CSP 2012 - CSP 2012 : The first International Workshop on Cyber Security and Privacy
View: 3862
Website www.cyberc.org |
Edit Freely
Category CSP 2012
Deadline: April 20, 2012 | Date: October 10, 2012-October 12, 2012
Venue/Country: Sanya, China
Updated: 2012-01-13 09:44:39 (GMT+9)
Call For Papers - CFP
CSP 2012 : The first International Workshop on Cyber Security and Privacy Sanya, China, October 10 - 12, 2012Co-Sponsored by:IEEE Computer Society, IEEE Technical Committee on Simulation, IEEE CS Task Force on Networked Mobile Systems, Beijing Jiaotong University, and University of Louisville.Patrons: AT&T, Huawei, InfoBeyond and Tech MahindraCyberC Facebookhttp://www.facebook.com/groups/nasirsyed.utp/CyberC Weibohttp://weibo.com/u/2500282610Paper Submission Web: http://edas.info/ by clicking on CSP 2012Paper Submission Email: Paperscyberc.orgWe are living in the ubiquitous cyber networking environments and communicate on the move (COM). The cyber communication intervolves with the Internet, cellular networks, city/community Wi-Fi mesh, air satellite, vehicle networks, body networks, personal networks, enterprise and private networks, and many others. Some wireless communications are even covert and prevent to be detected or intercepted by the regular energy detectors. Cyber attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious. Consequently, the detections and preventions of these cyber attacks are unprecedentedly complicated. Eavesdropping, signaling jamming, DoD, sinkholes, Sybil, wormholes, spoofing, flooding, trust poisoning are old security problems but they are still challenging our brain. On the other hands, new vulnerabilities such as ClickBot.A are emerging every day and they are even more stealthy and intelligent. Moreover, new network protocols and applications open new channels for adversaries to take advantage. Clouds bring us new application along with new vulnerabilities that we have to investigate. CSP solicits previously unpublished research papers in any aspect of network communication, application, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems.Authors are invited to submit original technical papers covering but not limited to the topics of interest listed below:? Cryptography and key algorithms? Security modeling and vulnerability analysis? Intrusion detection, traffic analysis and decision making of security? Information integrity, assurance, trustworthy, authentication, and access control? Distributed data storage and secure data management outsourcing (e.g., database as a service)? Protocol security and privacy policies? Distributed systems security? Embedded systems security and forensics? Network security and malware? Networking protocols and security trace back? Accountability and anonymity? Security architectures, policy, and regulatory? Hardware, application, and system security? Censorship and censorship-resistance? Language-based security? Privacy-preserving systems? Usability/energy/cost/efficiency of security in the network? Security protocols and strategies in clouds, sensor, cognitive, ad hoc, mesh, and satellite networksImportant Days:April 20, 2012 - Conference Paper Submission DeadlineJuly 10, 2012 - Notification of Acceptance/Rejection & Registration StartsAugust 1, 2012 - Camera-Ready Paper Submission Due & Registration DueProgram CommitteeHonorable General ChairDavid Lu, AT&T Enterprise IT, USAGeneral Co-ChairsMahmoud Daneshmand, AT&T Labs, USARatan Ghosh, Indian Institute of Technology, Kanpur, IndiaProgram Co-ChairsBin Xie, InfoBeyond Technology LLC, USACharlie Yang, AT&T Labs, USAFinance ChairYingbing Yu, Austin Peay State University, USASanjuli Agrawal, Indiana University Southeast, USAPublicity Co-ChairsNa Bai, Southeast University, ChinaJ.Octavio Gutierrez-Garcia, Gwangju Institute of Science and Technology, Republic of KoreaEzziyyani Mostafa, University abdelmalk Essaâdi, MoroccoShyan-ming Yuan, Providence University, TaiwanWorkshop Co-ChairsCharlie Yang, AT&T Labs, USAChi-Tsun Cheng, University of Calgary, CanadaBin Xie, InfoBeyond Technology LLC, USALocal Coordination Co-ChairsDongmei Sun, Beijing Jiaotong University, ChinaQingwen Han, Congqing University, ChinaSteering CommitteeAnup Kumar, (Chair) University of Louisville, USARatan Ghosh, Indian Institute of Technology, Kanpur, IndiaQing-An Zheng, North Carolina A&T University, USAChi-Ming Chen, AT&T, USALiang-Jie Zhang, IBM Thomas J. Watson Research Center, USATechnical Program CommitteeAbraham George, Keyocera, IndiaAlok Srivastava, Microsoft Research, USAArturo Gonzalez-Escribano, University of Valladolid, SpainAsh Mohammad Abbas, Aligarh Muslim University, IndiaBaoqiang Yan, Missouri Western State University, USABerk Canberk, Istanbul Technical University, TurkeyBin Zhou, National