2019 Cybersecurity: The 8th International Workshop on Cyber Security and Privacy
You are welcome to contribute your original research to 2019 Cybersecurity Workshop! Cyber security and privacy protects for data information from adversarial disclosure or usage. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. New malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
2019 Cybersecurity workshop solicits previously unpublished research papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic, risk assessment, network security, data security, blockchain, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below:
Network monitoring, risk assessment
AI for intrusion detection and intelligence
Access control, Authorization, identification & authentication
Accountability and anonymity
Censorship and censorship-resistance
Cryptography and key algorithms
Data-at-rest and Data-on-the-Fly Security
Distributed systems security
Embedded systems security and forensics
Encryption algorithms and analysis
Hardware, application, and system security
Information integrity, assurance and trustworthy
Intrusion detection, traffic analysis and decision making of security
Location Privacy and Exposure
Machine Learning and Security
Malware analysis and protection
Network security and malware
Networking protocols and security trace back
Privacy in pervasive sensing
Privacy in social media
Secure distributed data outsourcing (e.g., database as a service)
Security and privacy policies
Security architectures, policies, and regulations
Security and privacy in database systems
Security modeling and vulnerability analysis
Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
Usability/energy/cost/efficiency of security in the network
Hongwei Li - University of Electronic Science and Technology of China
Yujue Wang - Guilin University of Electronic Technology, China
Hua Deng - Hunan University
Yanbin Zheng - Guilin University of Electronic Technology
Wanqing Wu - Hebei University
Yang Yang - Fuzhou University
Zhen Liu - Shanghai Jiao Tong University
Pinghai Yuan - National University of Singapore
Yilei Wang - Qufu Normal University
Anjia Yang - Jinan University
Letian Sha - Nanjing University of Posts and Telecommunications
Lin Zhong - Beihang University
Electronic submission to Program Chair at email@example.com with title of “Cybersecurity 2019 Submission" is also accepted. Please DO NOT submit in both ways.
All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see
. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.
Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
All accepted and presented papers will be equally published in the CyberC 2019 Proceeding.