professor mohammed atiquzzaman
university of oklahoma, usa
journal of network and computer applications
Professor Michael Pecht, IEEE Fellow
University of Maryland, USA
The 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year. Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm).
The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
As in previous years, the conference intends to attract the cyber security and cyber intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%. We will invite three internationally renowned keynote speakers for this conference.
Areas of interest include, but are not limited to:
|- Access control||- Language-based Security|
|- Anti-Virus and Anti-Worms||- Malicious software|
|- Authentication and Authorization||- Network Security|
|- Cloud Security||- Operating System Security|
|- Computer / Digital Forensics||- Privacy Protection|
|- Big Data Security||- Risk Evaluation and Security Certification|
|- Data and System Integrity||- Security for Cyber-physical Systems|
|- Distributed Systems Security||- Security for Mobile Computing|
|- Electronic Commerce Security||- Security Models|
|- Crypto/Security Systems||- Security Protocols|
|- Information Hiding and Watermarking||- Smartphone Security|
|- Intellectual Property Protection||- Software Security|
|- Algorithms for efficient classification and clustering||- Smart grid cyber security|
|- Forensic computing||- Data leakage detection|
|- Intrusion Detection||- Trusted and Trustworthy Computing|
|- Sensitive data identification and protection||- Applied Electronic Technology|
|- Electric Automatization Technology||- Computer network technology|
|- Key Management and Key Recovery||- Smartphone Security|
The conference proceedings will be published in Springer's "Advances in Intelligent Systems and Computing" book series (http://www.springer.com/series/11156). Please follow the instructions on https://www.springer.com/us/authors-editors/conference-proceedings/conference-proceedings-guidelines when preparing the conference submission.
A number of Special Issues have been proposed and under review at both EI- and SCI-indexed journals. Authors of selected best papers will be invited to extend their accepted conference paper for consideration in the relevant special issue.
1988#, Airport Road, Ningbo, Zhejiang, China
Ningbo is a seaport with sub-provincial administrative status. The city has a population of 2,201,000 and is situated in northeastern Zhejiang province, China. Lying south of the Hangzhou Bay, and facing the East China Sea to the east, Ningbo borders Shaoxing to the west and Taizhou to the south, and is separated from Zhoushan by a narrow body of water.Climate Climatic Features: sub-tropical monsoon climate featured with temperate and humid weather and four distinct seasons; frost-free of 230-240 days Average Temperature: 16.2°C (61.2°F); average high in summer is 32°C (90°F), in winter 9°C (48°F)
Papers should be submitted through EASYCHAIR at www.easychair.org
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English and have to comply with the SPRINGER format (as per Author Kit). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.Submit