posted by user: longxiang || 6605 views || tracked by 44 users: [display]

CSS 2015 : The 7th International Symposium on Cyberspace Safety and Security (CSS 2015)


When Aug 24, 2015 - Aug 26, 2015
Where New York
Abstract Registration Due Apr 1, 2015
Submission Deadline Apr 30, 2015
Notification Due Jun 15, 2015
Final Version Due Jul 15, 2015
Categories    network security   computer science   cyberspace safety   cyberspace security

Call For Papers

A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.

The CSS-2015 symposium is the 7th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

The CSS-2015 symposium is the next event in a series of highly successful international conferences on cyberspace safety and security previously held as CSS-2014 (Paris, France, 2014),CSS-2013 (Zhangjiajie, China, 2013), CSS-2012 (Melbourne, Australia, 2012), CSS-2012 (Milan, Italy, 2011), CSS-2009 (Chengdu, China, 2009), and CSS-2008 (Sydney, Australia, 2008).

Topics of interest include, but not limited to:
· Access Control and Trust Management
· Active Defense Techniques and Systems
· Attack Containment
· Attack Recovery
· Benchmark, Analysis and Evaluation of Cybersecurity
· Bitcoins Systems
· Digital Rights Management
· Distributed Intrusion Detection/Prevention Systems
· Denial-of-Service Attacks and Countermeasures
· Digital Identity Management and Authentication
· Implementation, Deployment and Management of
· Intelligent Defense Systems
· Internet and Network Forensics
· Mobile Biometrics
· Risk Assessment in Cybersecurity
· Secure Network Architectures
· Security for Large-scale Systems and Critical
· Security for P2P systems and Grid Systems
· Security for Ad-Hoc and Sensor Networks
· Security in Web Services
· Security in Pervasive and Embedded Systems
· Security Theory and Tools
· Spam Detection and Prevention
· Social and Legal Issues in Cybersecurity
· Software and System Assurance
· Viruses, Worms, and Other Malicious Code

Submission Guidelines:
Submitted papers must report novel results and have not been published
or submitted to journals or conferences. Papers should be written in
English conforming to the IEEE conference proceedings format (8.5" x 11",
Two-Column). Papers should be submitted through the paper submission
system at the conference website. Full Papers (up to 8 pages, or 12 pages
including tables, figures, references and appendixes with the over length
charge) and Short Papers (up to 4 pages) are solicited.

Papers will be selected based on their originality, significance, relevance,
and clarity of presentation. The accepted papers from this conference will
be submitted for publication in IEEE Xplore as well as other Abstracting
and Indexing (A&I) databases (EI Compendex). Distinguished papers, after
further revisions, will be considered for possible publication in several SCI
& EI indexed special issues of prestigious international journals. By
submitting a paper to the conference, authors assure that if the paper is
accepted, at least one author will attend the conference and present the

Related Resources

Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TheWebConf 2018   The Web Conference (The International World Wide Web Conference - WWW2018)
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICASSP 2018   IEEE International Conference on Acoustics, Speech and Signal Processing
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
AAMAS 2018   International Conference on Autonomous Agents and Multiagent Systems (AAMAS-18)