2018 Cybersecurity: The 7th International Workshop on Cyber Security and Privacy


You are welcome to contribute your original research to 2018 Cybersecurity Workshop! Cyber security and privacy protects for data information from adversarial disclosure or usage. Cyber communications intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. New malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.

2018 Cybersecurity workshop solicits previously unpublished research papers in any aspect of security data analytics, network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors of Cybersecurity workshop 2018 are free for enjoying CyberC 2018 and Big Data Summit. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below:

    Infrastructure Security
    Access control
    Authorization, identification & authentication
    Accountability and anonymity
    Biometric authentication
    Big Data and Security
    Censorship and censorship-resistance
    Cloud security
    Cryptography and key algorithms
    Data-at-rest and Data-on-the-Fly Security
    Distributed systems security
    Embedded systems security and forensics
    Encryption algorithms and analysis
    Hardware, application, and system security
    Information integrity, assurance and trustworthy
    Intrusion detection, traffic analysis and decision making of security
    Language-based security
    Location Privacy and Exposure
    Machine Learning and Security
    Malware analysis and protection
    Mobile security
    Network security and malware
    Networking protocols and security trace back
    Privacy in pervasive sensing
    Privacy in social media
    Privacy-preserving systems
    Secure distributed data outsourcing (e.g., database as a service)
    Security and privacy policies
    Security architectures, policies, and regulations
    Security and privacy in database systems
    Security modeling and vulnerability analysis
    Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
    Usability/energy/cost/efficiency of security in the network
    Virtual private network (VPN) security
    Web browser security


Submissions:

Authors are invited to submit original technical papers via http://edas.info/N24729 or login to http://edas.info/ by selecting “2018 Cybersecurity”.

Product

Electronic submission to papers@cyberc.org with title of “Cybersecurity 2018 Submission” is also accepted. Please DO NOT submit in both ways.

Manuscript Guidelines:

All submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/Outgoing/proceedings/ . Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.

Manuscript submission procedure is available over the Web at http://edas.info/ . We encourage you to use EDAS online submission by selecting “2018 Cybersecurity”. If you have troubles in using the Web submission, you can also submit your paper to papers@cyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file.

Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.

Paper Acceptance:

Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.

Publication:

All accepted and presented papers will be published in CyberC 2018 Proceeding by IEEE Computer Society Conference Publishing Services. These papers will be collected in IEEE Xplore and further scheduled to EI, Dblp, Google Scholars, SCOPUS, and other IEEE abstract and index partners (e.g., INSPEC, Thomson Reuters’ Web of Science). You can find our all publications recorded in the past 9 years.