- From: Conference Contact <ica3pp2011@gmail.com>
- Date: Tue, 25 Apr 2017 17:54:21 +0800
- To: CSS 2017 <ica3pp2011@gmail.com>
- Message-ID: <CAANfMZtvjGf5Z8kNCF2ZNTBRX=jNRqvUZG87d_XNr06P69ARGw@mail.gmail.com>
CSS 2017 CFP The CSS-2017 symposium is the 9th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. *Venue & Time*: Xi’an China, October 23-25, 2017 *Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017 (Acceptance Notification) *Tracks* · Track 1: Privacy Preserving · Track 2: Intrusion Detection and Forensics · Track 3: Cyber Physical System Security · Track 4: Big Data Security · Track 5: Mobile Security *Special issues* Future Generation Computer Science (SCI, IF=2.786) Concurrency and Computation: Practice and Experience (SCI, IF=0.94) Cluster Computing (SCI, IF=1.514) *Scope* We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for CSS 2017 include, but are not limited to: Web security [Track 1,2,4] Database security [Track 4] Adversary machine learning [Track 4] Data mining security [Track 4] Watermarking [Track 2] Security in social networks [Track 1,2,4] Access control [Track 2,3,5] Cyber physical security [Track 3] Trust computing [Track 2,3,5] Digital forensics [Track 2] Intrusion detection [Track 2] Malware and botnet [Track 2] Vulnerability and risk assessment [Track 2,3,5] Denial-of-Service attacks [Track 2,3] Anonymous communication [Track 2] Security in wireless communication [Track 2,5] Security in mobile devices [Track 5] Privacy preserving [Track 1] Attacks to privacy [Track 1] Cloud computing security [Track 1,2,4] Operation system security [Track 2,5] Software security [Track 2,5] Security architecture [Track 2,3] *Instructions for authors* The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages with the over length charge) and Short Papers (up to 4 pages) are solicited.
Received on Tuesday, 25 April 2017 09:54:55 UTC