| |||||||||||||||||
CSS 2015 : The 7th International Symposium on Cyberspace Safety and Security (CSS 2015) | |||||||||||||||||
Link: http://cse.stfx.ca/~css2015/index.htm | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.
The CSS-2015 symposium is the 7th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. The CSS-2015 symposium is the next event in a series of highly successful international conferences on cyberspace safety and security previously held as CSS-2014 (Paris, France, 2014),CSS-2013 (Zhangjiajie, China, 2013), CSS-2012 (Melbourne, Australia, 2012), CSS-2012 (Milan, Italy, 2011), CSS-2009 (Chengdu, China, 2009), and CSS-2008 (Sydney, Australia, 2008). Topics of interest include, but not limited to: · Access Control and Trust Management · Active Defense Techniques and Systems · Attack Containment · Attack Recovery · Benchmark, Analysis and Evaluation of Cybersecurity · Bitcoins Systems · Digital Rights Management · Distributed Intrusion Detection/Prevention Systems · Denial-of-Service Attacks and Countermeasures · Digital Identity Management and Authentication · Implementation, Deployment and Management of Cybersecurity · Intelligent Defense Systems · Internet and Network Forensics · Mobile Biometrics · Risk Assessment in Cybersecurity · Secure Network Architectures · Security for Large-scale Systems and Critical Infrastructures · Security for P2P systems and Grid Systems · Security for Ad-Hoc and Sensor Networks · Security in Web Services · Security in Pervasive and Embedded Systems · Security Theory and Tools · Spam Detection and Prevention · Social and Legal Issues in Cybersecurity · Software and System Assurance · Viruses, Worms, and Other Malicious Code Submission Guidelines: Submitted papers must report novel results and have not been published or submitted to journals or conferences. Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages including tables, figures, references and appendixes with the over length charge) and Short Papers (up to 4 pages) are solicited. Papers will be selected based on their originality, significance, relevance, and clarity of presentation. The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. |
|