posted by organizer: ATCS2014 || 1750 views || tracked by 2 users: [display]

ATCS 2014 : Applications and Technologies in Cyber Security


When Sep 23, 2014 - Sep 23, 2014
Where Beijing
Submission Deadline Jun 14, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 15, 2014

Call For Papers

Call for Papers

2014 International Workshop on Applications and Technologies in Cyber Security (ATCS) September 23, 2014, Beijing, China
In conjunction with SECURECOMM, 2014 - 10th International conference on Security and Privacy in Communication Networks September 24-26, 2014, Beijing, China.

The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014. Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation and Security Certification
- Database Security
- Security for Cyber-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Algorithms for efficient classification and clustering
- Forensic computing
- Smartphone Security
- Smart grid cyber security
- Data leakage detection
- Sensitive data identification and protection

Important Dates:
Deadline for submission: May 31, 2014. (Extended to Jun 14, 2014).
Notification: July 1, 2014
Final submission: July 15, 2014.

Submission Guidelines

Papers should be submitted through EASYCHAIR at through

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (see Author's kit section). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected papers will be considered for inclusion in a special issue Journal (e.g., Elsevier Future Generation Computer Systems).

General Chairs:
Professor Jemal Abawajy,
Deakin University, Australia.
Dr. Rafiqul Islam,
Charles Sturt University, Australia.

Dr. Abdun N Mahmood,
UNSW Canberra, Australia.

Program Committee:

Prof. Junbin Gao, CSU, Australia.
Prof. M Alamgir Hossain, Northumbria University, UK.
Prof. Matthew Warren, Deakin University, Australia
Prof. John Yearwood, Federation University, Australia
Dr. Mohd Farhan Fudzee, UTHM, Malaysia.
A/Prof. Md Enamul Karim, Louisiana Tech University, USA.
A/Prof. Xun Yi, Victoria University, Australia
Prof. Dr. Hasannuzzaman, University of Dhaka, Bangladesh
Dr. Tanveer Zia, CSU, Australia.
Maumita Bhattacharya, CSU, Australia.
Dr. Morshed Chowdhury, Deakin University, Australia
Dr. Zahid Islam, CSU, Australia.
Dr. Syed S Islam, UWA, Australia.
Dr. Andrei Kelarev, Federation University, Australia
Dr. Mohammad Kausar, CSU, Australia
Dr. Quazi Mamun, CSU, Australia
Md. Anwar H Masud, CSU, Australia.
Dr. Sumon Sahriar, CSIRO, Australia.
Dr. Steve Versteeg, CA Labs, Australia
Dr. Samsul Huda, Federation University, Australia.
Dr. Arif Khan, CSU, Australia.
Dr. Nasimul Noman, University of Newcastle, Australia.
Dr. Chowdhury Farhan Ahmed, University of Strasbourg, France.

Related Resources

CYBER 2017   The Second International Conference on Cyber-Technologies and Cyber-Systems
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
IEEE CISDA 2017   2017 IEEE Symposium on Computational Intelligence for Security and Defense Applications
CFC-Data Analytics/Smart Cities 2017   Call for Chapters (Taylor & Francis): Data Analytics Applications for Smart Cities
CCOE - CFP 2017   Cyber Center of Excellence (CCOE) Call For Research Papers
MISC.conf 2017   MISC.conf Security Conference
Drone Surveillance 2017   IEEE Communications Magazine Feature Topic on Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues
ISSA 2017   International workshop on Interplay of Security, Safety and System/Software Architecture
SKM 2017   Secure Knowledge Management Workshop 2017
EST 2017   Seventh IEEE International Conference on Emerging Security Technologies