Call for Papers

June 8-9, 2015, London, UK

International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015) is an international referred conference dedicated to the advancement of Cyber Security, information security, network security, application security and business transformation of digital services, and the protection of public digital services, especially high value bearing online services.

The aim of the Cyber Security 2015 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Cyber Security 2015 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

Conference proceedings will be published by the Conference Publishing Services (CPS) and submitted for bibliographic indexing and listing by the following: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.

Details

Cyber Security 2015 is co-located with other conferences part of CyberScience 2015.

  • Posters will be presented during the conference.
  • An Industry track is available for discussing and publishing pilot and proof of concepts.
  • A Work in Progress track is available for preliminary work.
  • A Research Ideas track is available for ideas in early stages assessment.
  • A PhD Seminar track is available for discussing and publishing early PhD thesis research.

Note: Due to requests from potential authors, submission deadline has now been extended to 11th March 2015. All submissions must be submitted via the online submission system hosted by EasyChair Conference Portal!

All Industry track, Work in Progress track, Research Ideas track and PhD Seminar track will be published in the conference proceedings. Interested participants, please submit your proposal using the online submission portal hosted by EasyChair Conference System.

Full paper submission should be via the same online submission portal hosted by EasyChair Conference System.

Topics of Interest

Original papers are invited on recent advances in Cyber Security, Online Services, and Protection Mechanisms for Digital Services. The main themes in Cyber Security 2015 include but not limited to:

Cyber Security

  • Information Security
  • Computer Network Security
  • Application Security
  • Web Services Security
  • Mobile Security
  • Protective Security
  • Software Security
  • Wireless & Sensor Network Security
  • Software Coding Security
  • Barcode Scanner Security
  • Security in Middleware, Interface and Interaction
  • Security Services in Authentication, Authorisation, Accountability, Automation, Availability, Integrity and Nonrepudiation
  • Security Management
  • Security Operations
  • Digital Trust and Reputation
  • Geographical Location (IP Geolocation) and Cyber Travel
  • Geospatial Intelligence Networks (Centralised, Distributed & Hybrid)
  • Policy, Legal, Legislation & Compliance
  • Security Standardisation
  • Law, Legal and Ethics

Digital Services

  • Web Services
  • Internet Banking
  • E-Booking
  • Cloud Computing
  • E-Government
  • Electronic Commerce
  • Citizens Public Online Services
  • Mobile Commerce
  • E-Postal Services
  • E-Health
  • Online & Virtual Education
  • E-Learning
  • Web Chats
  • Secure Protocols, Coding and Development
  • Security Principles, Theory and Analysis
  • Security Policy, Standards and Procedures
  • Security in Business Processes
  • Security Enforcing Function (SEF) Gateways
  • Intrusion Detection Systems
  • Intrusion Prevention Systems
  • Firewalls
  • Anti-Virus and Anti-Malware Gateways
  • Data Loss Prevention
  • Encryption Services

Protection of Digital Services

  • Protection of Business Information Systems
  • Protection of Online Services
  • Public Online Services
  • Internet Banking
  • Security, Trust, Privacy
  • Security in Online Gaming Systems
  • Security in e-Government and Electoral Systems
  • Content Security
  • Protection of Public Online Content Distribution Systems
  • Secure practices, processes and procedures in Public Online Services
  • Cryptography  -  PKI, HSMs, Symmetric and Asymmetric Crypto, Crypto Custodian & Crypto Standards and Practices
  • Digital Forensics and Investigations
  • HoneyPots and Honey Nets
  • Critical National Infrastructures (CNIs)
  • Critical Network Systems (CNS) 

Best Papers

The best paper of each section will be selected and their author(s) will receive a corresponding Award Certificate. Authors of the Best 20%-25% papers presented at the conference will be invited to adapt their papers for their publication in one of the special issues peer reviewed journals.

SA Journal  IJCSET Journal  IJSMVA Journal