The 9th International Workshop on Cyber Security and Privacy

Cybersecurity 2020


Computer Security & Cryptography Security & Trust & Testing



Note: Submission due date: June 20, 2020
Publication: IEEE (EI & IEEE Xplore)
You are welcome to contribute your original research to 2020 Cybersecurity Workshop! Cybersecurity and privacy protect data information from adversarial disclosure or usage. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in distributed and mobile environments. New attacks are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
2020 Cybersecurity workshop solicits previously unpublished research papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic, risk assessment, network security, data security, blockchain, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below:
• Infrastructure Security
• Network monitoring, risk assessment
• AI for intrusion detection and intelligence
• Access control, Authorization, identification & authentication
• Accountability and anonymity
• Biometric authentication
• Censorship and censorship-resistance
• Cloud security
• Cryptography and key algorithms
• Data-at-rest and Data-on-the-Fly Security
• Distributed systems security
• Embedded systems security and forensics
• Encryption algorithms and analysis
• Hardware, application, and system security
• Information integrity, assurance and trustworthy
• Intrusion detection, traffic analysis and decision making of security
• Language-based security
• Location Privacy and Exposure
• Machine Learning and Security
• Malware analysis and protection
• Mobile security
• Network security and malware
• Networking protocols and security trace back
• Privacy in pervasive sensing
• Privacy in social media
• Secure distributed data outsourcing (e.g., database as a service)
• Security and privacy policies
• Security architectures, policies, and regulations
• Security and privacy in database systems
• Security modeling and vulnerability analysis
• Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
• Usability/energy/cost/efficiency of security in the network
WORKSHOP CHAIR
Weifeng Lu, Nanjing Univ. of Posts and Tele., China
PROGRAM COMMITTEE
Hua Deng, Hunan University
Yanbin Zheng, Guilin University of Electronic Technology
Wanqing Wu, Hebei University
Yang Yang, Fuzhou University
Zhen Liu, Shanghai Jiao Tong University
Pinghai Yuan, National University of Singapore
Yilei Wang, Qufu Normal University
Anjia Yang, Jinan University
Letian Sha, Nanjing University of Posts and Telecommunications
Lin Zhong, Beihang University
Submissions: Submit your manuscript to Papers@cyberc.org with a title of “Cybersecurity 2020 Submission” or through EDAS
Manuscript Template
https://www.ieee.org/conferences/publishing/templates.html
Contact
For more information about the conference, please visit www.CyberC.org, contact us at Papers@CyberC.org or Program Chair.