posted by organizer: ATCS2014 || 2049 views || tracked by 2 users: [display]

ATCS 2014 : Applications and Technologies in Cyber Security


When Sep 23, 2014 - Sep 23, 2014
Where Beijing
Submission Deadline Jun 14, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 15, 2014

Call For Papers

Call for Papers

2014 International Workshop on Applications and Technologies in Cyber Security (ATCS) September 23, 2014, Beijing, China
In conjunction with SECURECOMM, 2014 - 10th International conference on Security and Privacy in Communication Networks September 24-26, 2014, Beijing, China.

The 2014 International Workshop on Applications and Techniques in Cyber Security (ATCS) focuses on all aspects on techniques and applications in cyber security research. The purpose of ATCS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. Original papers on all aspects of Cyber Security are solicited for submission to ATCS 2014. Areas of interest include, but are not limited to:
- Access control
- Language-based Security
- Anti-Virus and Anti-Worms
- Malicious software
- Authentication and Authorization
- Network Security
- Cloud Security
- Operating System Security
- Computer / Digital Forensics
- Privacy Protection
- Data and System Integrity
- Risk Evaluation and Security Certification
- Database Security
- Security for Cyber-physical Systems
- Distributed Systems Security
- Security for Mobile Computing
- Electronic Commerce Security
- Security Models
- Crypto/Security Systems
- Security Protocols
- Information Hiding and Watermarking
- Smartphone Security
- Intellectual Property Protection
- Software Security
- Intrusion Detection
- Trusted and Trustworthy Computing
- Key Management and Key Recovery
- Algorithms for efficient classification and clustering
- Forensic computing
- Smartphone Security
- Smart grid cyber security
- Data leakage detection
- Sensitive data identification and protection

Important Dates:
Deadline for submission: May 31, 2014. (Extended to Jun 14, 2014).
Notification: July 1, 2014
Final submission: July 15, 2014.

Submission Guidelines

Papers should be submitted through EASYCHAIR at through

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (see Author's kit section). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected papers will be considered for inclusion in a special issue Journal (e.g., Elsevier Future Generation Computer Systems).

General Chairs:
Professor Jemal Abawajy,
Deakin University, Australia.
Dr. Rafiqul Islam,
Charles Sturt University, Australia.

Dr. Abdun N Mahmood,
UNSW Canberra, Australia.

Program Committee:

Prof. Junbin Gao, CSU, Australia.
Prof. M Alamgir Hossain, Northumbria University, UK.
Prof. Matthew Warren, Deakin University, Australia
Prof. John Yearwood, Federation University, Australia
Dr. Mohd Farhan Fudzee, UTHM, Malaysia.
A/Prof. Md Enamul Karim, Louisiana Tech University, USA.
A/Prof. Xun Yi, Victoria University, Australia
Prof. Dr. Hasannuzzaman, University of Dhaka, Bangladesh
Dr. Tanveer Zia, CSU, Australia.
Maumita Bhattacharya, CSU, Australia.
Dr. Morshed Chowdhury, Deakin University, Australia
Dr. Zahid Islam, CSU, Australia.
Dr. Syed S Islam, UWA, Australia.
Dr. Andrei Kelarev, Federation University, Australia
Dr. Mohammad Kausar, CSU, Australia
Dr. Quazi Mamun, CSU, Australia
Md. Anwar H Masud, CSU, Australia.
Dr. Sumon Sahriar, CSIRO, Australia.
Dr. Steve Versteeg, CA Labs, Australia
Dr. Samsul Huda, Federation University, Australia.
Dr. Arif Khan, CSU, Australia.
Dr. Nasimul Noman, University of Newcastle, Australia.
Dr. Chowdhury Farhan Ahmed, University of Strasbourg, France.

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
EI-AIAAT 2018   2018 2nd International Conference on Artificial Intelligence Applications and Technologies (AIAAT 2018)
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
LTA 2018   3rd International Workshop on Language Technologies and Applications
SciSec 2018   The 1st International Conference on Science of Cyber Security
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems - Theme Cyber Security
ICADIWT 2018   The Ninth International Conference on the Applications of Digital Information and Web Technologies
Broadnets 2018   9th International Conference on Broadband Communications, Networks, and Systems
SIMULTECH 2018   8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications