Cyber Security 2017: International Conference On Cyber Security And Protection Of Digital Services London, UK, June 19-20, 2017 |
Conference website | http://www.c-mric.org/index.php/cs-2017 |
Submission link | https://easychair.org/conferences/?conf=cybersecurity2017 |
Abstract registration deadline | February 28, 2017 |
Submission deadline | April 10, 2017 |
Explain what Cyber Security 2017 is.
Submission Guidelines
Call for Papers
June 19-20, 2017, London, UK
IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017), an international refereed conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.
The aim of the Cyber Security 2017 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different culture.
Cyber Security 2017 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.
The conference proceedings will be submittedfor consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.
The organisers will accept registration of up to 5 IEEE UK&I Student and YP Members at 75% discounted rate, and will offer up to 20% registration discounts for all IEEE, BCS, IET & IISP members.
Details
Cyber Security 2016 is co-located with other conferences as part of Cyber Science 2017.
· Posters will be presented during the conference.
· Industry track is available for discussing and publishing pilot and proof of concepts.
· Work in Progress track is available for preliminary work.
· Research Ideas track is available for ideas in early stages assessment.
· PhD Seminar track is available for discussing and publishing early PhD thesis research.
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers describing ...
- Posters describing ...
List of Topics
Topics of Interest
Original papers are invited on recent advances in Cyber Security, Online Services, and Protection Mechanisms for Digital Services. The topics in Cyber Security 2017 include but not limited to:
Cyber Security
- Information Security
- Computer Network Security
- Application Security
- Web Services Security
- Mobile Security
- Protective Security
- Software Security
- Wireless & Sensor Network Security
- Software Coding Security
- Barcode Scanner Security
- Security in Middleware, Interface and Interaction
- Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
- Security Management
- Security Operations
- Digital Trust and Reputation
- Geographical Location (IP Geolocation) and Cyber Travel
- Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
- Policy, Legal, Legislation & Compliance
- Security Standardisation
- Law, Legal and Ethics
Digital Services
- Web Services
- Internet Banking
- E-Booking
- Cloud Computing
- E-Government
- Electronic Commerce
- Citizens Public Online Services
- Mobile Commerce
- E-Postal Services
- E-Health
- Online & Virtual Education
- E-Learning
- Web Chats
- Secure Protocols, Coding and Development
- Security Principles, Theory and Analysis
- Security Policy, Standards and Procedures
- Security in Business Processes
- Security Enforcing Function (SEF) Gateways
- Intrusion Detection Systems
- Intrusion Prevention Systems
- Firewalls
- Anti-Virus and Anti-Malware Gateways
- Data Loss Prevention
- Encryption Services
Protection of Digital Services
- Protection of Business Information Systems
- Protection of Online Services
- Public Online Services
- Internet Banking
- Security, Trust, Privacy
- Security in Online Gaming Systems
- Security in e-Government and Electoral Systems
- Content Security
- Protection of Public Online Content Distribution Systems
- Secure practices, processes and procedures in Public Online Services
- Cryptography - PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
- Digital Forensics and Investigations
- HoneyPots and Honey Nets
- Critical National Infrastructures (CNIs)
- Critical Network Systems (CNS)
All the accepted papers will appear in the proceedings!
Best Papers
The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate.
Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.
Committees
Program Committee
Steering Committee Chairs
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Thomas Owens – Brunel University, London, UK
Steering Committee
- Eckhard Pfluegel – Faculty of Science, Engineering and Computing, Kingston University, UK
- Nick Savage – University of Portsmouth, UK
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Karim Ouazzane – School of Computing, London Metropolitan University, London, UK
Industry Liaison Chairs
- Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
- Andrew Lenaghan – Oxford University, UK
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Tim D Williams – Cyber Security, London, UK
Publicity Chairs
- Phil Legg – University of the West of England, UK
- Gareth Niblett – BCS Information Security Specialist Group (ISSG), UK
- Daniel Zeng – University of Arizona, USA
Conference Chairs
- Xavier Bellekens – University of Abertay, Scotland, UK
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
Programme Committee
