The 8th International Workshop on Cyber Security and Privacy

Cybersecurity 2019


Computer Security & Cryptography



You are welcome to contribute your original research to 2019 Cybersecurity Workshop! Cyber security and privacy protects for data information from adversarial disclosure or usage. Cyber-attacks are currently prevailing in all these networks, user networking devices, and the applications. They are even more complex and malicious in the distributed and mobile environment. New malwares are emerging every day and they are even more stealthy and intelligent, and targeting the vulnerabilities of OSs, browsers, and applications. Moreover, new network protocols and applications open new channels for adversaries to take advantage.
2019 Cybersecurity workshop solicits previously unpublished research papers in any aspect of cybersecurity, such as vulnerability analysis, cryptographic, risk assessment, network security, data security, blockchain, and computer security or privacy in the theory, design, implementation, prototype, analysis, evaluation, testing, verification, or empirical results of secure systems. Authors are invited to submit original technical papers covering, but not limited to the topics of interest listed below:
• Infrastructure Security
• Network monitoring, risk assessment
• AI for intrusion detection and intelligence
• Access control, Authorization, identification & authentication
• Accountability and anonymity
• Biometric authentication
• Censorship and censorship-resistance
• Cloud security
• Cryptography and key algorithms
• Data-at-rest and Data-on-the-Fly Security
• Distributed systems security
• Embedded systems security and forensics
• Encryption algorithms and analysis
• Hardware, application, and system security
• Information integrity, assurance and trustworthy
• Intrusion detection, traffic analysis and decision making of security
• Language-based security
• Location Privacy and Exposure
• Machine Learning and Security
• Malware analysis and protection
• Mobile security
• Network security and malware
• Networking protocols and security trace back
• Privacy in pervasive sensing
• Privacy in social media
• Secure distributed data outsourcing (e.g., database as a service)
• Security and privacy policies
• Security architectures, policies, and regulations
• Security and privacy in database systems
• Security modeling and vulnerability analysis
• Security protocols and strategies in sensor, cognitive, ad hoc, mesh, and satellite networks
• Usability/energy/cost/efficiency of security in the network
Important Dates
Conference Paper Submission Deadline: May 10, 2019
Notification of Acceptance & Registration Starts: July 20, 2019
Camera-Ready Paper Submission & Registration Due: August 20, 2019
WORKSHOP CHAIR
Hongwei Li - University of Electronic Science and Technology of China
Yujue Wang - Guilin University of Electronic Technology, China
PROGRAM COMMITTEE
Hua Deng, Hunan University
Yanbin Zheng, Guilin University of Electronic Technology
Wanqing Wu, Hebei University
Yang Yang, Fuzhou University
Zhen Liu, Shanghai Jiao Tong University
Pinghai Yuan, National University of Singapore
Yilei Wang, Qufu Normal University
Anjia Yang, Jinan University
Letian Sha, Nanjing University of Posts and Telecommunications
Lin Zhong, Beihang University
Submissions:
Authors are invited to submit original technical papers via https://edas.info/N26007 or login to http://edas.info/ by selecting “2019 Cybersecurity”.
Electronic submission to Program Chair at yjwang@guet.edu.cn with a title of “Cybersecurity 2019 Submission” is also accepted. Please DO NOT submit in both ways.
Publication: IEEE CPS (EI & and IEEE Xplore)
Contact
For more information about the conference, please visit www.CyberC.org, contact us at Papers@CyberC.org or Program Chair.