The First International Workshop on Cyber Security (CS-2015) October 16-18, 2015, Xi'an, China Call For Papers With the rapid development of network technology, the application of network is becoming more and more widely and deeply, the means of network attack become more easier, precision and stronger. The situation of network and information security is becoming increasingly rigorous, all problem become more prominent. Therefore, the network security and information has become a major strategic issues of national security and national development. While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and cybered.In academia, the network and information security research area has been one of the most highlights in agro-scientific research in the scholars attention. CS 2015 is an important international workshop covering research in network and system security. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: - Application Cryptography technology, Security certification, Electronic commerce protocols. - Active defense system, Adaptive defense system, Security system to imitation of nature - Database and system security, Data protection, Data and system integrity - Distributed access control. - High performance network virtualization and security system. - Key distribution technology, management and consultation. - Cloud computing security, cloud storage. - Database and System Security Submission Guidelines - Data Protection - Data/System Integrity - Distributed Access Control - Distributed Attack Systems - Data security, data analysis and mining technology. - Intrusion detection and smart defense system. - Security of critical infrastructure. - RFID, smart grid, and wireless network security and privacy protection. - Trusted computing, trust management, the safety of the world wide web. - The security policy, security protocol. Honorary Chairs Hui Li, Xidian University, China Jianfeng Ma, Xidian University, China Willy Susilo, University of Wollongong, Australia Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 15 pages (*.pdf) including the bibliography and appendices with LNCS template. Submissions must be made to the submission website at: General Chairs https://easychair.org/conferences/?conf=cs2015 Technical Program Chairs Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Hai Jiang, Arkansas State University, USA Yong Yu, University of Wollongong, Australia Important Dates Paper Submission Due: June 8, 2015 Authors Notification: August 1, 2015 Final Manuscript Due: August 15, 2015 Author Registeration: Augest 15, 2015 Conference Dates: October 16-18, 2015 Xiaofeng Chen, Xidian University, China Xinyi Huang, Fujian Normal University, China Steering Committee Xiaofeng Chen, Xidian University, China Xinyi Huang, Fujian Normal University, China Hui Li, Xidian University, China Kuan-Ching Li, Providence University, Taiwan Yang Xiang, Deakin University, Australia Miroslaw Kutylowski, Wrocaw University of Technology, Poland Willy Susilo, University of Wollongong, Australia
© Copyright 2024