- Wasim Alhamdani – College of Computer Science & Information Technology, University of Dammam, Saudi Arabia
- David Brosset – Naval Academy Research Institute, France
- Paolo Falcarin – School of Architecture Computing and Engineering (ACE), University of East London, London, UK
- Fatih Kurugollu – Cyber Security, University of Derby, Derby, UK
- Richard Hill – Department of Computing and Mathematics, University of Derby, Derby, UK
- Marco Ivan Ramirez Sosa Moran – Faculty of Science and Technology, University of Westminster, London, UK
- Lai Bun Lok – IEEE UK & Ireland, IEEE
- Matthew Gream – IEEE UK & Ireland, IEEE
- Peter Komisarczuk – Royal Holloway, University of London, London, UK
- Deepthi Ratnayake – London Metropolitan University, London, UK
- Nilay Mistry – Gujarat Forensic Sciences University, India
- Reza Tadayoni – University of Aalborg, Denmark
- Uwe Glässer – School of Computing Science, Simon Fraser University, Canada
- Manish Gupta – State University of New York, Buffalo, NY, USA
- Reza Tadayoni – University of Aalborg, Denmark
- Anthony Davies – IEEE UK & Ireland, IEEE
- Gerardo I. Simari – Universidad Nacional del Sur in Bahia Blanca and CONICET, Argentina
- Thomas Owens – Brunel University, London, UK
- Jens Myrup Pedersen - University of Aalborg, Denmark
- Andrew Lenaghan – Flawless Money, Manchester, UK
- Chris Tait – Layer 7 Technologies, UK
- Peter J. Hawrylak – The University of Tulsa, USA
- Subrata Acharya - Towson University, USA
- Marios Anagnostopoulos - University of the Aegean, Greece
- Yi Luo – University of Arizona, Tucson, USA
- Erik Blasch – Fusion Evaluation & Air Force Research Laboratory, USA
- Sotiris Ioannidis – The Institute of Computer Science, Foundation for Research and Technology (FORTH), Greece
- Wei Yu – Towson University, USA
- Uri Blumenthal – MIT Lincoln Laboratory, MIT, USA
- Gerald O’Leary – MIT Lincoln Laboratory, MIT, USA
- Ciza Thomas – College of Engineering, India
- Stefanos Gritzalis – University of the Aegean, Greece
- Mike Tyworth – The Pennsylvania State University, USA
- Eric X. McMillan – The Pennsylvania State University, USA
- Bechara Al Bouna – Science University, Lebanon
- Janne Merete Hagen – Norwegian Defence Research Establishment, Norway
- Varun Dutt – Indian Institute of Technology Mandi, India
- Cleotilde Gonzalez - Carnegie Mellon University, USA
- Khidir M. Ali – Jubail University College, Kingdom of Saudi Arabia
- Katherine Hamilton – Penn State University, USA
- Xinyu Yang - Xi’an Jiaotong University, China
- Jie Lin – Xi’an Jiaotong University, China
- Georgios Kambourakis – University of the Aegean, Greece
- Elisavet Konstantinou – University of the Aegean, Greece
- Alexandros Kapravelos – Computer Security Group, University of California Santa Barbara
- Kirankumar S. Akate – Government Institute of Forensic Science, Aurangabad, India
- Chinazunwa Uwaoma – Faculty of Science and Technology, The University of the West Indies, Jamaica
- Theo Dimitrakos – Security Futures Practice, BT Research & Technology, UK
- Pierre Parrend – ECAM Strasbourg-Europe, France
- Abdullahi Arabo – University of the West of England (UWE), Bristol, UK
- Veena Desai – Gogte Institute of Technology, Belgaum, India
- Azah Norman – Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
- Antonis Mouhtaropoulos – Department of Computer Science, University of Warwick, Coventry, UK
- Paul Fennell - MPS, UK
- Kingsley Ukaoha - University of Benin, Nigeria
- Dawuda Alhassan - Tomas Bata University, Zlin, Czech Republic
- Laribi Boualem - University of Djillali, Bounaama, Algeria
- Md Ruhul Islam - Sikkim Manipal University India
- Sujoy Sarkar - IEEE, India
- Scott Cadzow - Cadzow Communications Consulting Ltd, UK
- Dalal Azizy - University of Southampton, UK
- Rauf Malick - DHA Suffa University, Pakistan
- Xuan Zhao – Cylance, California, USA
- Amar K. Seeam - Middlesex University (Mauritius Branch Campus), Vacoas, Mauritius
- Kevin Curran - Faculty of Computing and Engineering, Ulster University, Northern Ireland, UK
- Matija Stevanovic - Department of Electronic Systems, Aalborg University, Denmark
- Donna O'Shea – Nimbus Centre, Cork Institute of Technology, Ireland
- Pooneh Bagheri Zadeh - School of Computing, Creative Technologies & Engineering, Leeds Beckett University, Leeds, UK
- Mona Ghassemian – IEEE UK and Ireland, London, UK
- Eliana Stavrou - Computing Department, UCLan Cyprus, Larnaca, Cyprus
- Reza Montasari - Computing and Mathematics, University of Derby, Derby, UK
- Tim D Williams – Cyber Security, London, UK
- Amin Hosseinian-Far – Faculty of Arts, Environment & Technology, Leeds Beckett University, Leeds, UK
- Frederick Wamala – Security Architecture & Cyber Security, IBM, UK
Organizing committee
- Cyril Onwubiko – Centre for Multidisciplinary Research, Innovation and Collaboration, UK
- Thomas Owens – Brunel University, London, UK
Venue
The conference will be held at the Grand Connaught Rooms London
Contact
All questions about submissions should be emailed to submission@c-mric.org