| |||||||||||||||
Cybersecurity 2020 : The 9th International Workshop on Cyber Security and Privacy | |||||||||||||||
Link: http://cyberc.org/Program/Security | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Note: Submission due date: June 20, 2020
Publication: IEEE (EI & IEEE Xplore) You are welcome to contribute your original research to 2020 Cybersecurity Workshop! Cybersecurity and privacy protect data information from adversarial disclosure or usage. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in distributed and mobile environments. New attacks are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. 2020 Cybersecurity workshop solicits previously unpublished research papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic, risk assessment, network security, data security, blockchain, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below: • Infrastructure Security • Network monitoring, risk assessment • AI for intrusion detection and intelligence • Access control, Authorization, identification & authentication • Accountability and anonymity • Biometric authentication • Censorship and censorship-resistance • Cloud security • Cryptography and key algorithms • Data-at-rest and Data-on-the-Fly Security • Distributed systems security • Embedded systems security and forensics • Encryption algorithms and analysis • Hardware, application, and system security • Information integrity, assurance and trustworthy • Intrusion detection, traffic analysis and decision making of security • Language-based security • Location Privacy and Exposure • Machine Learning and Security • Malware analysis and protection • Mobile security • Network security and malware • Networking protocols and security trace back • Privacy in pervasive sensing • Privacy in social media • Secure distributed data outsourcing (e.g., database as a service) • Security and privacy policies • Security architectures, policies, and regulations • Security and privacy in database systems • Security modeling and vulnerability analysis • Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks • Usability/energy/cost/efficiency of security in the network WORKSHOP CHAIR Weifeng Lu, Nanjing Univ. of Posts and Tele., China PROGRAM COMMITTEE Hua Deng, Hunan University Yanbin Zheng, Guilin University of Electronic Technology Wanqing Wu, Hebei University Yang Yang, Fuzhou University Zhen Liu, Shanghai Jiao Tong University Pinghai Yuan, National University of Singapore Yilei Wang, Qufu Normal University Anjia Yang, Jinan University Letian Sha, Nanjing University of Posts and Telecommunications Lin Zhong, Beihang University Submissions: Submit your manuscript to Papers@cyberc.org with a title of “Cybersecurity 2020 Submission” or through EDAS Manuscript Template https://www.ieee.org/conferences/publishing/templates.html Contact For more information about the conference, please visit www.CyberC.org, contact us at Papers@CyberC.org or Program Chair. |
|