W3C home > Mailing lists > Public > semantic-web@w3.org > April 2017

CFP: CSS 2017, Xi'an, China, October 23-25, 2017

From: Conference Contact <ica3pp2011@gmail.com>
Date: Tue, 25 Apr 2017 17:54:21 +0800
Message-ID: <CAANfMZtvjGf5Z8kNCF2ZNTBRX=jNRqvUZG87d_XNr06P69ARGw@mail.gmail.com>
To: CSS 2017 <ica3pp2011@gmail.com>
CSS 2017 CFP

The CSS-2017 symposium is the 9th International Symposium on Cyberspace
Safety and Security. It provides a leading edge forum to foster interaction
between researchers and developers with the cyberspace safety and security
communities, and to give attendees an opportunity to network with experts
in this area. It focusses on Cyberspace Safety and Security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of cyberspace.

*Venue & Time*: Xi’an China, October 23-25, 2017

*Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017
(Acceptance Notification)


·         Track 1: Privacy Preserving

·         Track 2: Intrusion Detection and Forensics

·         Track 3: Cyber Physical System Security

·         Track 4: Big Data Security

·         Track 5: Mobile Security

*Special issues*

Future Generation Computer Science (SCI, IF=2.786)

Concurrency and Computation: Practice and Experience (SCI, IF=0.94)

Cluster Computing (SCI, IF=1.514)


We invite submissions from academia, government, and industry presenting
novel research on all theoretical and practical aspects of computer and
network security. Areas of interest for CSS 2017 include, but are not
limited to:

Web security [Track 1,2,4]

Database security [Track 4]

Adversary machine learning [Track 4]

Data mining security [Track 4]

Watermarking [Track 2]

Security in social networks [Track 1,2,4]

Access control [Track 2,3,5]

Cyber physical security [Track 3]

Trust computing [Track 2,3,5]

Digital forensics [Track 2]

Intrusion detection [Track 2]

Malware and botnet [Track 2]

Vulnerability and risk assessment [Track 2,3,5]

Denial-of-Service attacks [Track 2,3]

Anonymous communication [Track 2]

Security in wireless communication [Track 2,5]

Security in mobile devices [Track 5]

Privacy preserving [Track 1]

Attacks to privacy [Track 1]

Cloud computing security [Track 1,2,4]

Operation system security [Track 2,5]

Software security [Track 2,5]

Security architecture [Track 2,3]

*Instructions for authors*

The accepted papers from this conference will be submitted for publication
in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases
(EI Compendex). Distinguished papers, after further revisions, will be
considered for possible publication in several SCI & EI indexed special
issues of prestigious international journals. By submitting a paper to the
conference, authors assure  that if the paper is accepted, at least one
author will attend the conference and present the paper. Papers should be
written in English conforming to the IEEE conference proceedings format
(8.5" x 11", Two-Column). Papers should be submitted through the paper
submission system at the conference website. Full Papers (up to 8 pages, or
12 pages with the over length charge) and Short Papers (up to 4 pages) are
Received on Tuesday, 25 April 2017 09:54:55 UTC

This archive was generated by hypermail 2.4.0 : Tuesday, 5 July 2022 08:45:50 UTC