征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Cyber security and privacy protect for data information from adversarial disclosure or usage. Cyber communications involve with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Data leakage is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.

征稿信息

重要日期

2017-04-15
初稿截稿日期
2017-06-30
初稿录用日期
2017-08-31
终稿截稿日期

征稿范围

  • Infrastructure Security

  • Access control

  • Authorization, identification & authentication

  • Accountability and anonymity

  • Biometric authentication

  • Big Data and Security

  • Censorship and censorship-resistance

  • Machine learning and Artifical intelligence for Cybersecurity detection and response

  • Cloud security

  • Cryptography and key algorithms

  • Data-at-rest and Data-on-the-Fly Security

  • Distributed systems security

  • Embedded systems security and forensics

  • Encryption algorithms and analysis

  • Hardware, application, and system security

  • Information integrity, assurance and trustworthy

  • Intrusion detection, traffic analysis and decision making of security

  • Language-based security

  • Location Privacy and Exposure

  • Machine Learning and Streaming for Security

  • Malware analysis and protection             

  • Mobile and App security

  • Network security and malware

  • Networking protocols and security trace back

  • Privacy in pervasive sensing

  • Privacy in social media

  • Privacy-preserving systems        

  • Secure distributed data outsourcing (e.g., database as a service)

  • Security and privacy policies

  • Security architectures, policies, and regulations

  • Security and privacy in database systems             

  • Security modeling and vulnerability analysis

  • Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks 

  • Usability/energy/cost/efficiency of security in the network

  • Virtual private network (VPN) security

  • Web browser security

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月12日

    2017

    10月14日

    2017

  • 04月15日 2017

    初稿截稿日期

  • 06月30日 2017

    初稿录用通知日期

  • 08月31日 2017

    终稿截稿日期

  • 10月14日 2017

    注册截止日期

主办单位
Nanjing University of Posts and Telecommunications
承办单位
Key Laboratory of electronic information control
协办单位
Nanjing University of Posts and Telecommunications
历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询