ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
text/plain; charset=UTF-8
Tue, 25 Apr 2017 17:54:21 +0800
Conference Contact <[log in to unmask]>
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Conference Contact <[log in to unmask]>
text/plain (130 lines)
CSS 2017 CFP

The CSS-2017 symposium is the 9th International Symposium on Cyberspace
Safety and Security. It provides a leading edge forum to foster interaction
between researchers and developers with the cyberspace safety and security
communities, and to give attendees an opportunity to network with experts
in this area. It focusses on Cyberspace Safety and Security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of cyberspace.

*Venue & Time*: Xi’an China, October 23-25, 2017

*Important Dates*: May 27, 2017 (Paper Submission Due), August 15, 2017
(Acceptance Notification)


·         Track 1: Privacy Preserving

·         Track 2: Intrusion Detection and Forensics

·         Track 3: Cyber Physical System Security

·         Track 4: Big Data Security

·         Track 5: Mobile Security

*Special issues*

Future Generation Computer Science (SCI, IF=2.786)

Concurrency and Computation: Practice and Experience (SCI, IF=0.94)

Cluster Computing (SCI, IF=1.514)


We invite submissions from academia, government, and industry presenting
novel research on all theoretical and practical aspects of computer and
network security. Areas of interest for CSS 2017 include, but are not
limited to:

Web security [Track 1,2,4]

Database security [Track 4]

Adversary machine learning [Track 4]

Data mining security [Track 4]

Watermarking [Track 2]

Security in social networks [Track 1,2,4]

Access control [Track 2,3,5]

Cyber physical security [Track 3]

Trust computing [Track 2,3,5]

Digital forensics [Track 2]

Intrusion detection [Track 2]

Malware and botnet [Track 2]

Vulnerability and risk assessment [Track 2,3,5]

Denial-of-Service attacks [Track 2,3]

Anonymous communication [Track 2]

Security in wireless communication [Track 2,5]

Security in mobile devices [Track 5]

Privacy preserving [Track 1]

Attacks to privacy [Track 1]

Cloud computing security [Track 1,2,4]

Operation system security [Track 2,5]

Software security [Track 2,5]

Security architecture [Track 2,3]

*Instructions for authors*

The accepted papers from this conference will be submitted for publication
in IEEE Xplore as well as other Abstracting and Indexing (A&I) databases
(EI Compendex). Distinguished papers, after further revisions, will be
considered for possible publication in several SCI & EI indexed special
issues of prestigious international journals. By submitting a paper to the
conference, authors assure  that if the paper is accepted, at least one
author will attend the conference and present the paper. Papers should be
written in English conforming to the IEEE conference proceedings format
(8.5" x 11", Two-Column). Papers should be submitted through the paper
submission system at the conference website. Full Papers (up to 8 pages, or
12 pages with the over length charge) and Short Papers (up to 4 pages) are

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see