Call for Papers

IEEE Conference Proceedings and Journal Papers

The accepted papers from this conference will be submitted for publication in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases (EI Compendex). Distinguished papers, after further revisions, will be considered for possible publication in several SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure  that if the paper is accepted, at least one author will attend the conference and present the paper.

Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Full Papers (up to 8 pages, or 12 pages with the over length charge) and Short Papers (up to 4 pages) are solicited.  See Instructions for authors.

Scope and Interests

Topics of particular interests include the following tracks, but are not limited to:

  1. Access Control and Trust Management
  2. Active Defense Techniques and Systems
  3. Attack Containment
  4. Attack Recovery
  5. Benchmark, Analysis and Evaluation of Cybersecurity
  6. Digital Rights Management
  7. Distributed Intrusion Detection/Prevention Systems
  8. Denial-of-Service Attacks and Countermeasures
  9. Identity Management and Authentication
  10. Implementation, Deployment and Management of Cybersecurity
  11. Intelligent Defense Systems
  12. Internet and Network Forensics
  13. Risk Assessment in Cybersecurity
  14. Secure Design and Testing
  15. Secure Network Architectures
  16. Security for Large-scale Systems and Critical Infrastructures
  17. Security for P2P systems and Grid Systems
  18. Security for Ad-Hoc and Sensor Networks
  19. Security in Web Services
  20. Security in Pervasive and Embedded Systems
  21. Security Theory and Tools
  22. Spam Detection and Prevention
  23. Social and Legal Issues in Cybersecurity
  24. Software and System Assurance
  25. Viruses, Worms, and Other Malicious Code

Tracks and Topics

Track 1: Data and Applications Security

  • Topics
    • Digital Rights Management
    • Secure Information Integration and Transaction Processing
    • Secure Semantic Web and Web Services
    • Security in E-Commerce and M-Commerce
    • Watermarking
    • Privacy and Data Protection
    • Emerging Technologies and Applications
    • Database Security
    • Data Mining Security

Track 2: Network and Communications Security

  • Topics
    • Active Defense Techniques and Systems
    • Distributed Intrusion Detection/Prevention Systems
    • Denial-of-Service Attacks and Countermeasures
    • Intelligent Defense Systems
    • Internet and Network Forensics
    • Secure Network Architectures
    • Security for Ad-Hoc and Sensor Networks
    • Spam Detection and Prevention
    • 5G Mobile Networks Security and Trust
    • Trust, Security and Privacy in Social Networks
    • Privacy Enhancement Technologies
    • Security issues in emerging networking technologies (e.g., SDN, CCN)

Track 3: Software and Systems Security

  • Topics
    • Analysis, identification, prevention, and removal of vulnerabilities
    • Audit and digital forensics
    • Authorization and access control of software objects
    • Dependable computing and fault tolerance
    • Detection of, defense against, containment of, and recovery from attacks
    • Operating system and mobile operating system security
    • Risk modeling, assessment, and management in software engineering
    • Security for large-scale systems and critical infrastructures
    • Security in distributed systems and pervasive computing
    • Viruses, worms, Trojans, and other malicious codes

Track 4: Cloud Security

  • Topics:
    • Cloud and mobile cloud computing data access control
    • Privacy preservation and data privacy in cloud
    • Trust management in cloud computing
    • Big data trust in cloud
    • Secure cloud data storage
    • Verifiable cloud computing
    • Security solutions based on cloud computing
    • Trustworthy identity management in cloud
    • Media cloud security and cloud security policy
    • Security for personal cloud

Track 5: Cyberspace Safety

  • Topics
    • Access Control and Trust Management
    • Identity Management and Authentication
    • Security and Usability
    • Security in Pervasive and Embedded Systems
    • Privacy Models, Privacy Enhancing Technologies
    • Human Factors in Computer Security
    • Risk Assessment in Cyber Security
    • Cyber-Physical System Security
    • Benchmark, Analysis and Evaluation of Cyber Security
    • Implementation, Deployment and Management of Cyber Security


  • Workshop (in conjuction): Privacy-Preserving Cyberspace Safety and Security

The workshop is held in conjunction with The 6th Symposium on Cyberspace Safety and Security (CSS 2014). In dependence on the main conference that seeks research submissions on a safe and secure cyberspace, the workshop puts its focus on privacy protection in such an environment. While achieving cyberspace safety and security, deploying defense systems, and deterring potential attacks are already demanding tasks, coming up with methods to do that in a privacy-preserving way is even more challenging. The aim of this workshop is to foster research efforts to combine those (contradicting) worlds and to present new methods that lie in between that area of conflict. Thus, the scope and interests are also closely related to those of the main conference (but are not limited to):

  • Data and Applications Security
  • Network and Communications Security
  • Software and Systems Security
  • Cloud Security

All of those areas of interest still require research efforts on privacy protection and the implications of safety and security mechanisms for the cyberspace need to be investigated as well - from a technical as well as from a legal and a social perspective. Thus, we are seeking for submissions presenting novel results from researchers of different disciplines like practical and theoretical computer sciences, legal research, etc.

Organization: All submissions will be peer-reviewed by at least two reviewers. The submissions are not anonymized but the reviewers stay anonymous. The call for papers will be distributed as soon as the workshop gets accepted. The tentative schedule is as follows:

  • Paper submission deadline: May, 31 st , 2014
  • Notification of acceptance: June, 30 th , 2014
  • Camera ready due: July, 15 th 2014

More information (