EAI - Reinventing the governance and economy of research and innovation
The leading professional community for research career enhancement in the digital age

ATCS Workshop

6th International Workshop on Applications and Techniques in Cyber Security

(ATCS 2018)

The 6th International Workshop on Applications and Techniques in Cyber Security (ATCS 2018) focuses on all aspects of techniques and applications in cybersecurity research. The purpose of ATCS 2018 is to provide a forum for presentation and discussion of innovative ideas, cutting-edge research results, and novel techniques, methods and applications on all aspects of Cyber Security and Machine Learning.

The workshop intends to attract the cybersecurity research community around the world. In the inaugural event in 2013, we received 22 papers and accepted six papers. Each paper was reviewed by at least three independent experts (i.e. acceptance rate of 27.27%). Four best papers were published in a special issue of Journal of Networks. In 2014, we received 32 papers all over the world and accepted 12 papers – the acceptance rate was ~37%. Since then, the acceptance rate is ~37% in 2015, ~29% in 2016, and ~35% in 2017.

ACCEPTED PAPERS

What’s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
Eman Alashwali and Kasper Rasmussen

A Survey of Big Data Security Solutions in Healthcare
Musfira Siddique, Dr. Mudassar Ahmad, Muhammad Ayzed Mirza, Junaid Chaudhry and Rafiqul Islam

Malware Detection by Machine Learning Algorithm using Dynamic Features
Mozammel Chowdhury and Rafiqul Islam

A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network
Tongyi Xie, Jiawei Mo and Baohua Huang

A Multiple Linear Regression Based High-performance Error Prediction Method for Reversible Data Hiding
Bin Ma, Xiaoyu Wang, Bing Li and Yunqing Shi

Online radicalisation along a continuum: from when individuals express grievances to when they transition into extremism
Yeslam Al-Saggaf

Internet of Thing Trajectory Privacy Preserving Scheme
Jemal Abawajy

Maximum Secrecy-Key Capacity Design for Amplify-and-Forward Relays in The Cooperative Network
Shiwei Yan

A Review and Costing of Lightweight Authentication Schemes for Internet of Things(IoT): Towards design of an authentication architecture for smart home applications
Attlee Munyaradzi Gamundani, Amelia Phillips and Hippolyte N. Muyingi

Secure Communication on NoC based MPSoC
Gaurav Sharma, Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Olivier Markowitch and Jean-Michel Dricot

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices
Niken Cahyani, Ben Martini, Kim-Kwang Raymond Choo and Helen Ashman

An approach to enhance understanding of digital forensics technical terms in the presentation phase of a digital investigation using multimedia presentations
Niken Cahyani, Ben Martini, Kim-Kwang Raymond Choo and Helen Ashman

 

Program Chairs:

  • Jemal H. Abawajy, Deakin University, Australia.
  • Rafiqul Islam, Charles Sturt University, Australia.
  • Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA.

 

Workshop topics: Areas of interest include, but are not limited to:

  • Access control
  • Language-based Security
  • Anti-Virus and Anti-Worms
  • Malicious software
  • Authentication and Authorization
  • Network Security
  • Cloud Security
  • Operating System Security
  • Computer / Digital Forensics
  • Privacy Protection
  • Data and System Integrity
  • Risk Evaluation and Security Certification
  • Database Security
  • Security for Cyber-physical Systems
  • Distributed Systems Security
  • Security for Mobile Computing
  • Electronic Commerce Security
  • Security Models
  • Crypto/Security Systems
  • Security Protocols
  • Information Hiding and Watermarking
  • Smartphone Security
  • Intellectual Property Protection
  • Software Security
  • Intrusion Detection
  • Trusted and Trustworthy Computing
  • Key Management and Key Recovery
  • Algorithms for efficient classification and clustering
  • Forensic computing
  • Smartphone Security
  • Smart grid cybersecurity
  • Data leakage detection
  • Sensitive data identification and protection

 

All registered papers will be published by Springer and made available through SpringerLink Digital Library.

SecureComm proceedings are indexed in leading indexing services, including Ei Compendex, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).

Authors of selected best accepted papers will be invited to submit an extended version to EAI Endorsed Transactions on Security and Safety

Deadlines:

Submission Deadline: April 20, 2018  extension: May 5, 2018

Notification of Acceptance: May 15, 2018

Camera-ready deadline: June 10, 2017

Workshop Date: August 8, 2018

 

Submission Guidelines:

Papers should be submitted through EASYCHAIR. Click here.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (as per  ). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.

Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

 

 

EAI Institutional Members