Modern society witnesses a growing pervasiveness of sophisticated computer-based systems and increasingly performance communication networks, whose influence in daily life is huge. Complexity, heterogeneity, scale and interdependence shown by such systems are source of potential vulnerabilities and threats. The Workshop seeks submissions from academia and industry presenting novel research on theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.
Inspection and forensics technologies
Threat and vulnerability identification and modelling
Wireless communications security
Network-centric systems and dependability
Information security, encryption, privacy
Access control and identity management
Security and privacy protection mechanisms
Cyber-physical threats, vulnerability analysis, and countermeasures
Biometrics security and privacy
Critical infrastructure protection
Formal methods for security
Human factors and human behaviour recognition techniques
Identification, authentication and non-repudiation
Security and privacy in pervasive/ubiquitous computing
Security and privacy in smart grids
Security and privacy in social networks
Security and privacy in the cloud
SLA security in the cloud
Security weaknesses and protection of energy-control facilities
Energy consumption attacks
09月07日
2016
09月09日
2016
摘要截稿日期
注册截止日期
留言