posted by user: longxiang || 4760 views || tracked by 46 users: [display]

CSS 2015 : The 7th International Symposium on Cyberspace Safety and Security (CSS 2015)


When Aug 24, 2015 - Aug 26, 2015
Where New York
Abstract Registration Due Apr 1, 2015
Submission Deadline May 20, 2015
Notification Due Jun 15, 2015
Final Version Due Jul 15, 2015
Categories    network security   computer science   cyberspace safety   cyberspace security

Call For Papers

A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.

The CSS-2015 symposium is the 7th International Symposium on Cyberspace Safety and Security. It provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

The CSS-2015 symposium is the next event in a series of highly successful international conferences on cyberspace safety and security previously held as CSS-2014 (Paris, France, 2014),CSS-2013 (Zhangjiajie, China, 2013), CSS-2012 (Melbourne, Australia, 2012), CSS-2012 (Milan, Italy, 2011), CSS-2009 (Chengdu, China, 2009), and CSS-2008 (Sydney, Australia, 2008).

Topics of interest include, but not limited to:
· Access Control and Trust Management
· Active Defense Techniques and Systems
· Attack Containment
· Attack Recovery
· Benchmark, Analysis and Evaluation of Cybersecurity
· Bitcoins Systems
· Digital Rights Management
· Distributed Intrusion Detection/Prevention Systems
· Denial-of-Service Attacks and Countermeasures
· Digital Identity Management and Authentication
· Implementation, Deployment and Management of
· Intelligent Defense Systems
· Internet and Network Forensics
· Mobile Biometrics
· Risk Assessment in Cybersecurity
· Secure Network Architectures
· Security for Large-scale Systems and Critical
· Security for P2P systems and Grid Systems
· Security for Ad-Hoc and Sensor Networks
· Security in Web Services
· Security in Pervasive and Embedded Systems
· Security Theory and Tools
· Spam Detection and Prevention
· Social and Legal Issues in Cybersecurity
· Software and System Assurance
· Viruses, Worms, and Other Malicious Code

Submission Guidelines:
Submitted papers must report novel results and have not been published
or submitted to journals or conferences. Papers should be written in
English conforming to the IEEE conference proceedings format (8.5" x 11",
Two-Column). Papers should be submitted through the paper submission
system at the conference website. Full Papers (up to 8 pages, or 12 pages
including tables, figures, references and appendixes with the over length
charge) and Short Papers (up to 4 pages) are solicited.

Papers will be selected based on their originality, significance, relevance,
and clarity of presentation. The accepted papers from this conference will
be submitted for publication in IEEE Xplore as well as other Abstracting
and Indexing (A&I) databases (EI Compendex). Distinguished papers, after
further revisions, will be considered for possible publication in several SCI
& EI indexed special issues of prestigious international journals. By
submitting a paper to the conference, authors assure that if the paper is
accepted, at least one author will attend the conference and present the

Related Resources

CSS 2016   8th International Symposium on Cyberspace and Security
ICML 2017   34th International Conference on Machine Learning
IJISS 2016   International Journal of Information Security Science (IJISS)
ICCV 2017   International Conference on Computer Vision
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
IJE 2016   International Journal of Education
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
ISMIS 2017   23rd International Symposium on Methodologies for Intelligent Systems
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy