We are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Cyber-crime, which includes any criminal activities related to computers and networks, has kept rising and it is now the third most important crime on FBI's priority list. The traditional attacks to email remain as the biggest intrusion factor people are facing, and new attacks are emerging every year with more widespread and destructive. Blackhole exploit kit is the most prevalent web thread in 2012, and it is further replaced by many new exploit kits that grew out of it in 2013. Andr/BBridge-A, the most widely spread Android malware in Trojan family, has infected thousands of mobile devices in last few years. Data leaks, is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices. CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors of CSP workshop 2014 are promoted to freely enjoy CyberC 2014 and Big Data Summit. Both of the events are co-sponsored by a number of industry giants.
10月10日
2014
会议日期
摘要截稿日期
初稿截稿日期
注册截止日期
2017年10月12日 中国 Nanjing,China
CSP 2017: 第六届网络安全与隐私国际研讨会2016年10月13日 中国 Chengdu,China
第五届网络安全与隐私国际研讨会2015年09月17日 中国 西安市
第四届网络安全和隐私国际研讨会2013年10月10日 中国 北京市
第二届网络安全与隐私国际研讨会
留言