Cyber security and privacy protect for data information from adversarial disclosure or usage. Cyber communications involve with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. Consequently, the detections and preventions of these cyber-attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Data leakage is becoming one of the main security concerns, especially when we are living in a virtual world built on top of social networks, cloud infrastructure, and smart mobile devices.
Infrastructure Security
Access control
Authorization, identification & authentication
Accountability and anonymity
Biometric authentication
Big Data and Security
Censorship and censorship-resistance
Machine learning and Artifical intelligence for Cybersecurity detection and response
Cloud security
Cryptography and key algorithms
Data-at-rest and Data-on-the-Fly Security
Distributed systems security
Embedded systems security and forensics
Encryption algorithms and analysis
Hardware, application, and system security
Information integrity, assurance and trustworthy
Intrusion detection, traffic analysis and decision making of security
Language-based security
Location Privacy and Exposure
Machine Learning and Streaming for Security
Malware analysis and protection
Mobile and App security
Network security and malware
Networking protocols and security trace back
Privacy in pervasive sensing
Privacy in social media
Privacy-preserving systems
Secure distributed data outsourcing (e.g., database as a service)
Security and privacy policies
Security architectures, policies, and regulations
Security and privacy in database systems
Security modeling and vulnerability analysis
Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
Usability/energy/cost/efficiency of security in the network
Virtual private network (VPN) security
Web browser security
10月12日
2017
10月14日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
2016年10月13日 中国 Chengdu,China
第五届网络安全与隐私国际研讨会2015年09月17日 中国 西安市
第四届网络安全和隐私国际研讨会2014年10月10日 中国 上海市
第三届网络安全和隐私国际研讨会2013年10月10日 中国 北京市
第二届网络安全与隐私国际研讨会
留言