A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.The 8th International Symposium on Cyberspace Safety and Security provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.Previously CSS has been held in New York, USA (2015), Paris, France (2014), Zhangjiajie, China (2013), Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008).
The 8th International Symposium on Cyberspace Safety and Security provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
Topics of interest include, but not limited to:
|Access Control and Trust Management||Mobile Biometrics|
|Active Defense Techniques and Systems||Risk Assessment in Cybersecurity|
|Attack Containment||Secure Network Architectures|
|Attack Recovery||Security for Large-scale Systems and Critical|
|Benchmark, Analysis and Evaluation of Cybersecurity||Infrastructures|
|Bitcoins Systems||Security for P2P systems and Grid Systems|
|Digital Rights Management||Security for Ad-Hoc and Sensor Networks|
|Distributed Intrusion Detection/Prevention Systems||Security in Web Services|
|Denial-of-Service Attacks and Countermeasures||Security in Pervasive and Embedded Systems|
|Digital Identity Management and Authentication||Security Theory and Tools|
|Implementation, Deployment and Management of||Spam Detection and Prevention|
|Cybersecurity||Social and Legal Issues in Cybersecurity|
|Intelligent Defense Systems||Software and System Assurance|
|Internet and Network Forensics||Viruses, Worms, and Other Malicious Code|
Paper Submission Deadline: May 15th, 2016
Author Notification: September 15th, 2016
Camera-Ready Paper Due: October 15th, 2016
Conference Dates: December 14th-16th, 2016
Submitted papers must report novel results and have not been published or submitted to journals or conferences. Submitted manuscripts should be written in English conforming to the IEEE conference proceedings format (8.5″ x 11″, Two-Column, template available at HERE). Full Papers (up to 6 pages complimentary, or 12 pages with the over length charge), Short Papers (up to 4 pages complimentary, or 6 pages with the over length charge), and Posters (up to 1 page complimentary, or 2 pages with the over length charge) are solicited. See Instructions for authors. All paper submissions must represent original and unpublished work. Papers must be submitted electronically in PDF format through EasyChair.
Papers will be selected based on their originality, significance, relevance, and clarity of presentation. The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.