3rd International Conference on Cyber Security| ICCS 2017

Department of Computer Scienec & Engineering
Rajasthan Technical University, Kota, Rajasthan, India

Image description
Image description

Call For Papers

 

ICCS 2017 is an opportunity for academics, students, scholars, scientists and engineers from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas.This conference is trying to establish itself as a key event for the understanding of threats and risks to information systems, the development of a strong security culture, and incident investigation.


Please consider submitting to this conference.  We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. Topics for submissions may include, but are not limited to: 

 

Proposed Conference Tracks 

Cyber security

  • Big Data Techniques in Cyber Security
  • Forensic Analysis of Cyber Crimes
  • Secure Design, Tooling, and Engineering
  • Security and Trust of Citizens

Database security

  • Big Data Communication and Analytics
  • Data Sharing and Infrastructures
  • Quality of Service (QoS)

Cloud security

  • Mobile Cloud
  • Cloud and Systems Management
  • Cloud Computing and Networking

Network Security

  • Digital Signature Techniques
  • Advance Persistent Threat
  • Network Protocols
  • Next-generation Communication Networks
  • Information-Centric Networking
  • Data Network Management
  • Network Architectures
  • Modeling & Simulation of communication networks and Systems
  • Network Monitoring and Control
  • Traffic Measurement, Analysis, Modeling and Visualization
  • Routing and Flow Control in LANs, WANs and PANs
  • Sensor Nets and Embedded Systems
  • Network applications (web, multimedia streaming, gaming, etc.)
  • Social Computing and Networks
  • Software-Defined Networking
  • Secure Routing, Naming/Addressing, Network Management
  • Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
  • Security & Privacy in Peer-to-Peer and Overlay Networks
  • Security & Privacy for Emerging Technologies: VoIP, Social Networks
  • Security & Isolation in Cloud, Data Center and Software-Defined Networks

Secure Key Distribution

  • Secret Sharing
  • Key Management
  • Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
  • Secure User Authentication

Email security

  • Spam protection

Hardware Security

  • Cyber Physical System 

Mobile Security

  • E-wallet
    • e-wallet security and transaction reversal
    • interoperability issues in e-wallet
    • security of  biometric based transactions
    • Security in Mobile Networks
    • Mobile & Ubiquitous Communication Networks

IOT security

  • Security of IoT Services
  • IoT Service Architectures and Platforms
  •  Real-Time IoT Service Security Analytics and Forensics
  •  Organizational Privacy and Security Policies
  •  Governance for IoT Services
  •  Social Aspects of IoT Security
  •  Security and Privacy Threats to IoT Services and Users
  •  Accountability and Trust Management
  •  Legal Considerations and Regulations
  •  Case Studies and Applications

Securing Critical Infrastructure against Cyber Attacks

  • Control System Cyber security
  • Communications and Network Protocol Security in Control Systems and Instrumentation
  • Security of nuclear power plants
  • Energy Infrastructure Security
  • Transport Infrastructure Security

Security in Optical Networks

  • Optical Network Security
  • Convergence of optical and wireless access Networks
  • Storage Networks
  • Optical Network Virtualization
  • IP-WDM integration
  • Software-defined optical networks for grid computing 

Security of medical devices

  • Advances in Health-care IT security and privacy (including implantable medical devices and nano-sensors)
  • Human factors in biomedical security and privacy
  • Networked medical device security
  • Green cryptography for medical data security
  • Smart hospital security and spatial/temporal privacy preservation
  • Advances in cyber-physical medical systems security
  • Emerging cryptographic computing schemes for biomedical security
  • Post-quantum cryptography
  • Big data security and privacy-preserving medical data mining
  • Novel anonymous sensitive data handling and restricted computing methods for sensitive biomedical data
  • Novel deeply-embedded biomedical computing reliability 

 

 

All accepted papers/Conference proceedings will be published ONLINE in open acess in the following UGC approved journals (indexed in IET INSPEC, Google Scholar, Index Copernicus, ProQuest etc.):

Post conference, as per authors option, extended versions of selected papers will be reviewed for possible publication in any of the following SCOPUS (Elsevier) or Clarivate Analytics (formerly THOMSON REUTERS) (ESCI) indexed journals with H index or impact factor : 

Selected papers would be invited as contributed papers to ELSEVIER "International Journal of Critical Infrastructure Protection (IJCIP)". 


For ELSEVIER's IJCIP, only such papers dealing with "Protection of Critical National infrastructure" line Grids, Power Plants, Pipe Lines Ports etc. will be considered for further processing. Articles dealing with Cryptography/ Network protocols etc WILL not be considered for publication.

Note: 
  1. Authors may choose their preference of journal during Registration.
  2. It is mandatory that Papers must meet the aim and scope of the preferred journal.
  3. The publication of papers in any journal may take 2-12 months.

 

 

DEADLINES


Submission(Final Extension)       July 10, 2017

Acceptance                                  July 25, 2017
Registration (Early Bird)             July 31, 2017

Final Paper Submission             July 31, 2017 

Conference                       August 12-13, 2017


Previous Conferences

The two-day Conferences had Plenary sessions with experts in cyber security. Paper sessions, Panel discussions, Virtual Lab presentation. Participants from more than 5 countries including Netherlands, Poland, UK, USA, Canada, India, Saudi Arabia, Korea and Africa, deliberated in the Conference.


Selected high quality papers were reviewed for possible publication in SCOPUS (ELSEVIER) or THOMSON REUTERS (SCI) indexed journals and after revision by authors as per the reviewers comments they are being published in the following journals:

Journal of Cases on Information Technology (JCIT) 

International Journal of Information Security and Privacy (IJISP)

International Journal of Business Data Communications and Network (IJBDCN)

International Journal of Information and Computer Security(IJICS)