University of Defense Technology, ChinaChin-Ling Chen, National Pingtung Institute of Commerce, TaiwanChung-Hua Chu, National Taichung Institute of Technology, TaiwanDexing Zhong, Xi’an Jiaotong University, ChinaDiego R. Llanos, University of Valladolid, SpainEric Chen, NTT Corporation, JapanFernando Zacarias-Flores, Benemerita Universidad Autonoma de Puebla, MXFouad Chedid, Notre Dame University ? Louaize, LebanonGuey-Yun Chang, National Central University, TaiwanHao Zhang, Central South University, ChinaHend Al-Khalifa, King Saud University, Saudi ArabiaJaeho Choi, Chonbuk National University, KoreaJan-Jan Wu, Institute of Information Science, TaiwanJen-Jee Chen, National University of Taiwan, TaiwanJens-Matthias Bohli, NEC Laboratories Europe, GermanyJinfang Sheng, Central South University, ChinaLanxiang Chen, Fujian Normal University, ChinaLi Zeng, University of Texas at Arlington, USALi Zhao, Microsoft Corporation, USALiyu Xu, Excel Directional Technologies, USAMaiga Chang, Athabasca University, CanadaMaximilien Gadouleau, Queen Mary, University of London, UKMin Zhu, SiChuan University, ChinaMohamed Farouk Abdel Hady, University of Ulm, GermanyMohammed Abdala, AL-Nahrain University, IraqNarendra Chaudhari, Indian Institute of Technology Indore, IndiaNarisa Chu, CWLab International, Ltd., USANedal Ababneh, Telecom Pairs, FrancePatrick Hung, University of Ontario Institute of Technology, CanadaRaju Gottumukkala, University of Louisiana at Lafayette, USARasha Osman, Imperial College of London, UKRich Lee, IBM, TaiwanRosalina Abd. Salam, Universiti Sains Islam Malaysia, MalaysiaRossana Maria de Castro, Andrade Federal University of Ceará, BrazilRuhani Ab. Rahman, Universiti Teknologi MARA, MalaysiaRui Tan, Michigan State University, USASameh Abdel-Naby, University College Dublin, IrelandSK Basu, Banaras Hindu University, IndiaStefano Berretti, University of Florence, ItalySubin Shen, Nanjing University of Posts & Telecommunications, ChinaSun-Yuan Hsieh, National Cheng Kung University, TainanTao Ma, Beijing University of Posts and Telecommunications, ChinaTaoi Hsu, Shih Hsin University, TaiwanVisvasuresh Victor Govindaswamy, Texas A&M University-Texarkana, USAWei Guo, Nanjing University of Information Science and Technology, ChinaWei Wei, Xi'an Jiaotong University, ChinaWeixing Wang, South China Agricultural University, ChinaXiaoyan Zhu, Xidian University, ChinaY. Tanaka, Hokkaido University, JapanYang Liu, University of Louisville, USAYangjun Chen, Winnipeg University, CanadaYili Gong, Wuhan University, ChinaYong Zhao, University of Electronic and Science Technology of China, ChinaYun Huoy Choo, Universiti Teknikal Malaysia Melaka, MalaysiaZhengbao Li, Shandong Academy of Sciences, ChinaManuscript GuidelinesAll submitted manuscripts should be prepared as technical papers and may not exceed 8 letter size (8.5 x 11) pages including figures, tables and references using the IEEE format for conference proceedings (print area of 6-1/2 inches (16.51 cm) wide by 8-7/8 inches (22.51 cm) high, two-column format with columns 3-1/16 inches (7.85 cm) wide with a 3/8 inch (0.81 cm) space between them, single-spaced 10-point Times fully justified text). For more information please see ftp://pubftp.computer.org/Press/ Outgoing/proceedings/. Submissions not conforming to these guidelines may be returned without review. The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors should finally submit the manuscript in PDF format and make sure that the file will print on a printer that uses letter size (8.5 x 11) paper. The official language of the meeting is English.Manuscript submission procedure is available over the Web at http://edas.info/. We encourage you to use edas online submission by selecting “CSP 2012”. If you have troubles in using the Web submission, you can also submit your paper to paperscyberc.org or contact us. Electronic submissions must be in the form of a readable PDF file.Submitted manuscripts have to present the original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines will be rejected without review and further action may be taken, including (but not limited to) notifications sent to the heads of the institutions of the authors and sponsors of the conference. Submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered.Paper AcceptanceManuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.PublicationsAll accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of accepted papers, or at least one of them, should register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE Xplore and EI after the conference.Contact:For more information about the conference, please visit www.CyberC.org or contact us at PapersCyberC.org
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.