Table of Contents
Front page:
Society Announcements:
RS Events & News:
Members & Chapters:
Links:
|
|
Call for Papers
DSC18 - The 2018 IEEE Conference on
Dependable and Secure Computing
December 10-13 | Kaohsiung • Taiwan
|
|
Call for Papers
The IEEE Conference on Dependable and
Secure Computing solicits papers, posters, practices, and
experiences for presenting innovative research results, problem
solutions, and new challenges in the field of dependable and secure
computing. The whole spectrum of IT systems and application areas,
including hardware design and software systems, with stringent
relevant to dependability and security concerns are of interest to
DSC. Authors are invited to submit original works on research and
practice of creating, validating, deploying, and maintaining
dependable and secure systems. The scope of DSC includes, but is not
limited to, the following topics:
- Advanced Persistent Threat (APT)
- Network Attack and Defense Techniques
- Botnet and Intrusion Detection
- Cryptographic Methods and Toolkits
- Cyber Attacks
- Software Vulnerabilities and Security
- Database Security and Privacy
- Embedded Systems and IoT Devices
- Mobile and Cloud Computing Security
- AI and Big Data Analysis for Security
- Malware Mutation
- Deep Learning for Attack and Defense
|
- Block Chain and Finance Security
- Security Hardware and Circuits
- Authentication and Authorization
- Soft-Error Analysis and Models
- CAD Algorithms and Tools
- Electronic Circuits and Systems
- Fault-Tolerance and Reliability
- Industrial Design Experiences
- Noise- and Power-Aware Designs
- Stochastic Circuits and Systems
- Temperature-Aware Designs
- Variable-Latency Designs
|
Experience and Practice
The DSC conference will also include a
submission category for experience and practice papers on new
findings in the two aforementioned topics. The PC will evaluate a
submission to the experience and practice track with the
understanding that it predominantly contributes to design knowhow or
the extension of the community's knowledge about how the security
protection of known techniques fares in real-world operations.
Authors have to submit a 2-page paper along with a supplemental
video to demonstrate the implementation and/or the practicability of
the work. Topics of interest include, but are not limited to:
- Attacks on ISystems and Digital Storage
- CSIRTs, Incident Analysis and Response
- Hacking Techniques and Countermeasures
- Honeypots/Honeynets
- Malware Analysis and Reversing
- Mobile Communications Security and Vulnerabilities
|
- Newly Discovered Vulnerabilities
- Offensive Information Technology
- Reverse Engineering, Forensics, and Anti-Forensics
- Spyware, Phishing and Distributed Attacks
- VLSI/CAD Design Knowhow
|
Papers should be no more than 8 pages for regular papers and 2
pages for experience and practice papers. Papers must be written in
English conforming to the IEEE standard conference format (US
letter, two-column). All submitted papers will be peer-reviewed.
Accepted papers will appear in the conference proceedings and will
be eligible for submission to the IEEE Xplore Digital Library.
Authors of selected papers will be invited to submit enhanced
versions to IEEE Reliability magazine and journals.
Important Dates
- Abstract submission due: May 1, 2018
- Paper submission due: May 12, 2018
- Paper acceptance notification: August 14, 2018
- Workshop/poster submission due: August 21, 2018
- Workshop/poster acceptance notification: August 28,
2018
- Camera ready: September 11, 2018
In association with
|