posted by organizer: ATCS2014 || 2161 views || tracked by 2 users: [display]

ATCS 2014 : Applications and Technologies in Cyber Security


When Sep 23, 2014 - Sep 23, 2014
Where Beijing
Submission Deadline Jun 14, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 15, 2014

Call For Papers

Call for Papers

2014 International Workshop on Applications and Technologies in Cyber Security (ATCS) September 23, 2014, Beijing, China
In conjunction with SECURECOMM, 2014 - 10th International conference on Security and Privacy in Communication Networks September 24-26, 2014, Beijing, China.

The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014. Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation and Security Certification
- Database Security
- Security for Cyber-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Algorithms for efficient classification and clustering
- Forensic computing
- Smartphone Security
- Smart grid cyber security
- Data leakage detection
- Sensitive data identification and protection

Important Dates:
Deadline for submission: May 31, 2014. (Extended to Jun 14, 2014).
Notification: July 1, 2014
Final submission: July 15, 2014.

Submission Guidelines

Papers should be submitted through EASYCHAIR at through

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (see Author's kit section). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected papers will be considered for inclusion in a special issue Journal (e.g., Elsevier Future Generation Computer Systems).

General Chairs:
Professor Jemal Abawajy,
Deakin University, Australia.
Dr. Rafiqul Islam,
Charles Sturt University, Australia.

Dr. Abdun N Mahmood,
UNSW Canberra, Australia.

Program Committee:

Prof. Junbin Gao, CSU, Australia.
Prof. M Alamgir Hossain, Northumbria University, UK.
Prof. Matthew Warren, Deakin University, Australia
Prof. John Yearwood, Federation University, Australia
Dr. Mohd Farhan Fudzee, UTHM, Malaysia.
A/Prof. Md Enamul Karim, Louisiana Tech University, USA.
A/Prof. Xun Yi, Victoria University, Australia
Prof. Dr. Hasannuzzaman, University of Dhaka, Bangladesh
Dr. Tanveer Zia, CSU, Australia.
Maumita Bhattacharya, CSU, Australia.
Dr. Morshed Chowdhury, Deakin University, Australia
Dr. Zahid Islam, CSU, Australia.
Dr. Syed S Islam, UWA, Australia.
Dr. Andrei Kelarev, Federation University, Australia
Dr. Mohammad Kausar, CSU, Australia
Dr. Quazi Mamun, CSU, Australia
Md. Anwar H Masud, CSU, Australia.
Dr. Sumon Sahriar, CSIRO, Australia.
Dr. Steve Versteeg, CA Labs, Australia
Dr. Samsul Huda, Federation University, Australia.
Dr. Arif Khan, CSU, Australia.
Dr. Nasimul Noman, University of Newcastle, Australia.
Dr. Chowdhury Farhan Ahmed, University of Strasbourg, France.

Related Resources

CYBER 2018   The Third International Conference on Cyber-Technologies and Cyber-Systems
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
BDCAT 2018   5th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
ICCTAFA 2019   International Conference on Computer Technologies and Applications in Food and Agriculture
ICCWS 2019   14th International Conference on Cyber Warfare and Security
SECITC 2018   11th International Conference on Security for Information Technology and Communications
Business & Cyber Securit 2018   2nd International Conference on Business & Cyber Security (ICBCS)
EET-CEA 2018   Energy Efficient Technologies - Crowd Energy Applications
RMfSIS 2018   Special Issue on Risk Management for Software Intensive Systems - Systems Journal