posted by organizer: ATCS2014 || 1819 views || tracked by 2 users: [display]

ATCS 2014 : Applications and Technologies in Cyber Security


When Sep 23, 2014 - Sep 23, 2014
Where Beijing
Submission Deadline Jun 14, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 15, 2014

Call For Papers

Call for Papers

2014 International Workshop on Applications and Technologies in Cyber Security (ATCS) September 23, 2014, Beijing, China
In conjunction with SECURECOMM, 2014 - 10th International conference on Security and Privacy in Communication Networks September 24-26, 2014, Beijing, China.

The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014. Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation and Security Certification
- Database Security
- Security for Cyber-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Algorithms for efficient classification and clustering
- Forensic computing
- Smartphone Security
- Smart grid cyber security
- Data leakage detection
- Sensitive data identification and protection

Important Dates:
Deadline for submission: May 31, 2014. (Extended to Jun 14, 2014).
Notification: July 1, 2014
Final submission: July 15, 2014.

Submission Guidelines

Papers should be submitted through EASYCHAIR at through

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (see Author's kit section). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected papers will be considered for inclusion in a special issue Journal (e.g., Elsevier Future Generation Computer Systems).

General Chairs:
Professor Jemal Abawajy,
Deakin University, Australia.
Dr. Rafiqul Islam,
Charles Sturt University, Australia.

Dr. Abdun N Mahmood,
UNSW Canberra, Australia.

Program Committee:

Prof. Junbin Gao, CSU, Australia.
Prof. M Alamgir Hossain, Northumbria University, UK.
Prof. Matthew Warren, Deakin University, Australia
Prof. John Yearwood, Federation University, Australia
Dr. Mohd Farhan Fudzee, UTHM, Malaysia.
A/Prof. Md Enamul Karim, Louisiana Tech University, USA.
A/Prof. Xun Yi, Victoria University, Australia
Prof. Dr. Hasannuzzaman, University of Dhaka, Bangladesh
Dr. Tanveer Zia, CSU, Australia.
Maumita Bhattacharya, CSU, Australia.
Dr. Morshed Chowdhury, Deakin University, Australia
Dr. Zahid Islam, CSU, Australia.
Dr. Syed S Islam, UWA, Australia.
Dr. Andrei Kelarev, Federation University, Australia
Dr. Mohammad Kausar, CSU, Australia
Dr. Quazi Mamun, CSU, Australia
Md. Anwar H Masud, CSU, Australia.
Dr. Sumon Sahriar, CSIRO, Australia.
Dr. Steve Versteeg, CA Labs, Australia
Dr. Samsul Huda, Federation University, Australia.
Dr. Arif Khan, CSU, Australia.
Dr. Nasimul Noman, University of Newcastle, Australia.
Dr. Chowdhury Farhan Ahmed, University of Strasbourg, France.

Related Resources

SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
DMCS 2017   DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
CFC-Data Analytics/Smart Cities 2017   Call for Chapters (Taylor & Francis): Data Analytics Applications for Smart Cities
TSP 2017   The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
Technologies for Security of EHR 2017   Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Challenges
MISC.conf 2017   MISC.conf Security Conference
ewC 2018   embedded world Conference 2018
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
IUI 2017   Intelligent User Interfaces