The First International Workshop on Cyber Security (CS

The First International Workshop on Cyber
Security (CS-2015)
October 16-18, 2015, Xi'an, China
Call For Papers
With the rapid development of network technology, the application of network is becoming more and more widely and deeply, the
means of network attack become more easier, precision and stronger. The situation of network and information security is becoming
increasingly rigorous, all problem become more prominent. Therefore, the network security and information has become a major
strategic issues of national security and national development. While the attack systems have become more easy-to-use, sophisticated,
and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance
defense systems which are distributed and cybered.In academia, the network and information security research area has been one of
the most highlights in agro-scientific research in the scholars attention.
CS 2015 is an important international workshop covering research in network and system security. The workshop seeks submissions
from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security,
privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned
are also encouraged.
Topics of interest include but are not limited to:
- Application Cryptography technology, Security certification,
Electronic commerce protocols.
- Active defense system, Adaptive defense system, Security
system to imitation of nature
- Database and system security, Data protection, Data and system
integrity
- Distributed access control.
- High performance network virtualization and security system.
- Key distribution technology, management and consultation.
- Cloud computing security, cloud storage.
- Database and System Security
Submission Guidelines
- Data Protection
- Data/System Integrity
- Distributed Access Control
- Distributed Attack Systems
- Data security, data analysis and mining technology.
- Intrusion detection and smart defense system.
- Security of critical infrastructure.
- RFID, smart grid, and wireless network security and privacy
protection.
- Trusted computing, trust management, the safety of the world
wide web.
- The security policy, security protocol.
Honorary Chairs
Hui Li, Xidian University, China
Jianfeng Ma, Xidian University, China
Willy Susilo, University of Wollongong, Australia
Submitted papers must not substantially overlap with papers
that have been published or that are simultaneously submitted
to a journal or a conference with proceedings. Submissions
should be at most 15 pages (*.pdf) including the bibliography
and appendices with LNCS template. Submissions must be
made to the submission website at:
General Chairs
https://easychair.org/conferences/?conf=cs2015
Technical Program Chairs
Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission
of a paper should be regarded as a commitment that, should
the paper be accepted, at least one of the authors will register
and attend the conference to present the work.
Hai Jiang, Arkansas State University, USA
Yong Yu, University of Wollongong, Australia
Important Dates
Paper Submission Due: June 8, 2015
Authors Notification: August 1, 2015
Final Manuscript Due: August 15, 2015
Author Registeration: Augest 15, 2015
Conference Dates: October 16-18, 2015
Xiaofeng Chen, Xidian University, China
Xinyi Huang, Fujian Normal University, China
Steering Committee
Xiaofeng Chen, Xidian University, China
Xinyi Huang, Fujian Normal University, China
Hui Li, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yang Xiang, Deakin University, Australia
Miroslaw Kutylowski, Wrocaw University of Technology, Poland
Willy Susilo, University of Wollongong, Australia