance, trustworthy, authentication, and access control • Distributed data storage and secure data management outsourcing (e.g., database as a service) • Protocol security and privacy policies • Distributed systems security • Embedded systems security and forensics • Network security and malware • Networking protocols and security trace back • Accountability and anonymity • Security architectures, policy, and regulatory • Hardware, application, and system security • Censorship and censorship-resistance • Language-based security • Privacy-preserving systems • Usability/energy/cost/efficiency of security in the network • Security protocols and strategies in clouds, sensor, cognitive, ad hoc, mesh, and satellite networks Important Days: May 15, 2012 - Conference Paper Submission Deadline July 10, 2012 - Notification of Acceptance/Rejection & Registration Starts August 1, 2012 - Camera-Ready Paper Submission Due & Registration Due Program Committee Honorable General Chair David Lu, AT&T Enterprise IT, USA General Co-Chairs Mahmoud Daneshmand, AT&T Labs, USA Ratan Ghosh, Indian Institute of Technology, Kanpur, India Program Co-Chairs Bin Xie, InfoBeyond Technology LLC, USA Charlie Yang, AT&T Labs, USA Finance Chair Yingbing Yu, Austin Peay State University, USA Sanjuli Agrawal, Indiana University Southeast, USA Publicity Co-Chairs Na Bai, Southeast University, China J.Octavio Gutierrez-Garcia, Gwangju Institute of Science and Technology, Republic of Korea Ezziyyani Mostafa, University abdelmalk Essaâdi, Morocco Shyan-ming Yuan, Providence University, Taiwan Workshop Co-Chairs Charlie Yang, AT&T Labs, USA Chi-Tsun Cheng, University of Calgary, Canada Bin Xie, InfoBeyond Technology LLC, USA Local Coordination Co-Chairs Dongmei Sun, Beijing Jiaotong University, China Qingwen Han, Congqing University, China Steering Committee Anup Kumar, (Chair) University of Louisville, USA Ratan Ghosh, Indian Institute of Technology, Kanpur, India Qing-An Zheng, North Carolina A&T University, USA Chi-Ming Chen, AT&T, USA Liang-Jie Zhang, IBM Thomas J. Watson Research Center, USA Technical Program Committee Abraham George, Keyocera, India Alok Srivastava, Microsoft Research, USA Arturo Gonzalez-Escribano, University of Valladolid, Spain Ash Mohammad Abbas, Aligarh Muslim University, India Baoqiang Yan, Missouri Western State University, USA Berk Canberk, Istanbul Technical University, Turkey Bin Zhou, National University of Defense Technology, China Chin-Ling Chen, National Pingtung Institute of Commerce, Taiwan Chung-Hua Chu, National Taichung Institute of Technology, Taiwan Dexing Zhong, Xi’an Jiaotong University, China Diego R. Llanos, University of Valladolid, Spain Eric Chen, NTT Corporation, Japan Fernando Zacarias-Flores, Benemerita Universidad Autonoma de Puebla, MX Fouad Chedid, Notre Dame University – Louaize, Lebanon Guey-Yun Chang, National Central University, Taiwan Hao Zhang, Central South University, China Hend Al-Khalifa, King Saud University, Saudi Arabia Jaeho Choi, Chonbuk National University, Korea Jan-Jan Wu, Institute of Information Science, Taiwan Jen-Jee Chen, National University of Taiwan, Taiwan Jens-Matthias Bohli, NEC Laboratories Europe, Germany Jinfang Sheng, Central South University, China Lanxiang Chen, Fujian Normal University, China Li Zeng, University of Texas at Arlington, USA Li Zhao, Microsoft Corporation, USA Liyu Xu, Excel Directional Technologies, USA Maiga Chang, Athabasca University, Canada Maximilien Gadouleau, Queen Mary, University of London, UK Min Zhu, SiChuan University, China Mohamed Farouk Abdel Hady, University of Ulm, Germany Mohammed Abdala, AL-Nahrain University, Iraq Narendra Chaudhari, Indian Institute of Technology Indore, India Narisa Chu, CWLab International, Ltd., USA Nedal Ababneh, Telecom Pairs, France Patrick Hung, University of Ontario Institute of Technology, Canada Raju Gottumukkala, University of Louisiana at Lafayette, USA Rasha Osman, Imperial College of London, UK Rich Lee, IBM, Taiwan Rosalina Abd. Salam, Universiti Sains Islam Malaysia, Malaysia Rossana Maria de Castro, Andrade Federal University of Ceará, Brazil Ruhani Ab. Rahman, Universiti Teknologi MARA, Malaysia Rui Tan, Michigan State University, USA Sameh Abdel-Naby, University College Dublin, Ireland SK Basu, Banaras Hindu University, India Stefano Berretti, University of Florence, Italy Subin Shen, Nanjing University of Posts & Telecommunications, China Sun-Yuan Hsieh, National Cheng Kung University, Tainan Tao Ma, Beijing University of Posts and Telecommunications, China Taoi Hsu, Shih Hsin University, Taiwan Visvasuresh Victor Govindaswamy, Texas A&M University-Texarkana, USA Wei Guo, Nanjing University of Information Science and Technology, China Wei Wei, Xi'an Jiaotong University, China Weixing Wang, South China Agricultural University, China Xiaoyan Zhu, Xidian University, China Y. Tanaka, Hokkaido University, Japan Yang Liu, University of Louisville, USA Yangjun Chen, Winnipeg University, Canada Yili Gong, Wuhan University, China Yong Zhao, University of Electronic and Science Technology of China, China Yun Huoy Choo, Universiti Teknikal Malaysia Melaka, Malaysia Zhengbao Li, Shandong Academy of Sciences, China Manuscript Guidelines Paper Submission Web: http://edas.info/ by clicking on CSP 2012 Paper Submission Email: Papers@cyberc.org All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/ Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English. Manuscript submission procedure is available over the Web at http://edas.info/. We encourage you to use edas online submission by selecting “CSP 2012”. If you have troubles in using the Web submission, you can also submit your paper to papers@cyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file. Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Paper Acceptance Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively. Publications All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference. CyberC Facebook http://www.facebook.com/groups/nasirsyed.utp/ CyberC Weibo http://weibo.com/u/2500282610 Contact: For more information about the conference, please visit www.CyberC.org or contact us at Papers@CyberC.org. |
|