Call for Papers

A large fraction of the population in the world now spends a great deal of time in cyberspace. Cyberspace has become a critical infrastructure that is embedded in almost all other critical infrastructures and enables every movement of human society. It is thus very much in the public interest to have a safe and secure cyberspace. In the past several years, there has been large number of attacks in cyberspace, such as attacks on the Internet, attacks on embedded/real-time computing and control systems, and attacks on dedicated computing facilities. Many research efforts have been made to achieve cyberspace safety and security, such as blocking and limiting the impact of compromise, enabling accountability, promoting deployment of defense systems, and deterring potential attackers and penalizing attackers.The 8th International Symposium on Cyberspace Safety and Security provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.Previously CSS has been held in New York, USA (2015), Paris, France (2014), Zhangjiajie, China (2013), Melbourne, Australia (2012), Milan, Italy (2011), Chengdu, China (2009), and Sydney, Australia (2008).

The 8th International Symposium on Cyberspace Safety and Security provides a leading edge forum to foster interaction between researchers and developers with the cyberspace safety and security communities, and to give attendees an opportunity to network with experts in this area. It focusses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

 

 

Topics of interest include, but not limited to:

Access Control and Trust Management Mobile Biometrics
Active Defense Techniques and Systems Risk Assessment in Cybersecurity
Attack Containment Secure Network Architectures
Attack Recovery Security for Large-scale Systems and Critical
Benchmark, Analysis and Evaluation of Cybersecurity Infrastructures
Bitcoins Systems Security for P2P systems and Grid Systems
Digital Rights Management Security for Ad-Hoc and Sensor Networks
Distributed Intrusion Detection/Prevention Systems Security in Web Services
Denial-of-Service Attacks and Countermeasures Security in Pervasive and Embedded Systems
Digital Identity Management and Authentication Security Theory and Tools
Implementation, Deployment and Management of Spam Detection and Prevention
Cybersecurity Social and Legal Issues in Cybersecurity
Intelligent Defense Systems Software and System Assurance
Internet and Network Forensics Viruses, Worms, and Other Malicious Code

Important dates
Paper Submission Deadline: May 15th, 2016
Author Notification: September 15th, 2016
Camera-Ready Paper DueOctober 15th, 2016
Conference DatesDecember 14th-16th, 2016

 

Submission Guidelines 

Submitted papers must report novel results and have not been published or submitted to journals or conferences. Submitted manuscripts should be written in English conforming to the IEEE conference proceedings format (8.5″ x 11″, Two-Column, template available at HERE). Full Papers (up to 6 pages complimentary, or 12 pages with the over length charge), Short Papers (up to 4 pages complimentary, or 6 pages with the over length charge), and Posters (up to 1 page complimentary, or 2 pages with the over length charge) are solicited. See Instructions for authors. All paper submissions must represent original and unpublished work. Papers must be submitted electronically in PDF format through EasyChair.

Papers will be selected based on their originality, significance, relevance, and clarity of presentation. The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.