7th International Workshop on Applications and Techniques
in Cyber Security (ATCS 2019)
The 2019 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Singapore (2018), Niagara Falls, Canada (2017), Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 7th consecutive conference year.
The 2019 International Workshop on Applications and Techniques in Cyber Security (ATCS 2019) focuses on all aspects on techniques and applications in cyber security and intelligence research. The purpose of ATCS 2019 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber security and intelligence.
The accepted papers will be published in the proceedings of SecureComm 2019 – 15th EAI International Conference on Security and Privacy in Communication Networks, Springer’s Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Selected papers will also be considered for inclusion in Special Issue of EI and SCI-indexed journals.
Areas of interest include, but are not limited to:
|– Access control||– Language-based Security|
|– Anti-Virus and Anti-Worms||– Malicious software|
|– Authentication and Authorization||– Network Security|
|– Cloud Security||– Operating System Security|
|– Computer / Digital Forensics||– Privacy Protection|
|– Big Data Security||– Risk Evaluation and Security Certification|
|– Data and System Integrity||– Security for Cyber-physical Systems|
|– Distributed Systems Security||– Security for Mobile Computing|
|– Electronic Commerce Security||– Security Models|
|– Crypto/Security Systems||– Security Protocols|
|– Information Hiding and Watermarking||– Smartphone Security|
|– Intellectual Property Protection||– Software Security|
|– Intrusion Detection||– Trusted and Trustworthy Computing|
|– Key Management and Key Recovery
– Algorithms for efficient classification and clustering
– Forensic computing
|– Smartphone Security
– Smart grid cyber security
– Data leakage detection
– Sensitive data identification and protection
– Applied Electronic Technology
– Electric Automatization Technology
– Computer network technology
As in previous years, the conference intends to attract the cyber security and intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%.
Submission deadline: 1 May 2019
Authors’ notification: 6 June 2019
Registration opens: 10 June 2019
Camera-ready deadline: 30 June 2019 (Hard deadline)
Conference dates: 23–25 October 2019
All registered papers will be published together with SECURECOM Proceedings by Springer and made available through SpringerLink Digital Library.
SecureComm proceedings are indexed in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL)
All accepted authors are eligible to submit an extended version in a fast track of:
Papers should be submitted through EAI ‘Confy‘ system, and have to comply with the Springer format (see Author’s kit section). Papers should be in English. Regular papers should be no more than 18 pages LNCS format.
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
Paper review will be single-blind, so there is no need for anonymous submission. Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.
Workshop Program Chairs
- Jemal Abawajy, Deakin University, Australia.
- Rafiqul Islam, Charles Sturt University, Australia.
- Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA.