posted by organizer: ATCS2014 || 2231 views || tracked by 2 users: [display]

ATCS 2014 : Applications and Technologies in Cyber Security


When Sep 23, 2014 - Sep 23, 2014
Where Beijing
Submission Deadline Jun 14, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 15, 2014

Call For Papers

Call for Papers

2014 International Workshop on Applications and Technologies in Cyber Security (ATCS) September 23, 2014, Beijing, China
In conjunction with SECURECOMM, 2014 - 10th International conference on Security and Privacy in Communication Networks September 24-26, 2014, Beijing, China.

The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014. Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation and Security Certification
- Database Security
- Security for Cyber-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Algorithms for efficient classification and clustering
- Forensic computing
- Smartphone Security
- Smart grid cyber security
- Data leakage detection
- Sensitive data identification and protection

Important Dates:
Deadline for submission: May 31, 2014. (Extended to Jun 14, 2014).
Notification: July 1, 2014
Final submission: July 15, 2014.

Submission Guidelines

Papers should be submitted through EASYCHAIR at through

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (see Author's kit section). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected papers will be considered for inclusion in a special issue Journal (e.g., Elsevier Future Generation Computer Systems).

General Chairs:
Professor Jemal Abawajy,
Deakin University, Australia.
Dr. Rafiqul Islam,
Charles Sturt University, Australia.

Dr. Abdun N Mahmood,
UNSW Canberra, Australia.

Program Committee:

Prof. Junbin Gao, CSU, Australia.
Prof. M Alamgir Hossain, Northumbria University, UK.
Prof. Matthew Warren, Deakin University, Australia
Prof. John Yearwood, Federation University, Australia
Dr. Mohd Farhan Fudzee, UTHM, Malaysia.
A/Prof. Md Enamul Karim, Louisiana Tech University, USA.
A/Prof. Xun Yi, Victoria University, Australia
Prof. Dr. Hasannuzzaman, University of Dhaka, Bangladesh
Dr. Tanveer Zia, CSU, Australia.
Maumita Bhattacharya, CSU, Australia.
Dr. Morshed Chowdhury, Deakin University, Australia
Dr. Zahid Islam, CSU, Australia.
Dr. Syed S Islam, UWA, Australia.
Dr. Andrei Kelarev, Federation University, Australia
Dr. Mohammad Kausar, CSU, Australia
Dr. Quazi Mamun, CSU, Australia
Md. Anwar H Masud, CSU, Australia.
Dr. Sumon Sahriar, CSIRO, Australia.
Dr. Steve Versteeg, CA Labs, Australia
Dr. Samsul Huda, Federation University, Australia.
Dr. Arif Khan, CSU, Australia.
Dr. Nasimul Noman, University of Newcastle, Australia.
Dr. Chowdhury Farhan Ahmed, University of Strasbourg, France.

Related Resources

ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SECITC 2018   11th International Conference on Security for Information Technology and Communications
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
ICCTAFA 2019   International Conference on Computer Technologies and Applications in Food and Agriculture
Special Issue: IJCA 2018   Special Issue【EI】International Journal of Computers and Applications: Computational Intelligence Technologies for Clinical Decision Support-From Prognosis to Prediction
BCT4MAS 2018   First International Workshop on Blockchain Technologies for Multi-Agent Systems
BDA4CID 2018   The 2nd International Workshop on Big Data Analytics for Cyber Intelligence and Defense, at IEEE Big Data 2018
ICCSP--Ei Compendex and Scopus 2019   2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus