活动简介

2nd Cyber Security In Networking Conference

Cybersecurity is the set of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security. In this conference we are interested in cybersecurity in networking

组委会

General Chair

  • Patrick Hebrard (Naval group, France)

  • Solange Ghernaouti (University of Lausanne, Switzerland)

TPC Chairs

  • Cunqing Hua (Shanghai Jiao Tong University, China)

  • Rida Khatoun (Telecom ParisTech, France)

Program Committee

  • Mohamad Badra (CNRS/Zayed University, France)

  • Marinho Barcellos (Federal University of Rio Grande do Sul, Brazil)

  • Abderrahim Benslimane (University of Avignon, France)

  • Raouf Boutaba (University of Waterloo, Canada)

  • Georg Carle (Technische Universität München, Germany)

  • Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece)

  • Xiuzhen Chen (Shanghai Jiaotong University, P.R. China)

  • Laurent Ciavaglia (Nokia, France)

  • Filip De Turck (Ghent University - imec, Belgium)

  • Emmanuel Dotaro (Thales, France)

  • Otto Carlos Duarte (Universidade Federal do Rio de Janeiro, Brazil)

  • Ahmad Fadlallah (University of Science and Arts in Lebanon, Lebanon)

  • Wissam Fawaz (LAU, Lebanon)

  • Yacine Ghamri (ENSIIE, France)

  • Solange Ghernaouti Hélie (University of Lausanne, Switzerland)

  • Lisandro Granville (Federal University of Rio Grande do Sul, Brazil)

  • Vincent Guyot (ESIEA, France)

  • Kamel Haddadou (GANDI SAS, France)

  • Badis Hammi (Télécom ParisTech, France)

  • James Hong (POSTECH, Korea)

  • Bijan Jabbari (George Mason University, USA)

  • Diego Kreutz (Federal University of Pampa (UNIPAMPA), Brazil)

  • Houda Labiod (TELECOM ParisTech (ex: ENST), France)

  • Latif Ladid (University of Luxembourg / IPv6 Forum, Luxembourg)

  • Abdelkader Lahmadi (LORIA, France)

  • Patrick Lallement (Prof, France)

  • Wenjia Li (New York Institute of Technology, USA)

  • Xiaodong Lin (Wilfrid Laurier University, Canada)

  • Pascal Lorenz (University of Haute Alsace, France)

  • Diogo Mattos (Universidade Federal do Rio de Janeiro, Brazil)

  • Deep Medhi (University of Missouri-Kansas City, USA)

  • Refik Molva (EURECOM, France)

  • Michele Nogueira (Federal University of Parana (UFPR), Brazil)

  • Guy Pujolle (University Pierre et Marie Curie - Paris 6, France)

  • Pierangela Samarati (Universita' degli Studi di Milano, Italy)

  • Stefano Secci (Sorbonne Université, France)

  • Ahmed Serhrouchni (ENST, France)

  • Mehmet Ulema (Manhattan College, USA)

  • Pascal Urien (Télécom ParisTech, France)

  • Paulo Verissimo (University of Lisbon, Poland)

  • Sherali Zeadally (University of Kentucky, USA)

  • Benoit Martin (DGA, France)

  • Yvon Kermarrec (IMT Atlantique, France)

征稿信息

重要日期

2018-05-23
初稿截稿日期
2018-06-14
初稿录用日期
2018-06-30
终稿截稿日期

Areas of interest include, but are not limited to:

  • Attacks on Virtualized Systems

  • Balancing Trust and Control

  • Cell Phones vulnerabilities

  • Cloud of Security

  • Concealing Malware (Trojan Horses-Root kits-Logic Bombs)

  • Cyber-attacks Cloud-oriented vs Cyber defense Cloud-oriented

  • Cybersecurity

  • Data Center Network Control, Security and Optimization

  • Demilitarization Zone (DMZ)

  • Designing a Security Policy

  • Disaster recovery plan

  • Enterprise Wireless Security

  • Hardware-Based Attacks

  • Host Network Intrusion Prevention Systems

  • Industrial control system information security

  • Infection Malware

  • Integrated Network Security Hardware

  • Internet Content Filters

  • Internet security issues

  • Network and operating system administration for security purposes

  • Network Attached Storage (NAS)

  • Network Intrusion Detection Systems (NIDS)

  • Network security design

  • Organizational Security Policies

  • Secure Network through Network Design

  • Security of Virtual Machines

  • Security, trust and privacy challenges

  • Smart City Security

  • Smart Grid security

  • Software-Based Attacks

  • System security for wired and wireless networks

  • Virtual firewalls

  • Blockchain technology and CyberSecurity

作者指南

Paper Submission:

Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions should be written in English with maximum of eight (8) printed pages (in Two-Column IEEE Conference Format), including text, figures and references. Papers should be submitted through EDAS at: http://edas.info/N24446

Best papers will be considered for fast-track publication in the Annals of Telecommunications (Springer, ISI-indexed) Information at: www.csnet-conference.org

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月24日

    2018

    10月26日

    2018

  • 05月23日 2018

    初稿截稿日期

  • 06月14日 2018

    初稿录用通知日期

  • 06月30日 2018

    终稿截稿日期

  • 10月26日 2018

    注册截止日期

历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询